diff --git "a/results_retrieval/emb_bge_base/retrieval_default_openparsegpu.json" "b/results_retrieval/emb_bge_base/retrieval_default_openparsegpu.json" new file mode 100644--- /dev/null +++ "b/results_retrieval/emb_bge_base/retrieval_default_openparsegpu.json" @@ -0,0 +1,22210 @@ +[ + { + "top_k": 10, + "mrr": 0.4436944444444445, + "recall": 0.6133333333333333, + "count_empty_strings": 8309 + }, + [ + { + "references": { + "source_file": "uksi_20200438_en.pdf", + "query": "What does \"new account\" mean according to the international tax compliance from 2020 ?", + "target_page": 2, + "target_passage": "“new account” means a financial account maintained by a reporting financial institution opened on or after 13th May 2020", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "The Treasury make these Regulations in exercise of the powers conferred by section 222 of the \nFinance Act 2013(**a**): \n\n**Citation and commencement**\n\n**1.**These Regulations may be cited as the International Tax Compliance (Amendment) \n\nRegulations 2020 and come into force on 13th May 2020. \n\n**Amendments to the International Tax Compliance Regulations 2015**\n\n**2.**—(1) The International Tax Compliance Regulations 2015(**b**) are amended as follows. \n(2) In regulation 1(3)(b)(i), for “16th May 2019” substitute “19th April 2020”(**c**). \n(3) In regulation 3(4A)(a), at the beginning insert “subject to regulation 24(3)”. \n(4) In regulation 24— \n\n(a) in the table in paragraph (2), in the column headed “the CRS”— \n\n(i) at the beginning of the entry for “new account” insert “subject to paragraph (3)”, and \n(ii) at the beginning of the entry for “pre-existing account” insert “subject to regulation \n\n3(4A)(a) and paragraph (3)”, and \n\n(b) after paragraph (2) insert— \n\n“(3) In respect of the accounts listed in paragraph (4)— ", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThe Regulations amend the International Tax Compliance Regulations 2015 (“the principal \nRegulations”) which give effect to agreements and arrangements reached between the United \nKingdom and other jurisdictions to improve international tax compliance. \n\nRegulation 2(2) extends the application of the principal Regulations to arrangements entered into \nby the United Kingdom for the exchange of financial account information with other jurisdictions \nup to 19th April 2020, the date before the Regulations are made. \n\nRegulation 2(5) omits various accounts from the category of excluded accounts. Regulation \n2(4)(b) amends the definitions of “new account” and “pre-existing account” in relation to those ", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "(a) “new account” means a financial account maintained by a reporting financial \n\ninstitution(**a**) opened on or after 13th May 2020; \n\n(b) “pre-existing account” means— \n\n(i) a financial account maintained by a reporting financial institution as of 12th \n\nMay 2020, or \n\n(ii) a financial account within Section VIII(C)(9)(b) of Annex 1 of the DAC(**b**), \nbut in the application of that provision the references to “subparagraph \nC(9)(a)” are to be read as references to paragraph (i) of this sub-paragraph. \n\n(4) The accounts are— \n\n(a) non-registered pension arrangements where the annual contributions are limited to \n£50,000 and funds contributed cannot be accessed before the age of 55 except in \ncircumstances of serious ill health; \n\n(b) Premium Bonds issued by the UK National Savings and Investments; \n\n(c) Fixed Interest Savings Certificates issued by the UK National Savings and \n\nInvestments; and \n\n(d) Index Linked Savings Certificates issued by the UK National Savings and \nInvestments.”. \n\n(5) In Schedule 2, omit paragraphs 2, 6, 8 and 9. ", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "accounts so that these terms are defined by reference to the date that those accounts ceased to be \nexcluded accounts. Regulation 2(3) and (4)(a) make consequential amendments. \n\nRegulation 3 makes a transitional provision for the calendar year 2020 in relation to accounts \nwhich were previously excluded accounts. \n\nA Tax Information and Impact Note covering the International Tax Compliance Regulations 2015 \nwas published on 18th March 2015 and \nthe HMRC website at \nhttps://www.gov.uk/government/publications/tax-administration-regulations-to-implement-the- \nuks-automatic-exchange-of-information-agreements. It remains an accurate summary of the \nimpacts that apply to this instrument. \n\nis available on ", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "**Transitional provision**\n\n**3.**—(1) For the purposes of the International Tax Compliance Regulations 2015, in relation to an \naccount that by virtue of regulation 2(5) ceases to be an excluded account, the calendar year 2020 \nis treated as beginning on 13th May 2020 and ending on 31st December 2020. \n\n(2) Where in consequence of paragraph (1) it is necessary to apportion an amount for the \ncalendar year 2020 to the period ending immediately before 13th May 2020 and the period \nbeginning with that date, it is to be apportioned— \n\n(a) on a time basis according to the respective length of the periods, or \n(b) if that method would produce a result that is unjust or unreasonable, on a just and \n\nreasonable basis. \n\n*David Rutley*\n*Maggie Throup*\nTwo of the Lords Commissioners of Her Majesty’s Treasury 20th April 2020 ", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "**Recent Accounting Pronouncements**\nWe are required to adopt the following revised accounting standards on \nor after January 1, 2014. We are assessing the impact of adopting these \nrevised standards on our 2014 interim and consolidated financial \nstatements. \n(cid:129)*IAS 32, Financial*\n\n*Instruments: Presentation (IAS 32)*– In December \n2011, the IASB amended IAS 32 to clarify the meaning of when an \nentity has a current \nset-off. The \namendments are effective for annual periods beginning on or after \nJanuary 1, 2014 and are required to be applied retrospectively. We \ndo not expect this to have a significant impact on our consolidated \nfinancial statements. \n\nlegally enforceable right of \n\n(cid:129)*IFRS 11, Joint Arrangements (IFRS 11) –*As a result of the adoption of \nIFRS 11, we have changed how we evaluate our interests in joint \narrangements. Under IFRS 11, we classify our interests in joint \narrangements as either joint operations or joint ventures depending \non our right to the assets and obligations for the liabilities of the \narrangements. When making this assessment, we consider \nthe \nstructure of \nform of any separate \nvehicles, the contractual terms of the arrangements and other facts ", + "page_start": 84, + "page_end": 84, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "(**a**) 2013 c. 29; section 222 was amended by section 50 of the Finance (No. 2) Act 2015 (c. 33) but the amendments are not \nrelevant to these Regulations. \n(**b**) S.I. 2015/878 (referred to in these footnotes as “the principal Regulations”); relevant amending instruments are S.I. \n\n2017/598, 2018/490 and 2019/881. \nIn accordance with the common reporting standard for automatic exchange of financial account information developed by \nthe Organisation for Economic Co-operation and Development and adopted by the United Kingdom, the United Kingdom \nexchanges information received from financial institutions under the principal Regulations with a territory which is a \n“Reportable Jurisdiction” under the CRS and with which the United Kingdom has entered into international exchange \narrangements for that year. Reportable Jurisdictions are identified in a published list available at https://www.gov.uk/hmrc- \ninternal-manuals/international-exchange-of-information/ieim402340. A hard copy of this list is available for inspection at \nthe offices of HMRC at 10 South Colonnade, 9th Floor, Canary Wharf, London E14 4PU. \n\n(**c**) ", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "See Note 2(b) for adoption of a new accounting standard by a \nconsolidated subsidiary in the United Kingdom. \n\n(d) Cash equivalents \nAll highly liquid investments with maturity of three months or less \nwhen purchased are considered cash equivalents. \n\n(j) Income taxes \nDeferred tax assets and liabilities have been recognized in the \nconsolidated financial statements with respect to the differences \nbetween financial reporting and the tax bases of the assets and \nliabilities, and were measured using the enacted tax rates and laws \nwhich will be in effect when the differences are expected to reverse. \n(e) Inventories \nInventories are stated principally at the lower of cost or market, cost \nbeing determined principally by the first-in, first-out method. See Note \n2 (a). \n\n(k) Research and development costs \nResearch and development costs are charged to income when \nincurred. \n\n(n) Appropriation of retained earnings \nUnder the Commercial Code of Japan, the appropriation of retained \nearnings with respect to a given financial year is made by resolution \nof the shareholders at a general meeting held subsequent to the \nclose of such financial year. The accounts for that year do not, \ntherefore, reflect such appropriations. See Note 22. \n(l) Revenue recognition \nRevenue is generally recognized on sales of products at the time of \nshipment. \n\n(o) New Accounting Standards \nA new Japanese accounting standard “Impairment of Fixed Assets” \nwas issued in August 2002 that is effective for fiscal years beginning \non or after April 1, 2005. The new standard requires that tangible and \nintangible fixed assets be carried at cost less depreciation, and be \nreviewed \nin \ncircumstances indicate that the carrying amount of an asset may not \nbe recoverable. Companies would be required to recognize an \nimpairment loss in their income statement if certain indicators of \nasset impairment exist and the book value of an asset exceeds the \nundiscounted sum of future cash flows of the asset. The Company is \ncurrently assessing the impact of this new accounting standard on its \nfinancial position and operating results. (m) Derivative financial instruments \nThe Company and certain consolidated subsidiaries have entered into \nvarious derivative transactions in order to manage certain risks arising \nfrom adverse fluctuations in foreign currency exchange rates, interest \nrates, and stock and commodity prices. Derivative \nfinancial \ninstruments are carried at fair value with changes in unrealized gain \nor loss charged or credited to operations, except for those which \nmeet the criteria for deferral hedge accounting under which \nunrealized gain or loss is deferred as an asset or a liability. \nReceivables and payables hedged by qualified forward foreign \nexchange contracts are translated at the corresponding foreign \nexchange contract rates. \n\nfor impairment whenever events or changes \n\n2. ACCOUNTING CHANGES ", + "page_start": 78, + "page_end": 78, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Note 9 – Income Taxes \n\nOur effective tax rate was 22% and 23% for the three and nine months ended September 30, 2024, respectively, \ncompared to 8% and 10% for the three and nine months ended September 30, 2023, respectively. The increase in our effective \ntax rate is primarily due to the impact of releasing the valuation allowance on our U.S. deferred tax assets in the fourth quarter \nof 2023 and changes in the mix of our jurisdictional earnings. \n\nOur effective tax rates for the three and nine months of 2024 and 2023 as compared to the U.S. federal statutory rate of \n\n21% were primarily impacted by the mix of our jurisdictional earnings subject to different tax rates, valuation allowances on \nour deferred tax assets and benefits from our U.S. tax credits and the Inflation Reduction Act of 2022 (“IRA”) manufacturing \ncredits. \n\nWe are subject to tax examinations in the U.S. federal, state and foreign jurisdictions. Given the uncertainty in timing \n\nand outcome of our tax examinations, an estimate of the range of the reasonably possible change in gross unrecognized tax \nbenefits within twelve months cannot be made at this time. \n\nNote 10 – Commitments and Contingencies ", + "page_start": 25, + "page_end": 25, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "**Changes in Accounting Policies**\n\nThe accounting policies applied during the year ended December 31, 2013 are consistent with those used in the audited consolidated \nfinancial statements for the year ended December 31, 2012, except for the following new and amended IFRS and International Financial \nReporting Interpretations Committee (“IFRIC”) interpretations which were effective for periods beginning on or after July 1, 2012, and \nJanuary 1, 2013: \n\nIAS 1 ‑ Financial Statement Presentation (“IAS 1”) — Presentation of Items of Other Comprehensive Income (“OCI”) \nThe amendments to IAS 1 change the grouping of items presented in OCI. Items that could be reclassified (or recycled) to profit or loss \nat a future point in time (for example, upon derecognition or settlement) would be presented separately from items that will never be \nreclassified. The adoption of this standard did not have an impact on the Company’s financial position or performance. ", + "page_start": 75, + "page_end": 75, + "source_file": "TSX_KMP_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20200438_en.pdf", + "query": "Under which conditions can the funds of a non-registered pension arrengements be obtained before the age of 55 ?", + "target_page": 2, + "target_passage": "non-registered pension arrangements where the annual contributions are limited to £50,000 and funds contributed cannot be accessed before the age of 55 except in circumstances of serious ill health", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "NOTE 22: PENSIONS \n\nWe have contributory and non-contributory defined benefit pension \nplans that are made available to most of our employees. The plans \nprovide pensions based on years of service, years of contributions and \nearnings. We do not provide any non-pension post-retirement benefits. \nWe also provide unfunded supplemental pension benefits to certain \nexecutives. \n\nThe assets of the defined benefit pension plans are held in segregated \naccounts isolated from our assets. We administer the defined benefit \npension plans pursuant to applicable regulations, the Statement of \nInvestment Policies and Procedures and to the mandate of the Pension \nCommittee of the Board of Directors. The Pension Committee of the \nBoard of Directors oversees our administration of the defined benefits \npension plans, which includes the following principal areas: \n(cid:129) overseeing the funding, administration, communication and \ninvestment management of the plans \n(cid:129) selecting and monitoring the performance of all \n\nthird parties \nperforming duties in respect of the plans, including audit, actuarial \nand investment management services \n(cid:129) proposing, considering and approving amendments to the defined \nbenefit pension plans \n(cid:129) proposing, considering and approving amendments of the Statement \nof Investment Policies and Procedures \n(cid:129) reviewing management and actuarial reports prepared in respect of \nthe administration of the defined benefit pension plans \n(cid:129) reviewing and approving the audited financial statements of the \ndefined benefit pension plan funds. ", + "page_start": 121, + "page_end": 121, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "67 OECD, 2019: Pensions at a Glance 2019, OECD and G20 Indicators \nQuote:*‘Non-standard work is frequent among workers over 65 and women Non-standard work is common among*\n*older workers. While overall employment rates decrease at older ages, the share of non-standard work is*\n*particularly high among workers over 65: only about 15% of workers between 65 and 74 are in standard*\n*employment, against more than 60% at ages 55-64 and 25-54 (Figure 2.2, Panel A)’*(p. 70). \n\n68 Eurofound, 2021: Seasonal worker \n*‘A seasonal worker is defined in Article 3(b) of Directive 2014/36/EU on the conditions of entry and stay of third-*\n*country nationals for the purpose of employment as ‘a third-country national who retains his or her principal place*\n*of residence in a third country and stays legally and temporarily in the territory of a Member State to carry out an*\n*activity dependent on the passing of the seasons, under one or more fixed-term work contracts concluded directly*\n*between that third-country national and the employer established in that Member State.’*European Parliament and \nthe Council: Directive 2014/36/EU of 26 February 2014 on the conditions of entry and stay of third-country \nnationals for the purpose of employment as seasonal workers. \n69 Action Plan EU: Seasonal workers are a group of mobile workers who retain their main place of residence in \ntheir home country and move temporarily to another Member State to carry out an activity dependent on the \npassing of the seasons, here \nArticle 2.1.*‘This Directive shall apply to third-country nationals who reside outside the territory of the Member*", + "page_start": 142, + "page_end": 142, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**Pension Obligations**\nOur retiree pension plans had a funding deficit of approximately $172 \nmillion at December 31, 2013. We have been making special minimum \nmonthly payments in addition to our regular contributions to eliminate \nthe pension liability. During 2013, our funding deficit was reduced by \n$162 million. \n\naccrued obligations in the future. See*Critical accounting estimates*for \nmore information. \n\n*Purchase of Annuities*\nFrom time to time we have made additional lump-sum contributions to \nour pension plans, and the pension plans have purchased annuities \nfrom insurance companies to fund the pension benefit obligations for \ncertain groups of \nretired employees in the plans. Purchasing the \nannuities relieves us of our primary responsibility for that portion of \nthe accrued benefit obligations for the retired employees and eliminates \nthe significant risk associated with the obligations. \nThe special payments, including contributions associated with benefits \npaid from the plans, were approximately $7 million in 2013. We expect \nour total estimated funding requirements to be $96 million in 2014 and \nto be adjusted annually thereafter, based on various market factors \nsuch as interest rates and expected returns and staffing assumptions. \n\nWe did not make any additional lump-sum contributions to our pension \nplans in 2013 or 2012, and the pension plans did not purchase \nadditional annuities. \nChanges in factors such as the discount rate, increase in compensation \nand the expected return on plan assets can affect the accrued benefit \nobligation, pension expense and the deficiency of plan assets over ", + "page_start": 65, + "page_end": 65, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "\n\nPENSION ", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "(a) “new account” means a financial account maintained by a reporting financial \n\ninstitution(**a**) opened on or after 13th May 2020; \n\n(b) “pre-existing account” means— \n\n(i) a financial account maintained by a reporting financial institution as of 12th \n\nMay 2020, or \n\n(ii) a financial account within Section VIII(C)(9)(b) of Annex 1 of the DAC(**b**), \nbut in the application of that provision the references to “subparagraph \nC(9)(a)” are to be read as references to paragraph (i) of this sub-paragraph. \n\n(4) The accounts are— \n\n(a) non-registered pension arrangements where the annual contributions are limited to \n£50,000 and funds contributed cannot be accessed before the age of 55 except in \ncircumstances of serious ill health; \n\n(b) Premium Bonds issued by the UK National Savings and Investments; \n\n(c) Fixed Interest Savings Certificates issued by the UK National Savings and \n\nInvestments; and \n\n(d) Index Linked Savings Certificates issued by the UK National Savings and \nInvestments.”. \n\n(5) In Schedule 2, omit paragraphs 2, 6, 8 and 9. ", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "Parliament may make provision under which, if the Appropriation Act in respect \nof any financial year has not come into operation by the beginning of that financial year, \nthe President may authorize the withdrawal of moneys from the Consolidated Fund for \nthe purpose of meeting expenditure necessary to carry on the services of the \nGovernment until the expiration of four months from the beginning of that financial year \nor the coming into operation of the Appropriation Act, whichever is the earlier. \n**121. Contingencies Fund**\n\n(1) Parliament may make provision for the establishment of a Contingencies \n\nFund and for authorizing the President, if satisfied that there has arisen an urgent and \nunforeseen need for expenditure for which no other provision exists, to make advances \nfrom that Fund to meet that need. \n\n(2) Where any advance is made from the Contingencies Fund, a supplementary \nestimate shall be laid before the National Assembly as soon as possible for the purpose \nof replacing the amount so advanced. ", + "page_start": 51, + "page_end": 51, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "***Retirement plans:***The Company maintains a noncontributory defined benefit plan covering substantially all \nemployees. Pension benefits are based primarily on the employee's compensation and years of service. The \nCompany's policy is to fund the maximum allowable contribution calculated under federal income tax regulations. \nDuring 2003, the Company adopted an Executive Supplemental Retirement Plan for selected employees. This is an \nunfunded plan and is maintained primarily for the purpose of providing deferred compensation for a select group of \nmanagement or highly compensated employees. The Company also maintains a defined contribution plan under which \nsubstantially all employees may defer a portion of their earnings on a pre-tax basis, up to the allowable federal \nmaximum. The Company may make matching and discretionary contributions to this plan. Neither of the funded \nretirement plans holds Company stock in the respective portfolios. \n\n***Income taxes:***Income taxes are accounted for under the asset and liability method. Deferred tax assets and liabilities \nare recognized for the future tax consequences attributable to differences between financial statement carrying amounts \nof existing assets and liabilities and their respective tax bases. Deferred tax assets and liabilities are measured using \nenacted tax rates expected to apply to taxable income in the years in which those temporary differences are expected to be \nrecovered or settled. The effect on deferred tax assets and liabilities of a change in tax rates is recognized in income in \nthe period that includes the enactment date. The Company evaluates the recoverability of tax assets generated on a \nstate-by-state basis from net operating losses apportioned to that state. Management uses a more likely than not \nthreshold to make that determination and has established a valuation allowance against the deferred tax assets, in case \nthey may not be recoverable. ", + "page_start": 21, + "page_end": 21, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "The Company maintains a nonqualified deferred retirement plan for certain key \nemployees. The plan allows participants to defer, on a pre-tax basis, a portion of their \nsalary and bonus and accumulate tax deferred earnings, plus investment earnings on \nthe deferred balances, as a retirement fund. Participants receive a Company match of \nup to 4% of salary, net of any Company match received under the Company’s 401(k) \nplan. All employee deferrals vest immediately. The Company matching contributions \nvest ratably over a three-year period. The Company recorded charges for matching \ncontributions of $1 million in 2004, $2 million in 2003 and $1 million in 2002. ", + "page_start": 72, + "page_end": 72, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "The Plan provides for grants of fully paid ordinary shares in the capital of the Company up to a value determined by the Board which, to date, \nhas been $1,000 per annum per eligible employee. A trustee is funded by the Santos Group to acquire shares directly from the Company or on \nmarket. The shares are then held by the trustee on behalf of eligible employees who have made applications under the Plan. \n\nThe employee’s ownership of shares allocated under the Plan, and his or her right to deal with them, are subject to restrictions until the earlier \nof the expiration of the restriction period determined by the Board (being three years) and the time when he or she ceases to be an employee. \nParticipants are entitled to instruct the trustee as to the exercise of voting rights, receive dividends and participate in bonus and rights issues \nduring the restriction period. Shares are granted to eligible employees at no cost to the employee. ", + "page_start": 63, + "page_end": 63, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**Dividends**\nIn 2013 and 2012, we declared and paid the following dividends on our \noutstanding Class A Voting and Class B Non-Voting shares: \n\n**Available-for-Sale Financial Assets Reserve**\nWe carry available-for-sale investments at fair value on the consolidated \nstatements of financial position, and record changes in fair value in the \navailable-for-sale financial assets reserve as a component of equity, \nthrough other comprehensive income, until \nthe investments are \ndisposed of or impaired, at which time we record the change in fair \nvalue in net income. \n\n**Hedging Reserve**\nWe measure all derivatives at fair value on the consolidated statements \nof financial position, and record changes in fair value of cash flow \nhedging derivatives in the fair value reserve as a component of equity \nthrough other comprehensive income, if the derivatives are effective \nand until we recognize the hedged asset or liability in net income. \n\n**Defined Benefit Pension Plans**\nOur defined benefit pension plan obligation is actuarially determined at \nthe end of the year, and we recognize remeasurements in other \ncomprehensive income and retained earnings. \n\nThe holders of Class A shares are entitled to receive dividends at the \nrate of up to five cents per share but only after dividends at the rate of \nfive cents per share have been paid or set aside on the Class B shares. \nClass A Voting and Class B Non-Voting shares therefore participate \nequally in dividends. ", + "page_start": 123, + "page_end": 123, + "source_file": "NYSE_RCI_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2538.pdf", + "query": "What metrics are good indicators of the coverage of gas molecules on carbon nanotubes ?", + "target_page": 1, + "target_passage": "the bind- ing energy and scattering resistance of the molecules", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes \n\nJ. M. Garc´ıa-Lastra1,2,∗ D. J. Mowbray1,2, K. S. Thygesen2, A. Rubio1,3, and K. W. Jacobsen2 \n1Nano-Bio Spectroscopy group and ETSF Scientific Development Centre, \nDpto. F´ısica de Materiales, Universidad del Pa´ıs Vasco, \nCentro de F´ısica de Materiales CSIC-UPV/EHU- MPC and DIPC, Av. Tolosa 72, E-20018 San Sebasti´an, Spain \n2Center for Atomic-scale Materials Design, Department of Physics, \nTechnical University of Denmark, DK-2800 Kgs. Lyngby, Denmark \n3Fritz-Haber-Institut der Max-Planck-Gesellschaft, Berlin, Germany \n\nWe use computational screening to systematically investigate the use of transition metal doped carbon nan- \notubes for chemical gas sensing. For a set of relevant target molecules (CO, NH3, H2S) and the main components \nof air (N2, O2, H2O), we calculate the binding energy and change in conductance upon adsorption on a metal \natom occupying a vacancy of a (6,6) carbon nanotube. Based on these descriptors, we identify the most promis- \ning dopant candidates for detection of a given target molecule. From the fractional coverage of the metal sites \nin thermal equilibrium with air, we estimate the change in the nanotube resistance per doping site as a function \nof the target molecule concentration assuming charge transport in the diffusive regime. Our analysis points to \nNi-doped nanotubes as candidates for CO sensors working under typical atmospheric conditions. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2538.pdf" + }, + { + "text": "In summary, we have presented a general model of nanos- \ntructured chemical sensors which takes the adsorption en- \nergies of the relevant chemical species and their individual \nscattering resistances as the only input. On the basis of this \nmodel we have performed a computational screening of tran- \nsition metal doped CNTs, and found that Ni-doped CNTs are \npromising candidates for detecting CO in a background of air. \nThe model may be applied straightforwardly to other nanos- \ntructures than CNTs, other functionalizations than metal dop- \ning and other gas compositions than air. \n\n[14] S. B. Fagan, R. Mota, A. J. R. da Silva, and A. Fazzio, “Ab \ninitio study of an iron atom interacting with single-wall car- \nbon nanotubes”, Phys. Rev. B 67(20), 205414 (May 2003), \ndoi:10.1103/PhysRevB.67.205414. \n\n[15] Y. Yagi, T. M. Briere, M. H. F. Sluiter, V. Kumar, A. A. Farajian, \nand Y. Kawazoe, “Stable geometries and magnetic properties of \nsingle-walled carbon nanotubes doped with 3d transition met- \nals: A first-principles study”, Phys. Rev. B 69(7), 075414 (Feb \n2004), doi:10.1103/PhysRevB.69.075414. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "∗ Electronic address: juanmaria.garcia@ehu.es [18] C. S. Yeung, L. V. Liu, and Y. A. Wang, \n\n“Adsorption \nof small gas molecules onto Pt-doped single-walled carbon \nJ. Phys. Chem. C 112(19), 7401 (Apr. 2008), \nnanotubes”, \ndoi:10.1021/jp0753981. \n[1] Gas Sensing Materials, MRS Bull., vol. 24 (1999). \n[2] J. C. Chalier, X. Blase, and S. Roche, “Electronic and transport \nproperties of nanotubes”, Rev. Mod. Phys. 79(2), 677 (May \n2007), doi:10.1103/RevModPhys.79.677. [19] T. Vo, Y.-D. Wu, R. Car, and M. Robert, \n\n“Structures, in- \nteractions, and ferromagnetism of Fe-carbon nanotube sys- \nJ. Phys. Chem. C 112(22), 400 (May 2008), \ntems”, \ndoi:10.1021/jp0761968. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "In thermodynamic equilibrium [27], the coverage of the ac- \ntive sites follows from \n\nK[X]C[X] \nΘ[X] = , (4) \n1 + (cid:80) \nY K[Y ]C[Y ] \n\nwhere K = k+/k− is the ratio of forward and backward rate \nconstants for the adsorption reaction, \n\n(cid:20) (cid:21) \n\nEads[X] + T S[X] \nkBT \n\nThe adsorption energies for N2, O2, H2O, CO, NH3, and \nH2S on the metallic site of the doped (6,6) CNTs are shown in \nFig. 2(a). The adsorption energy of a molecule X is defined \nby \n\nK[X] = exp − . (5) \n\nIn these expressions C[X] is the concentration of species X, \nS[X] is its gas phase entropy and T is the temperature. Ex- \nperimental values for the gas phase entropies have been taken \nfrom Ref. [28]. Eads[X@M@VC] = E[X@M@VC] − E[X] − E[M@VC], \n(3) ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2538.pdf" + }, + { + "text": "[21] A. V. Krasheninnikov, P. O. Lehtinen, A. S. Foster, \nP. Pyykk¨o, and R. M. Nieminen, \n“Embedding transition- \nmetal atoms in graphene: Structure, bonding, and mag- \nPhys. Rev. Lett. 102(12), 126807 (Mar. 2009), \nnetism”, \ndoi:10.1103/PhysRevLett.102.126807. \n\n[5] C. Hierold, Carbon Nanotube Devices: Properties, Modeling, \nIntegration and Applications (Wiley-VCH, Weinheim, 2008). \n[6] F. Villalpando-P´aez, A. H. Romero, E. Mu˜noz-Sandoval, \nL. M. Mart´ınez, H. Terrones, and M. Terrones, \n“Fabrica- \ntion of vapor and gas sensors using films of aligned CNx \nnanotubes”, Chem. Phys. Lett. 386(1-3), 137 (Mar. 2004), \ndoi:10.1016/j.cplett.2004.01.052. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "[11] L. Valentini, F. Mercuri, I. Armentano, C. Cantalini, S. Picozzi, \nL. Lozzi, S. Santucci, A. Sgamellotti, and J. M. Kenny, “Role of \ndefects on the gas sensing properties of carbon nanotubes thin \nfilms: experiment and theory”, Chem. Phys. Lett. 387(4-6), 356 \n(Apr. 2004), doi:10.1016/j.cplett.2004.02.038. \n\n[12] Z. Zanolli and J.-C. Charlier, “Defective carbon nanotubes for \nsingle-molecule sensing”, Phys. Rev. B 80(15), 155447 (Oct. \n2009), doi:10.1103/PhysRevB.80.155447. \n\n[13] J. M. Garc´ıa-Lastra, K. S. Thygesen, M. Strange, and \n´Angel Rubio, \n“Conductance of sidewall-functionalized \ncarbon nanotubes: Universal dependence on adsorption \nPhys. Rev. Lett. 101(23), 236806 (Dec. 2008), \nsites”, \ndoi:10.1103/PhysRevLett.101.236806. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "where G(X) is the Landauer conductance of the pristine CNT \nwith a single metal dopant occupied by molecule X and \n1/(2G0) is the contact resistance of a (6,6) CNT. \n\nWe may now obtain the total resistance per dopant site rel- \native to the reference background signal as a function of the \ntarget molecule concentration \n\nFIG. 3: Fractional coverage Θ in thermal equilibrium of Ni in a (a) \nmonovacancy, (b) divacancy I, (c) divacancy II and (d) change in \nresistance ∆R per dopant site as a function of CO concentration in \na background of air at room temperature and 1 bar of pressure. The \nreference concentration of CO is taken to be C0 =0.1 ppm. Note the \nchange from linear to log scale on the y-axis at ∆R =10 Ω. \n\n(7) \n\nwhere N is the number of dopants, Θ[X, C] is the fractional \ncoverage of species X at concentration C of the target and C0 \nis the reference concentration. Notice that the contact resis- \ntance drops out as we evaluate a change in resistance. ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2538.pdf" + }, + { + "text": "FIG. 2: Calculated (a) adsorption energy Eads in eV and (b) change in \nconductance ∆G in units of G0 =2e2/h for N2, O2, H2O, CO, NH3, \nand H2S on 3d transition metals occupying a monovacancy (top), \ndivacancy I (middle), and divacancy II (bottom) in a (6,6) carbon \nnanotube. \nFIG. 1: Structural schematics and formation energy for a 3d tran- \nsition metal occupied monovacancy (black), divacancy I (gray), or \ndivacancy II (white) in a (6,6) carbon nanotube. Formation energies \nof the empty vacancies are indicated by dashed lines. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2538.pdf" + }, + { + "text": "change in CNT resistivity may then be obtained from the cal- \nculated coverages and single impurity conductances. \n\nWe find that oxidation of the active metal site passivates \nthe sensor in the case of doping by Ti, V, Cr, and Mn un- \nder standard conditions (room temperature and 1 bar of pres- \nsure). Among the remaining metals, we identify Ni as is the \nmost promising candidate for CO detection. For this system \nthe change in resistance per active site is generally significant \n(>1 Ω) for small changes in CO concentration in the relevant \nrange of around 0.1–10 ppm. Our approach is quite general \nand is directly applicable to other nanostructures than CNTs, \nother functionalizations than metal doping, and other back- \ngrounds than atmospheric air. \n\nAll total energy calculations and structure optimizations \nhave been performed with the real-space density functional \ntheory (DFT) code GPAW [22] which is based on the projector \naugmented wave method. We use a grid spacing of 0.2 ˚A for \nrepresenting the density and wave functions and the PBE ex- \nchange correlation functional [23]. Transport calculations for \nthe optimized structures have been performed using the non- \nequilibrium Green’s function method [24] with an electronic \nHamiltonian obtained from the SIESTA code [25] in a dou- \nble zeta polarized (DZP) basis set. Spin polarization has been \ntaken into account in all calculations. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2538.pdf" + }, + { + "text": "[8] S. Brahim, S. Colbern, R. Gump, and L. Grigorian, “Tailoring \nJ. Appl. Phys. \ngas sensing properties of carbon nanotubes”, \n104(2), 024502 (Jul. 2008), doi:10.1063/1.2956395. \n[9] C. Morgan, Z. Alemipour, and M. Baxendale, \n\n“Variable \nrange hopping in oxygen-exposed single-wall carbon nanotube \nnetworks”, Phys. Stat. Solidi A 205(6), 1394 (May 2008), \ndoi:10.1002/pssa.200778113. \n\nTo our knowledge, controlled doping of CNTs with transi- \ntion metal atoms has so far not been achieved. It has, how- \never, been found that metal atoms incorporated into the CNT \nlattice during catalytic growth are afterwards very difficult to \nremove [30]. Furthermore, it has been shown that CNT vacan- \ncies, which are needed for the metallic doping, may be formed \nin a controlled way by irradiation by Ar ions [31]. This sug- \ngests that metallic doping of CNTs should be possible. \n\n[10] D. J. Mowbray, C. Morgan, and K. S. Thygesen, \n\n“In- \nfluence of O2 and N2 on the conductivity of carbon nan- \notube networks”, Phys. Rev. B 79(19), 195431 (May 2009), \ndoi:10.1103/PhysRevB.79.195431. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2648.pdf", + "query": "What is the source of inaccuracy of the MSA3 model at high ionic concentrations ?", + "target_page": 3, + "target_passage": "At high concentration (about 1 mol l−1), the MSA3 overestimates the free energy", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "To conclude, we have combined MD simulations with \nLPT to construct simple models of electrolyte solutions \nwhich account for the molecular nature of the solvent. \nThe final result is fully analytical and it yields the ther- \nmodynamic and structural properties of the solution, in \nagreement with the original molecular description. The \nmethodology can in principle be adapted to any molecu- \nlar description of the system (MD simulations involving \ninteraction potentials accounting for polarization effects \nor Car-Parrinello MD simulations for example) as long \nas the ion-ion RDF are known. It can also be generalized \nto study interfaces. The method appears to be a promis- \ning approach toward the description of the specific effects \nof ions, especially for complex systems whose modeling \nrequires an analytic solution. \n\n8 \n\nFIG. 5: (Color online) RDF obtained from MC simulations \n(diamond), BIMSA3 (solid line), and MSA-fit (dot dashed) \nat two concentrations. \n\nThe RDF obtained within BIMSA3 are compared with \nthe MC and MSA-fit results in Fig. 5. Our BIMSA3 \nmodel accounts for the strong molecular peak of the CIP \nand provides the correct distances of minimal approach; \nwhereas the naive MSA-fit procedure ignores the former \nand gives poor estimates for the latter. At larger sep- \narations, the BIMSA3 results do not reproduce the os- \ncillations observed in the MC simulations, but the cor- \nresponding energy oscillations in the effective potentials \nIn addition, the perturbation term \nare less than kBT . ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2648.pdf" + }, + { + "text": "4 \n\nof the BIMSA3 appears to be negligible compared to the \n1. The \nreference term for concentrations less than 1 mol l− \nperturbation can then be omitted to obtain a fully ana- \nlytical theory, determined by the hard sphere diameters \nand the pair fraction given by LPT; with the free energy \nand the RDF given in terms of the BIMSA and MSA so- \nlutions, as described above. While the procedure we have \nfollowed uses two different approximations for the refer- \nence and perturbation terms (MSA vs BIMSA), these are \nknown to be accurate for the systems under consideration \nand do not appear to be inconsistent with each other. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2648.pdf" + }, + { + "text": "We first used LPT for a two-component system (Na+ \nand Cl− free ions) within the MSA (model MSA2), for \n1. The mini- \nconcentrations ranging from 0.1 to 2.0 mol l− \nmization leads to almost constant diameters on the whole \nrange of concentration: σ1 = 3.67 ˚A and σ2 = 4.78 ˚A. \nAs shown in Fig. 2, these parameters yield osmotic co- \nefficients close to MC calculations only at very low con- \n1 (experimental values are \ncentration, i.e., c ≤ 0.1 mol l− \ngiven for indicative purposes only, since a perfect model \nwill exactly match the MC results). For molar solutions, \nthe LPT results differ considerably from MC calculations. \nThis discrepancy can easily be understood by comparing \nthe diameters found within the MSA2 calculation with \nthe effective potentials given in Fig. 1. The anion/cation \ncontact distance obtained within the MSA2 calculation \nis 4.2 ˚A, which is in the region of the second minimum of \nthe effective potential and corresponds to the situation \nwhere there is a single layer of water molecules between \nthe ions. The first minimum of the potential, which cor- \nresponds to the contact ion pair (CIP) is thus completely \nignored by the MSA2 calculation. If the MSA diameters \nare directly fitted to reproduce the MC osmotic pres- \nsure, much smaller values are obtained. These MSA-fit \nhydrated diameters, which are compared to the MSA2 \ndiameters in the bottom part of Fig. 2, are averages of \nthe CIP and the solvent-separated ion pair. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2648.pdf" + }, + { + "text": "0 \n1 \n0 \n2 \n\nn \na \nJ \n\n5 \n1 \n\nSince the pioneering works of Debye, H¨uckel, and \nOnsager, electrolyte solutions have been commonly \ndescribed by continuous solvent models, \nfor which \nthe McMillan-Mayer theory [1] provides a rigorous \nstatistical-mechanical foundation. Within that level of \ndescription, simple phenomenological models such as the \nprimitive model (PM), for which the ions are assimi- \nlated to charged hard spheres [2], can lead to explicit \nformulas for the thermodynamic and structural proper- \nties (e.g., with the help of the mean spherical approxima- \ntion (MSA) [3] or the binding MSA (BIMSA) [4]). These \nmodels are the most practical to use [5], since they allow \nfor a direct link between the experimental measurements \nand the microscopic parameters of the system. Never- \ntheless, they ignore the molecular structure of the sol- \nvent. Consequently, they cannot properly account for \nthe complex specific effects of the ions, which appear in \nnumerous biological, chemical, and physical interfacial \nphenomena [6, 7], without further developments. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2648.pdf" + }, + { + "text": "molecular dynamics (MD) results. Different approxima- \ntions of the PM are employed for the case of NaCl elec- \ntrolyte solutions: a two component model (MSA2), that \nonly takes free ions into account, and two different three \ncomponent models (MSA3 and BIMSA3), which include \na third species (the contact ion pair). As we proceed \nto show, LPT allows us to select the best simple model \nwhich accurately accounts for the thermodynamics and \nthe physical-chemistry of the system. \n\nThe first stage consists in calculating the McMillan- \nMayer effective ion-ion interaction potentials V eff \nij (r), by \ninverting the radial distribution functions (RDF) gij(r) \nobtained by MD. The simulations were carried out on \na box of 2000 water molecules and 48 NaCl pairs us- \ning the same interaction potentials as in reference [16]. \n1. \nThis setup corresponds to a concentration of 0.64 mol l− \nNPT ensemble sampling at standard pressure and tem- \nperature was enforced, with a time step of 1 fs and a \npressure bath coupling constant of 1 ps. An equilibration \nrun of 0.25 ns was followed by a production run of 0.6 ns \nfor five different initial configurations. The averages of \nthe resulting RDF were then used for the potential inver- \nsion via the HNC closure [15]. These effective potentials \nare assumed to be concentration independent and will be \nused for simulations at all concentrations. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl \nsolutions \n\nJohn Jairo Molina1,2,3,∗ Jean-Fran¸cois Dufrˆeche1,2,3,† Mathieu \nSalanne1,2, Olivier Bernard1,2, Marie Jardat1,2, and Pierre Turq1,2 \n1 UPMC-Universit´e Paris 06, UMR 7195, PECSA, F-75005 Paris, France \n2 CNRS, UMR 7195, PECSA, F-75005 Paris, France \n3 Institut de Chimie S´eparative de Marcoule (ICSM), \nUMR 5257 CEA–CNRS–Universit´e Montpellier 2, Site de Marcoule, \nBˆatiment 426, BP 17171, 30207 Bagnols-sur-C`eze Cedex, France \n\nWe present a method to derive implicit solvent models of electrolyte solutions from all-atom \ndescriptions; providing analytical expressions of the thermodynamic and structural properties of \nthe ions consistent with the underlying explicit solvent representation. Effective potentials between \nions in solution are calculated to perform perturbation theory calculations, in order to derive the \nbest possible description in terms of charged hard spheres. Applying this method to NaCl solutions \nyields excellent agreement with the all-atom model, provided ion association is taken into account. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2648.pdf" + }, + { + "text": "To overcome this difficulty, we have explicitly intro- \nduced the CIP in our model (species 3). Straightforward \ncalculations, based on a characteristic-function formal- \nism, allow us to define an equivalent model in which \nthe free ions and the CIP are explicitly taken into ac- \ncount [19, 20]. We apply this formalism by defining a \npair as an anion and a cation at a distance less than \n4 ˚A, which corresponds to the position of the effective \npotential maximum. The interaction between free, like \ncharges in this new system remains unchanged, and the \ncation-anion interactions are easily approximated by ex- ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2648.pdf" + }, + { + "text": "trapolating the original potential at the barrier separat- \ning pairs from free ions (as shown in Fig. 3). We assume \nthat the interaction potential is averaged over the rota- \ntional degrees of freedom of the CIP and thus pairwise \nadditive. Hereafter, the quantities referring to such a \nthree-component model are written with a tilda symbol. \nThe short-range potentials involving the pair can be de- \nrived, in the infinite dilution limit, from an average of \nthe contributing ion interactions. In Fourier space, ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2648.pdf" + }, + { + "text": "0 0.5 \n1/2 \nc \n\n(Color online) Excess free-energy density βf ex \nv \n\nFIG. 4: \nas \na function of the square root of the concentration √c. (dia- \nmond) MC simulations, (dot dashed) MSA2, (dashed) MSA3, \n(solid) BIMSA3, (dot) DHLL, and (cross) experiments. The \ninset gives the fraction of pairs (MSA3, BIMSA3) as a func- \ntion of √c. ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2648.pdf" + }, + { + "text": "5 \n) \nÅ \n4 \n( \nσ \n3 \n\n0 8 \nr (Å) \n\nFIG. 1: Effective McMillan-Mayer short-range pair potentials \nextracted from explicit solvent simulations using the HNC \nclosure. (a) Cation anion, (b) cation cation, (c) anion anion, \n(d) cation anion RDF obtained from explicit solvent MD and \nimplicit solvent MC simulations. \nFIG. 2: \n(Color online) (a) Osmotic coefficient Φ in the \nMcMillan-Mayer frame of reference. (diamond) MC simula- \ntions, (dot dashed) MSA2, (dot) Debye H¨uckel Limiting law \n(DHLL), (cross) experiments (Ref. [18] with the McMillan- \nMayer to Lewis Randall conversion). (b) Minimization diam- \neters. (dot dashed) MSA2 and (diamond) MSA-fit. \n\npute all ion thermodynamic properties through implicit \nsolvent MC simulations. \n\nThe second stage of our coarse-graining procedure con- \nsists in applying LPT, in order to deduce the best ana- \nlytical model of electrolyte solutions which reproduces \nthis molecular description. The principle of LPT is to \ndescribe the properties of a given system in terms of \nthose of a well known reference system, with the differ- \nence between them treated as a perturbation in the ref- \nerence potential. Assuming pairwise additive potentials, \nVij = V (0) \nij + ∆Vij , a first-order truncated expression for \nthe free energy density of the system βfv is obtained, \n\n1 \n2 \nXi,j ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2648.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20210582_en.pdf", + "query": "In the health regulation regarding coronavirus, what is considered a \"device\" ?", + "target_page": 3, + "target_passage": "means an in vitro diagnostic medical device within the meaning given in regulation 2(1) of the Medical Devices Regulations 2002", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "(iii) a limit of detection of less than or equal to 1000 SARS-CoV-2 copies per millilitre, \nand \n\n(iv) uses an established molecular detection method; \n\n(c) any device used for the purposes of the test— \n\n(i) can be put into service in accordance with Part 4 of the Medical Devices Regulations \n\n2002, other than solely by virtue of regulation 39(2) of those Regulations, \n\n(ii) has been validated no more than 18 months before the test is administered or \nprovided to P; \n\n(d) it is not a test provided or administered under the National Health Service Act 2006, the \nNational Health Service (Wales) Act 2006(**a**), the National Health Service (Scotland) Act \n1978(**b**), or the Health and Personal Social Services (Northern Ireland) Order 1972(**c**); \nand \n\n(e) the test provider complies with paragraph 3. \n\n(2) For the purposes of sub-paragraph (1), “validated”, in relation to a device, means confirmed \nas having the required sensitivity and specificity using at least 150 positive clinical samples and \n250 negative clinical samples against a laboratory-based RT-PCR test that is itself within the \nperformance specification of the target product profile published by the Medicines and Healthcare \nProducts Regulatory Agency for laboratory based SARS-CoV-2 PCR tests, by— \n\n(a) the Secretary of State; \n(b) a laboratory which is accredited to ISO standard 15189 or ISO/IEC standard 17025(**d**) \n\nby— \n(i) the United Kingdom Accreditation Service(**e**) (“UKAS”), or \n(ii) an accreditation body that is a signatory to the International Laboratory Accreditation \nCooperation (“ILAC”) Mutual Recognition Arrangement(**f**) or the European co- \noperation for Accreditation (“EA”) Multilateral Agreement(**g**), \n\nother than a laboratory which processes tests provided by the test provider for the \npurposes of this Schedule or is owned by the test provider or the device manufacturer. \n(**h**); or \n\n(c) a laboratory which is accredited by UKAS to ISO standard 15189 or ISO/IEC standard \n17025(**i**), other than a laboratory which processes tests provided by the test provider for \nthe purposes of this Schedule or is owned by the test provider or the device manufacturer. ", + "page_start": 68, + "page_end": 68, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus, \nPublic Health Information for International Passengers) (England) Regulations 2020 and the \nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) \n(Amendment) Regulations 2021. \n\nThey impose requirements on certain categories of person to provide information upon arrival in \nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the \nspread of infection or contamination from coronavirus or coronavirus disease. They also impose \nobligations on operators to ensure that passengers receive information and comply with the \nrequirements. \n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum \nhas been published alongside this instrument at www.legislation.gov.uk. ", + "page_start": 90, + "page_end": 90, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**2.**—(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations \n2020(**a**) are amended as follows. \n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International \nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection \n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”. \n\n(3) In regulation 6(1)— \n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating \nworker”, for “regulation 4” substitute “regulation 9”; \n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) \nRegulations 2021”. ", + "page_start": 88, + "page_end": 88, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**27.**In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”. \n\n**Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n**Recommendations Power) Regulations 2017**\n\n**28.**The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) \n\nRegulations 2017(**a**) are amended as follows. \n\n**29.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**30.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \ntime or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and \n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”. ", + "page_start": 4, + "page_end": 4, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "PART 1 \n\nIntroductory \n\n**Citation, commencement, extent and application**\n\n**1.**—(1) These Regulations may be cited as the Health Protection (Coronavirus, International \n\nTravel and Operator Liability) (England) Regulations 2021. \n\n(2) These Regulations come into force at 4.00 a.m. on 17th May 2021. \n(3) These Regulations extend to England and Wales and apply in relation to England only. ", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "SCHEDULE 7 Regulation 4 \n\nTesting before arrival in England \n\n**Compliant tests**\n\n**1.**A test complies with this paragraph if— \n\n(a) it is a test for the detection of coronavirus undertaken using a device which the \n\nmanufacturer states has— ", + "page_start": 55, + "page_end": 55, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "time or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 15(2) (transfer of EHC plans) (in relation to the second reference to 15 \nworking days), (4), (5), (7) (in relation to the second reference to 15 working days) \nand (8); \n\n(b) regulation 16(2) and (3) (change of responsible commissioning body); \n\n(c) regulation 20(9) and (10) (review where the child or young person attends a school \n\nor other institution); \n\n(d) regulation 21(7), (8) and (9) (review of EHC plan where the child or young person \n\ndoes not attend a school or other institution); \n\n(e) regulation 25(1) (notification of decision whether it is necessary to re-assess ", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "**19.**In regulation 2(1) (interpretation), at the appropriate place insert— \n\n\n \n \n \n \n [html]\n
Therapeutic and the participants with to expression
2A —( 1 ) Where the consuctive exception applies, any requirement in any of the regulations specified in paragraph ( 3 ) for action to be takes within a specified period of time or by a certain day is to be read instead as a requirement for such ac
( 2 ) The coronavimus exception apples where it is not reasonably practicable for a person to meet a requirement referred to in paragraph ( 1 ) for a reason relating to the incidence or transmission of coronavirus.
( 3 ) The following regulations are specified for the purposes of paragraphs ( 1 ) and ( 2 )—
( a ) regulation 15 ( 1 ) and ( 4 ) ( needs assessments which are not completed );
( b ) regulation 16 ( 2 ), ( 3 ) and ( 4 ) ( transfer of a kept EHC plan );
( c ) regulation I7 ( 1 ) and ( 2 ) ( restriction on disclosure of EHC plans );
( d ) regulation 19 ( requirement to consider mediation );
( e ) regulation 20 ( 1 ) and ( 2 ) ( where the appropriate person does not wish to or fails to pursue mediation );
( f ) regulation 21 ( mediation );
( g ) regulation 24 ( 1 ) and ( 3 ) ( mediation certificate under section 55 ( 5 ) of the Act );
( h ) regulation 27 ( 3 ) ( steps to be taken by a home authority );
( i ) regulation 29 ( 2 ) and ( 6 ) ( compliance with the orders of the First - tier Tribunal ); and
( j ) regulation 30 ( 3 ) and ( 6 ) ( unopposed appeals ).*.
21. In regulation 4 ( determination whether or not special educational provision may be necessary ), after paragraph ( 2 ) insert —
“( 3 ) The local authority need not comply with the time limit referred to in paragraph ( 1 ) if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus.”
22. In regulation 5 ( 4 ) ( decision whether or not to conduct a detained person ’ s EHC needs assessment )—
( a ) at the end of sub - paragraph ( b ) omit “ or ”; and
( b ) at the end of sub - paragraph ( c ) insert —
“, or
( d ) of a reason relating to the incidence or transmission of coronavirus *.
", + "page_start": 3, + "page_end": 3, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "(3) For the purposes of sub-paragraph (1)(d) and (e), a person or laboratory (as the case may be) \nmeets the relevant requirements for accreditation to a standard where the person who is the \noperator of the laboratory complies with the requirements of regulation 6 of the Health Protection \n(Coronavirus, Testing Requirements and Standards) (England) Regulations 2020 as if— \n\n(a) a reference to an applicable test were a reference to a day 2 test; \n(b) a reference to a test provider were a reference to a private provider. ", + "page_start": 62, + "page_end": 62, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**Citation and commencement**\n\n**1.**These Regulations may be cited as the Special Educational Needs and Disability \n\n(Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020. \n\n**Review and expiry**\n\n**2.**—(1) The Secretary of State must review the effectiveness of these Regulations during the \nperiod for which they have effect. \n\n(2) These Regulations cease to have effect on 25th September 2020. \n\n**Amendment of the Special Educational Needs and Disability Regulations 2014**\n\n**3.**The Special Educational Needs and Disability Regulations 2014(**c**) are amended as follows. \n\n**4.**In regulation 2(1) (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**5.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of ", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200471_en.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20210582_en.pdf", + "query": "Regarding the regulation of Enforcement of requirement to self-isolate concerning travel and coronavirus, who are considered an \"authorised persons\" ?", + "target_page": 19, + "target_passage": "For the purposes of this regulation, “authorised person” means— (a) a constable; (b) for the purposes of paragraphs (2) and (3) only, an immigration officer; or (c) a person designated by the Secretary of State for the purposes of this regulation.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**2.**—(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations \n2020(**a**) are amended as follows. \n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International \nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection \n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”. \n\n(3) In regulation 6(1)— \n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating \nworker”, for “regulation 4” substitute “regulation 9”; \n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) \nRegulations 2021”. ", + "page_start": 88, + "page_end": 88, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "PART 1 \n\nIntroductory \n\n**Citation, commencement, extent and application**\n\n**1.**—(1) These Regulations may be cited as the Health Protection (Coronavirus, International \n\nTravel and Operator Liability) (England) Regulations 2021. \n\n(2) These Regulations come into force at 4.00 a.m. on 17th May 2021. \n(3) These Regulations extend to England and Wales and apply in relation to England only. ", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus, \nPublic Health Information for International Passengers) (England) Regulations 2020 and the \nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) \n(Amendment) Regulations 2021. \n\nThey impose requirements on certain categories of person to provide information upon arrival in \nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the \nspread of infection or contamination from coronavirus or coronavirus disease. They also impose \nobligations on operators to ensure that passengers receive information and comply with the \nrequirements. \n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum \nhas been published alongside this instrument at www.legislation.gov.uk. ", + "page_start": 90, + "page_end": 90, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "PART 3 \n\nEnforcement \n\n**Enforcement of requirement to self-isolate**\n\n**11.**—(1) Where an authorised person has reasonable grounds to believe that a person (“P”) has \nleft, or is outside of, the place where P is self-isolating in contravention of regulation 9, Schedule \n8 or Schedule 11, the authorised person may— \n\n(a) direct P to return to the place where P is self-isolating; \n\n(b) where the authorised person is a constable, remove P to the place where P is self- \nisolating; \n\n(c) where the authorised person is a constable and it is not practicable or appropriate in the \ncircumstances to take the action in sub-paragraph (a) or (b), remove P to accommodation \nfacilitated by the Secretary of State for the purposes of P’s self-isolation. \n\n(2) Where an authorised person has reasonable grounds to believe that P is a Schedule 11 \npassenger, an authorised person may do any of the following for the purpose of ensuring that P \ncomplies with the requirements in Schedule 11— \n\n(a) give a direction to P, including a direction— \n\n(i) that P remain in a particular area of a port to await transportation to accommodation \n\ndesignated for the purposes of Schedule 11, \n\n(ii) that P move to a particular place to board transportation designated for the purposes \n\nof Schedule 11, \n\n(iii) that P board transportation designated for the purposes of Schedule 11 to travel to \naccommodation designated for the purposes of Schedule 11, \n\n(iv) that P remain in the place where P is self-isolating; \n\n(b) remove P to accommodation designated for the purposes of Schedule 11. \n\n(3) Where an authorised person has reasonable grounds to believe that P is a Schedule 11 \npassenger and that P has committed an offence under regulation 19(1)(a) or (6), the authorised \nperson may— \n\n(a) require P to produce their passport or travel document for examination; \n(b) detain P for up to three hours; \n(c) search P and any baggage belonging to P or under P’s control, or any vehicle in which P \nhas travelled, for evidence, other than items subject to legal privilege, that relates to the \npossible commission of an offence under regulation 19(6); and \n\n(d) seize and retain any document or article recovered by a search under sub-paragraph (c). \n\n(4) Paragraph (3) does not confer a power— \n\n(a) to detain or search an unaccompanied child; or \n(b) to conduct an intimate search. \n\n(5) Any search under paragraph (3) must be conducted by an authorised person of the same \n\ngender as P. \n\n(6) Paragraphs (1)(b) and (c), (2) and (3) do not apply where P is a person described in \nparagraph 1 of Schedule 4 (diplomats, members of international organisations etc). \n\n(7) An authorised person exercising the power in paragraph (1)(b) or (c), (2)(b) or (3) may use \n\nreasonable force, if necessary, in the exercise of the power. \n\n(8) Where P is a child, and has left or is outside of, the place where they are self-isolating and is \naccompanied by an individual who has responsibility for them— \n\n(a) an authorised person may direct that individual to take P to the place where P is self- \n\nisolating; and \n\n(b) that individual must, so far as reasonably practicable, ensure that P complies with any \n\ndirection given by an authorised person to P. \n\n(9) Where P is a child, and an authorised person has reasonable grounds to believe that P is \nrepeatedly failing to comply with regulation 9 or Schedule 11, the authorised person may direct \nany individual who has responsibility for P to ensure, so far as reasonably practicable, that P so \ncomplies. \n\n(10) An authorised person may only exercise a power in paragraph (1), (2), (8) or (9) if the \nauthorised person considers that it is a necessary and proportionate means of ensuring compliance \nwith regulation 9 or Schedule 11. ", + "page_start": 16, + "page_end": 16, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
“ passenger information ” has the meaning given in regulation 3 ( 1 );
“ Passenger Locator Form ” means the form published electronically by the Secretury of State for the provision of passenger information ( a );
“ port ”, except where the context otherwise requires, means —
( a ) any port ( including a seaport, airport or heliport ), or
( b ) a place which is an authorised terminal control point for international services for the purposes of sections 11 and 12 of the Channel Tumel Act 1987 / by ;
“ qualifying test ” means a test that is a qualifying test for the purposes of regulation 4 ;
“ relevant service ” means a commercial transport service carrying passengers travelling to England from outside the common travel area, other than a shuttle service ;
“ Schedule 11 passenger ” means a passenger to whom Schedule 11 ( additional measures applicable to arrivals from category 3 countries or territories ) applies ;
“ self - isolate ” has the meaning given in regulation 9 ( 2 ), and “ self - isolation ” and “ self - isolating ” are to be construed accordingly.
“ the Self - Isolation Regulations ” means the Health Protection ( Coronavirus, Restrictions ) ( Self - Isolation ) ( England ) Regulations 20206 ( t )
“ sensitivity ”, in relation to a device, means how often the device correctly generates a positive result ;
“ shuttle service ” has the meaning given in section 1 ( 9 ) of the Channel Tumnel Act 1987 ;
“ specificity ”, in relation to a device, means how often the device correctly generates a negative result ;
“ tunnel system ” has the meaning given in section 1 ( 7 ) of the Channel Tumnel Act 1987.
r2 ) For the purposes of these Regulations, an individual has responsibility for a child if the dividual —
( a ) has custody or charge of the child for the time being, or
( b ) has parental responsibility for the child within the meaning given in section 3 of the Children Act 1989 / d ).
( 3 ) For the purposes of these Regulations, a person (? P ) is not treated as departing from or unsing through a country or tertions, or part of a country or territory, if P artives in and leaves at country, territory of part thereof by air, rail o
( a ) remains on the aircraft or vessel upon which P arrived and no other passenger is permitted to be taken on board ; or
( b ) remains on the train upon which P arrived and no other passenger is permitted to be taken on bourd the carriage in which P is travelling : or
( c ) is kept separated from passengers who did not arrive on the same aircraft, train or vessel as P, and no such passengers are permitted to be taken on board the aircraft, train or vessel on which P leaves that country, termitted to be taken or
", + "page_start": 3, + "page_end": 3, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "If you want to shorten your self-isolation period you will need to take another test for international \narrivals from amber list countries, territories or regions. For more information, go to \nhttps://www.gov.uk/guidance/coronavirus-covid-19-test-to-release-for-international-travel. \n\n(4) The test provider must, on request, provide a constable or any other person employed in or \nfor the purposes of any police force, with— \n\n(a) P’s passport number, or travel document reference number (as appropriate); \n(b) P’s test result; \n(c) the date on which P undertook the test; \n(d) the date on which the test result was notified or made available to P or X in accordance \n\nwith sub-paragraphs (2) and (3). \n\n(5) Where— \n\n(a) regulation 4 or 4A of the Health Protection (Notification) Regulations 2010(**a**) applies in \nrelation to the test provider; or \n\n(b) if the test provider arranges with another person (“X”) for X to carry out any element of \nthe single end-to-end testing service on their behalf, either of those regulations applies to \nX in the carrying out of that element, ", + "page_start": 72, + "page_end": 72, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "PART 3 \n\nRelevant websites \n\n**1.**The following are “the relevant websites” for the purposes of regulation 14— \n\nhttps://www.gov.uk/government/publications/coronavirus-covid-19-travellers-exempt-from-uk- \nborder-rules/coronavirus-covid-19-travellers-exempt-from-uk-border-rules \n\nhttps://www.gov.uk/guidance/booking-and-staying-in-a-quarantine-hotel-when-you-arrive-in- \nengland \n\nhttps://www.gov.uk/guidance/coronavirus-covid-19-testing-for-people-travelling-to-england \n\nhttp://www.gov.uk/travel-quarantine-and-testing \n\nhttps://www.gov.uk/guidance/red-amber-and-green-list-rules-for-entering-england ", + "page_start": 82, + "page_end": 82, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "SCHEDULE 16 Regulation 26(3) \n\nTransitional provision \n\n**1.**Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to \nregulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations \n2020 (“the 2020 Regulations”) in advance of arrival in England is treated as passenger information \nprovided for the purposes of these Regulations where the person arrives in England on or after that \ndate. \n\n**2.**Confirmation given by the Foreign, Commonwealth and Development Office that a person is \nnot required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that \nthe person is not required to comply with regulation 6 of these Regulations where the person \narrives in England on or after 4.00 a.m. on 17th May 2021. \n\n**3.**A designation by the Secretary of State of a person as an authorised person under regulation \n5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person \nunder of regulation 11(11)(c) of these Regulations. \n\n**4.**Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who \nexercises the powers in that regulation in relation to a person who arrived in England before 4.00 \na.m. on 17th May 2021. ", + "page_start": 88, + "page_end": 88, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "(3) For the purposes of sub-paragraph (1)(d) and (e), a person or laboratory (as the case may be) \nmeets the relevant requirements for accreditation to a standard where the person who is the \noperator of the laboratory complies with the requirements of regulation 6 of the Health Protection \n(Coronavirus, Testing Requirements and Standards) (England) Regulations 2020 as if— \n\n(a) a reference to an applicable test were a reference to a day 2 test; \n(b) a reference to a test provider were a reference to a private provider. ", + "page_start": 62, + "page_end": 62, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "(2) The coronavirus exception applies where it is not reasonably practicable for the local \nauthority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the \nincidence or transmission of coronavirus.”. \n\n**Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations**\n**2015**\n\n**18.**The Special Educational Needs and Disability (Detained Persons) Regulations 2015(**a**) are \n\namended as follows. ", + "page_start": 3, + "page_end": 3, + "source_file": "uksi_20200471_en.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20210582_en.pdf", + "query": "What is the expiracy date of the regulation regarding travel during the coronavirus pandemic made in 2021 ?", + "target_page": 31, + "target_passage": "These Regulations expire at the end of 16th May 2022.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**25.**These Regulations expire at the end of 16th May 2022. \n\n\n \n \n \n \n [html]Revocations, transitional provision consequential amendments and savings\n
26.—( 1 ) The following Regulations are revoked —
( a )
Passengers ) ( England ) Regulations 2020 ( a );
Health
Information
for International
( b )
the Health Protection ( Coronavirus, International (“ the International Travel Regulations ”)( b ); and
Travel )
( England )
Regulations 2020
", + "page_start": 30, + "page_end": 30, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus, \nPublic Health Information for International Passengers) (England) Regulations 2020 and the \nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) \n(Amendment) Regulations 2021. \n\nThey impose requirements on certain categories of person to provide information upon arrival in \nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the \nspread of infection or contamination from coronavirus or coronavirus disease. They also impose \nobligations on operators to ensure that passengers receive information and comply with the \nrequirements. \n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum \nhas been published alongside this instrument at www.legislation.gov.uk. ", + "page_start": 90, + "page_end": 90, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "PART 1 \n\nIntroductory \n\n**Citation, commencement, extent and application**\n\n**1.**—(1) These Regulations may be cited as the Health Protection (Coronavirus, International \n\nTravel and Operator Liability) (England) Regulations 2021. \n\n(2) These Regulations come into force at 4.00 a.m. on 17th May 2021. \n(3) These Regulations extend to England and Wales and apply in relation to England only. ", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**2.**—(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations \n2020(**a**) are amended as follows. \n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International \nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection \n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”. \n\n(3) In regulation 6(1)— \n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating \nworker”, for “regulation 4” substitute “regulation 9”; \n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) \nRegulations 2021”. ", + "page_start": 88, + "page_end": 88, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**1.**—(1) The Health Protection (Notification) Regulations 2010(**a**) are amended as follows. \n(2) In regulation 4(3D)(b), for “regulation 3B of the Health Protection (Coronavirus, \nInternational Travel) (England) Regulations 2020” substitute “regulation 6 of the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) Regulations \n2021”. ", + "page_start": 87, + "page_end": 87, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "(3) In regulation 4ZA— \n\n(a) in the heading, for “the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020” substitute “the Health Protection (Coronavirus, International Travel \nand Operator Liability) (England) Regulations 2021”; \n\n(b) in paragraph (1)(a), for “regulation 3B of the Health Protection (Coronavirus, \nInternational Travel) (England) Regulations 2020 (“the 2020 Regulations”)” substitute \n“regulation 6 of the Health Protection (Coronavirus, International Travel and Operator \nLiability) (England) Regulations 2021 (“the International Travel and Operator Liability \nRegulations”)”; \n\n(c) in paragraph (1)(c), for “paragraph 7(1)(f) of Schedule 2C to the 2020 Regulations” \nsubstitute “paragraph 7(1)(g) of Schedule 11 to the International Travel and Operator \nLiability Regulations”; \n\n(d) in paragraph (3), for “paragraph 7(1)(f) of Schedule 2C to the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “paragraph \n7(1)(g) of Schedule 11 to the International Travel and Operator Liability Regulations”. ", + "page_start": 88, + "page_end": 88, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**Citation and commencement**\n\n**1.**These Regulations may be cited as the Special Educational Needs and Disability \n\n(Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020. \n\n**Review and expiry**\n\n**2.**—(1) The Secretary of State must review the effectiveness of these Regulations during the \nperiod for which they have effect. \n\n(2) These Regulations cease to have effect on 25th September 2020. \n\n**Amendment of the Special Educational Needs and Disability Regulations 2014**\n\n**3.**The Special Educational Needs and Disability Regulations 2014(**c**) are amended as follows. \n\n**4.**In regulation 2(1) (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**5.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of ", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "PART 3 \n\nRelevant websites \n\n**1.**The following are “the relevant websites” for the purposes of regulation 14— \n\nhttps://www.gov.uk/government/publications/coronavirus-covid-19-travellers-exempt-from-uk- \nborder-rules/coronavirus-covid-19-travellers-exempt-from-uk-border-rules \n\nhttps://www.gov.uk/guidance/booking-and-staying-in-a-quarantine-hotel-when-you-arrive-in- \nengland \n\nhttps://www.gov.uk/guidance/coronavirus-covid-19-testing-for-people-travelling-to-england \n\nhttp://www.gov.uk/travel-quarantine-and-testing \n\nhttps://www.gov.uk/guidance/red-amber-and-green-list-rules-for-entering-england ", + "page_start": 82, + "page_end": 82, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "SCHEDULE 16 Regulation 26(3) \n\nTransitional provision \n\n**1.**Passenger information provided before 4.00 a.m. on 17th May 2021 by a person pursuant to \nregulation 3 of the Health Protection (Coronavirus, International Travel) (England) Regulations \n2020 (“the 2020 Regulations”) in advance of arrival in England is treated as passenger information \nprovided for the purposes of these Regulations where the person arrives in England on or after that \ndate. \n\n**2.**Confirmation given by the Foreign, Commonwealth and Development Office that a person is \nnot required to comply with regulation 3B of the 2020 Regulations is treated as confirmation that \nthe person is not required to comply with regulation 6 of these Regulations where the person \narrives in England on or after 4.00 a.m. on 17th May 2021. \n\n**3.**A designation by the Secretary of State of a person as an authorised person under regulation \n5(7) of the 2020 Regulations has effect as a designation of that person as an authorised person \nunder of regulation 11(11)(c) of these Regulations. \n\n**4.**Regulation 5A of the 2020 Regulations continues to have effect in relation to a constable who \nexercises the powers in that regulation in relation to a person who arrived in England before 4.00 \na.m. on 17th May 2021. ", + "page_start": 88, + "page_end": 88, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "https://www.gov.uk/provide-journey-contact-details-before-travel-uk \n\nhttps://www.gov.uk/uk-border-control \n\nhttps://www.nidirect.gov.uk/articles/coronavirus-covid-19-international-travel-advice \n\nhttps://www.gov.scot/publications/coronavirus-covid-19-international-travel-quarantine/ \n\nhttps://gov.wales/arriving-wales-overseas ", + "page_start": 83, + "page_end": 83, + "source_file": "uksi_20210582_en.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia2.pdf", + "query": "Who first suggested the notions of \"hard\" and \"easy\" problems regarding consciousness ?", + "target_page": 1, + "target_passage": "The terms \"hard problem\" and \"easy problems\" were coined by the philosopher David Chalmers", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "**Overview**\n\nCognitive scientist David Chalmers first formulated the hard problem in his paper \"Facing up to the \nproblem of consciousness\" (1995)[1] and expanded upon it in*The Conscious Mind*(1996). His works \nprovoked comment. Some, such as philosopher David Lewis and Steven Pinker, have praised Chalmers \nfor his argumentative rigour and \"impeccable clarity\".[27] Pinker later said, in 2018, \"In the end I still \nthink that the hard problem is a meaningful conceptual problem, but agree with Dennett that it is not a \nmeaningful scientific problem. No one will ever get a grant to study whether you are a zombie or whether \nthe same Captain Kirk walks on the deck of the Enterprise and the surface of Zakdorn. And I agree with \nseveral other philosophers that it may be futile to hope for a solution at all, precisely because it is a \nconceptual problem, or, more accurately, a problem with our concepts.\"[28] Daniel Dennett and Patricia \nChurchland, among others, believe that the hard problem is best seen as a collection of easy problems that \nwill be solved through further analysis of the brain and behaviour.[29][30] ", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia2.pdf" + }, + { + "text": "**Historical precedents**\n\nThe hard problem of consciousness has scholarly antecedents considerably earlier than Chalmers. \nChalmers himself notes that \"a number of thinkers in the recent and distant past\" have \"recognised the \nparticular difficulties of explaining consciousness.\"[33] He states that all his original 1996 paper \ncontributed to the discussion was \"a catchy name, a minor reformulation of philosophically familiar \npoints\".[33] \n\nAmong others, thinkers who have made arguments similar to Chalmers' formulation of the hard problem \ninclude Isaac Newton,[34] John Locke,[35] Gottfried Wilhelm Leibniz,[36][34] John Stuart Mill,[37] and \nThomas Henry Huxley.[38][34] Likewise, Asian philosophers like Dharmakirti and Guifeng Zongmi \ndiscussed the problem of how consciousness arises from unconscious matter.[34][39][40][41] ", + "page_start": 3, + "page_end": 3, + "source_file": "wikipedia2.pdf" + }, + { + "text": "**Consciousness**\n\nDavid Chalmers identified two problems in understanding the mind, which he named the \"hard\" and \n\"easy\" problems of consciousness.[381] The easy problem is understanding how the brain processes \nsignals, makes plans and controls behavior. The hard problem is explaining how this*feels*or why it \nshould feel like anything at all, assuming we are right in thinking that it truly does feel like something \n(Dennett's consciousness illusionism says this is an illusion). While human information processing is easy \nto explain, human subjective experience is difficult to explain. For example, it is easy to imagine a color- \nblind person who has learned to identify which objects in their field of view are red, but it is not clear \nwhat would be required for the person to*know what red looks like*.[382] ", + "page_start": 25, + "page_end": 25, + "source_file": "wikipedia3.pdf" + }, + { + "text": "The philosopher Thomas Metzinger likens the hard problem of consciousness to vitalism, a formerly \nwidespread view in biology which was not so much solved as abandoned.[66] Brian Jonathan Garrett has \nalso argued that the hard problem suffers from flaws analogous to those of vitalism.[67] \n\nThe philosopher Peter Hacker argues that the hard problem is misguided in that it asks how consciousness \ncan emerge from matter, whereas in fact sentience emerges from the evolution of living organisms.[68] He \nstates: \"The hard problem isn’t a hard problem at all. The really hard problems are the problems the \nscientists are dealing with. [...] The philosophical problem, like all philosophical problems, is a confusion \nin the conceptual scheme.\"[68] Hacker's critique extends beyond Chalmers and the hard problem, being \ndirected against contemporary philosophy of mind and neuroscience more broadly. Along with the \nneuroscientist Max Bennett, he has argued that most of contemporary neuroscience remains implicitly \ndualistic in its conceptualizations and is predicated on the*mereological fallacy*of ascribing psychological \nconcepts to the brain that can properly be ascribed only to the person as a whole.[69] Hacker further states \nthat \"consciousness studies\", as it exists today, is \"literally a total waste of time\" and that \"the conception \nof consciousness which they have is incoherent\".[68] ", + "page_start": 7, + "page_end": 7, + "source_file": "wikipedia2.pdf" + }, + { + "text": "Proponents of the hard problem argue that it is categorically different from the easy problems since no \nmechanistic or behavioral explanation could explain the character of an experience, not even in principle. \nEven after all the relevant functional facts are explicated, they argue, there will still remain a further \nquestion: \"why is the performance of these functions accompanied by experience?\"[1] To bolster their \ncase, proponents of the hard problem frequently turn to various philosophical thought experiments, \ninvolving philosophical zombies (which, they claim, are conceivable) or inverted qualia, or the claimed \nineffability of colour experiences, or the claimed unknowability of foreign states of consciousness, such \nas the experience of being a bat. \n\nThe terms \"hard problem\" and \"easy problems\" were \ncoined by the philosopher David Chalmers in a 1994 talk \ngiven at The Science of Consciousness conference held in \nTucson, Arizona.[4] The following year, the main talking \npoints of Chalmers' talk were published in*The Journal of*\n*Consciousness*\ngained \nsignificant attention from consciousness researchers and \nbecame the subject of a special volume of the journal,[5][6] \nwhich was later published into a book.[7] In 1996, \nChalmers published*The Conscious Mind*, a book-length \ntreatment of the hard problem, in which he elaborated on \nhis core arguments and responded to counterarguments. His \nuse of the word*easy*is \"tongue-in-cheek\".[8] As the \ncognitive psychologist Steven Pinker puts it, they are about as easy as going to Mars or curing cancer. \n\"That is, scientists more or less know what to look for, and with enough brainpower and funding, they \nwould probably crack it in this century.\"[9] \n\n*Studies*.[1] The publication \n\nChalmers on stage for an Alan Turing Year \nevent at De La Salle University, Manila, 27 \nMarch 2012 ", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia2.pdf" + }, + { + "text": "The existence of the hard problem is disputed. It has been accepted by some philosophers of mind such as \nJoseph Levine,[10] Colin McGinn,[11] and Ned Block[12] and cognitive neuroscientists such as Francisco \nVarela,[13] Giulio Tononi,[14][15] and Christof Koch.[14][15] On the other hand, its existence is denied by \nother philosophers of mind, such as Daniel Dennett,[16] Massimo Pigliucci,[17] Thomas Metzinger, \nPatricia Churchland,[18] and Keith Frankish,[19] and by cognitive neuroscientists such as Stanislas \nDehaene,[20] Bernard Baars,[21] Anil Seth,[22] and Antonio Damasio.[23] Clinical neurologist and skeptic ", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia2.pdf" + }, + { + "text": "**The \"soft-wired view\"**\n\nSome consciousness researchers have argued that the hard problem is a cultural artifact, unique to \ncontemporary Western Culture. This is similar to Type-B Materialism, but it makes the further claim that \nthe psychological facts that cause us to intuit the hard problem are not innate, but culturally conditioned. \nNotable researchers who hold this view include Anna Wierzbicka,[96] Hakwan Lau and Matthias \nMichel.[97] \n\nWierzbicka (who is a linguist) argues that the vocabulary used by consciousness researchers (including \nwords like*experience*and*consciousness*) are not universally translatable, and are \"parochially \nEnglish.\"[96] Weirzbicka calls David Chalmers out by name for using these words, arguing that if ", + "page_start": 10, + "page_end": 10, + "source_file": "wikipedia2.pdf" + }, + { + "text": "The philosophers Glenn Carruthers and Elizabeth Schier said in 2012 that the main arguments for the \nexistence of a hard problem—philosophical zombies, Mary's room, and Nagel's bats—are only persuasive \nif one already assumes that \"consciousness must be independent of the structure and function of mental \nstates, i.e. that there is a hard problem.\" Hence, the arguments beg the question. The authors suggest that \n\"instead of letting our conclusions on the thought experiments guide our theories of consciousness, we \nshould let our theories of consciousness guide our conclusions from the thought experiments.\"[64] \n\nThe philosopher Massimo Pigliucci argued in 2013 that the hard problem is misguided, resulting from a \n\"category mistake\".[17] He said: \"Of course an explanation isn't the same as an experience, but that's \nbecause the two are completely independent categories, like colors and triangles. It is obvious that I \ncannot experience what it is like to be you, but I can potentially have a complete explanation of how and \nwhy it is possible to be you.\"[17] \n\nIn 2017, the philosopher Marco Stango, in a paper on John Dewey's approach to the problem of \nconsciousness (which preceded Chalmers' formulation of the hard problem by over half a century), noted \nthat Dewey's approach would see the hard problem as the consequence of an unjustified assumption that \nfeelings and functional behaviors are not the same physical process: \"For the Deweyan philosopher, the \n'hard problem' of consciousness is a 'conceptual fact' only in the sense that it is a*philosophical mistake*: \nthe mistake of failing to see that the physical can be had as an episode of immediate sentiency.\"[65] ", + "page_start": 7, + "page_end": 7, + "source_file": "wikipedia2.pdf" + }, + { + "text": "**How the easy and hard problems are related**\n\nChalmers believes that the hard problem is irreducible to the easy problems: solving the easy problems \nwill not lead to a solution to the hard problems. This is because the easy problems pertain to the causal \nstructure of the world while the hard problem pertains to consciousness, and facts about consciousness \ninclude facts that go beyond mere causal or structural description.[32] \n\nFor example, suppose someone were to stub their foot and yelp. In this scenario, the easy problems are \nmechanistic explanations that involve the activity of the nervous system and brain and its relation to the \nenvironment (such as the propagation of nerve signals from the toe to the brain, the processing of that \ninformation and how it leads to yelping, and so on). The hard problem is the question of why these \nmechanisms are accompanied by*the feeling of pain*, or why these feelings of pain feel the particular way \nthat they do. Chalmers argues that facts about the neural mechanisms of pain, and pain behaviours, do not \nlead to facts about conscious experience. Facts about conscious experience are, instead, further facts, not \nderivable from facts about the brain.[27][32] \n\nAn explanation for all of the relevant physical facts about neural processing would leave unexplained \nfacts about what it is like to feel pain. This is in part because functions and physical structures of any sort \ncould conceivably exist in the absence of experience. Alternatively, they could exist alongside a different \nset of experiences. For example, it is logically possible for a perfect replica of Chalmers to have no \nexperience at all, or for it to have a different set of experiences (such as an inverted visible spectrum, so \nthat the blue-yellow red-green axes of its visual field are flipped).[32] ", + "page_start": 2, + "page_end": 2, + "source_file": "wikipedia2.pdf" + }, + { + "text": "**Philosophical responses**\n\nDavid Chalmers' formulation of the hard problem of consciousness provoked considerable debate within \nphilosophy of mind, as well as scientific research.[43] \n\nis considered a problem primarily for \nThe hard problem \nphysicalist views of the mind (the view that the mind is a physical \nobject or process), since physical explanations tend to be \nfunctional, or structural. Because of this, some physicalists have \nresponded to the hard problem by seeking to show that it dissolves \nupon analysis. Other researchers accept the problem as real and \nseek to develop a theory of consciousness' place in the world that \ncan solve it, by either modifying physicalism or abandoning it in \nfavour of an alternative ontology (such as panpsychism or \ndualism). A third response has been to accept the hard problem as \nreal but deny human cognitive faculties can solve it. \nA diagram showing the relationship \nbetween various views concerning \nthe relationship between \nconsciousness and the physical \nworld \n\nPhilPapers is an organization that archives academic philosophy \npapers and periodically surveys professional philosophers about their views. It can be used to gauge \nprofessional attitudes towards the hard problem. As of the 2020 survey results, it seems that the majority \nof philosophers (62.42%) agree that the hard problem is real, with a substantial minority that disagrees \n(29.76%).[25] ", + "page_start": 5, + "page_end": 5, + "source_file": "wikipedia2.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia2.pdf", + "query": "What is David Chalmer's definition of \"consciousness\" ?", + "target_page": 2, + "target_passage": "Chalmers uses Thomas Nagel's definition of consciousness: \"the feeling of what it is like to be something.\"", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Consciousness is an ambiguous term. It can be used to mean self consciousness, awareness, the state of \nbeing awake, and so on. Chalmers uses Thomas Nagel's definition of consciousness: \"*the feeling of what*\n*it is like to be something.\"*Consciousness, in this sense, is synonymous with*experience.*[31][27] ", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia2.pdf" + }, + { + "text": "of being conscious is merely an error in perception, held by brains which evolved to hold erroneous and \nincomplete models of their own internal workings, just as they hold erroneous and incomplete models of \ntheir own bodies and of the external world.[77][78] ", + "page_start": 9, + "page_end": 9, + "source_file": "wikipedia2.pdf" + }, + { + "text": "Today there is a strong tendency to simply*equate*consciousness with the qualia. Yet there is \nclearly something not quite right about this. The \"itchiness of itches\" and the \"hurtfulness of \npain\" are qualities we are conscious*of*. So philosophy of mind tends to treat consciousness as \nif it consisted simply of the contents of consciousness (the phenomenal qualities), while it \nreally is precisely*consciousness*of contents, the very givenness of whatever is subjectively \ngiven. And therefore the problem of consciousness does not pertain so much to some alleged \n\"mysterious, nonpublic objects\", i.e. objects that seem to be only \"visible\" to the respective \nsubject, but rather to the nature of \"seeing\" itself (and in today’s philosophy of mind \nastonishingly little is said about the latter).[129] ", + "page_start": 14, + "page_end": 14, + "source_file": "wikipedia2.pdf" + }, + { + "text": "g%7CHard) \n\n5. JCS vol. 4, pp. 3-46, 1997 \n6. Chalmers, David (1997). \"Moving forward on the problem of consciousness\".*Journal of*\n\n*Consciousness Studies*.**4**(1): 3–46. \n\n7. Shear, Jonathan (1997).*Explaining Consciousness: The Hard Problem*. MIT Press. \n\nISBN 978-0262692212. \n\n8. \"Episode 83, The David Chalmers Interview (Part I - Consciousness)\" (https://thepanpsycas \n\nt.com/panpsycast2/episode83-1).*The Panpsycast Philosophy Podcast*. 19 July 2020. \nRetrieved 2020-09-05. \n\n9. Pinker, Steven (29 January 2007). \"The Brain: The Mystery of Consciousness\" (http://conten \nt.time.com/time/magazine/article/0,9171,1580394-1,00.html).*Time*. Retrieved 19 December \n2018. \n\n10. Levine, Joseph (2009-01-15). \"The Explanatory Gap\" (https://www.oxfordhandbooks.com/vi \new/10.1093/oxfordhb/9780199262618.001.0001/oxfordhb-9780199262618-e-17).*The*\n*Oxford Handbook of Philosophy of Mind*: 281–291. \ndoi:10.1093/oxfordhb/9780199262618.003.0017 (https://doi.org/10.1093%2Foxfordhb%2F9 \n780199262618.003.0017). ISBN 978-0199262618. \n\n11. McGinn, Colin (20 February 2012). \"All machine and no ghost?\" (http://www.newstatesman. \ncom/ideas/2012/02/consciousness-mind-brain).*New Statesman*. Retrieved 27 March 2012. \n12. Block, Ned (2002). \"The Harder Problem of Consciousness\" (https://philpapers.org/rec/BLO \nTHP).*The Journal of Philosophy*.**99**(8): 391–425. doi:10.2307/3655621 (https://doi.org/10. \n2307%2F3655621). JSTOR 3655621 (https://www.jstor.org/stable/3655621). \nS2CID 111383062 (https://api.semanticscholar.org/CorpusID:111383062). \n\n13. Varela, F.J. (1 April 1996). \"Neurophenomenology: a methodological remedy for the hard \n\nproblem\" (https://www.ingentaconnect.com/content/imp/jcs/1996/00000003/00000004/718). \n*Journal of Consciousness Studies*.**3**(4): 330–349. ", + "page_start": 18, + "page_end": 18, + "source_file": "wikipedia2.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
13. Churchland, Paticia ( LSR6 ). “ The Humswogde Problem ” ( http :// loelvelseco. netheraching / 22.9. 0 / homoxygolegenetis pdf ) ( PDF ). aloumair of Concoussess Studies. 3 ( 5 – 62 – 438. Retireved 13 ). alonary 2012.
13 Frankish, Keith ( 2026 ), “ Busionism as a Theory of Consciousness ”, “ Ititps :// thorievere juggter. org / pightubMITTLM, articleofibratitimate / Frankish_BlusionsmismN2DelAST / thery / ASTbPs ( Ri20corposumes_eprinty of ) ( FrLR
Z0. Dehaene. Stanislas ( 2014 ). Consciousness and the brain : deciphering how the brain codes our thoughts : Viking Adult. po. 259 – 259, ( https :// books. goode : com / books / he / CWw2AAAAQ BALIIapp + PT289 ). HST0EES426.
22. Edelman, Gariali, Gally, Janesph, Baan, Benanan, Benana ( DLL ), TBiology of Consciousness ”, ( Pittps :// www. tcb, nfm, right / glycletyl / glycletyl / glycletyl / glycletyl / glycletyl / glycletol / glycletolidy
22. Seth, Ank ( November 2010 ). “ The real problem ” ( https :// aeon. colessaythe hard - problem - of - consossss - ss - distraction - from - the - real - sme ). Aeron. Retrieved 22 April 2013.
22. Sear Carrill [ 23 ] April 2012b \" Sear Carroll \" s Mindocape \" [ https :// www. preperspecteroussiverse. competization20. EDEAG / 296p0044 - 4 - 4 - 4 - 4 - 4 - 8 - 8 - 8 - 8 - 89000 - blath800 - 0 - 9 - freelingly? Rhoight - self - this - eitis bind - thy -
24 ‘ Psychological Scales. The Hard Problem of Consciousness ’ ( Mtps :// Secales. arabroychology. jug. mir202 / LUTB ( Psychology / colletth < 30 % consciousness ≤ 7 ) andpsyctology. com. Retreved 2025 - 103
25. Bourget, David, Chalmers, David J. ( 2020 ), “ Phloophers on Phlosophy, The 2020 PhlPapers Survey ” ( https :// survey2020. phlpeople. org ), Philosophers ’ Imprint.
25. Robetts, Tim S, < underline > Self - tember 2007 ) “ Per, Ever Hander Peyblem of Consciousness by Roberts, Tim S, < underline > ( Time , < underline > Time , < underline >, < underline > Time
27. Chalmers, David ( 2396 ), The Corocious Mind. New York : Oxford University Press. pp. xilii, 95 – 156, backcover.
28. Pinker, Steven ( 2015 ). Enlightent Now. Viking, p. 481. ISBN 9780525427575.
29. Denmett, Danket commentary on T. Moody, O. Fianagan and T. Polger, \" The Unimagined Prepostenosa of Zombies ( Totps :/ lase. tufts. edu / cogotud / dennettityaspero / uncombie. ftml \", Journal of Consousness Stadies vol. 2, m. 4, < undes
30. Churthlored, Paticia Smith ( 2505 ). “ Invurophilosophical skinton consciousness research ” Contitude Fundon : A View from the Tradamus, Progress in Ensin Research. Vols. Jids po 290 – 293 dsc ( 500 / 500 / 9 ) at LLD ( 500 / 64005 - 2 ( 998 – 61
21. Negel, Thomes ( October 2574 ), \" What is it like to be a bat?\". The Philicosphrical Reviews 83 ( 4 ), 440 – 450.801 ( 231 / 23004 ) ( Rttps :// dtsorglitis org / 10.2007 ) hsa - 212.13002.6 ), 551.91.2002.4 ( Mtps :// www. ( 000.002.6574.4 ), 52.
22. “ Hard Problem of Consciousness ” ( Intest / ilep. utm. edu / hard - problem - of - concisumess )). Internet Encyclopedia of Philosophy Retrieved 202.20103.
33. Chaliness, Devid ( January 12957 ). “ Moving forward on the problem of corsococcassress ”, 19th ss3tiphilopers. singles / CHAMFQ1. Journal of Corsociousness Studies. 4 ( 1 ): 3 - 46.
", + "page_start": 19, + "page_end": 19, + "source_file": "wikipedia2.pdf" + }, + { + "text": "One can always ask why these processes of availability should give rise to consciousness in \nthe first place. As yet we cannot explain why they do so, and it may well be that full details \nabout the processes of availability will still fail to answer this question. Certainly, nothing in \nthe standard methodology I have outlined answers the question; that methodology assumes a \nrelation between availability and consciousness, and therefore does nothing to explain it. [...] \nSo the hard problem remains. But who knows: Somewhere along the line we may be led to \nthe relevant insights that show why the link is there, and the hard problem may then be \nsolved.[132] ", + "page_start": 14, + "page_end": 14, + "source_file": "wikipedia2.pdf" + }, + { + "text": "**The \"soft-wired view\"**\n\nSome consciousness researchers have argued that the hard problem is a cultural artifact, unique to \ncontemporary Western Culture. This is similar to Type-B Materialism, but it makes the further claim that \nthe psychological facts that cause us to intuit the hard problem are not innate, but culturally conditioned. \nNotable researchers who hold this view include Anna Wierzbicka,[96] Hakwan Lau and Matthias \nMichel.[97] \n\nWierzbicka (who is a linguist) argues that the vocabulary used by consciousness researchers (including \nwords like*experience*and*consciousness*) are not universally translatable, and are \"parochially \nEnglish.\"[96] Weirzbicka calls David Chalmers out by name for using these words, arguing that if ", + "page_start": 10, + "page_end": 10, + "source_file": "wikipedia2.pdf" + }, + { + "text": "Once our intuitions are educated by cognitive neuroscience and computer simulations, \nChalmers' hard problem will evaporate. The hypothetical concept of qualia, pure mental \nexperience, detached from any information-processing role, will be viewed as a peculiar idea \nof the prescientific era, much like vitalism... [Just as science dispatched vitalism] the science \nof consciousness will keep eating away at the hard problem of consciousness until it \nvanishes. ", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia2.pdf" + }, + { + "text": "**Consciousness**\n\nDavid Chalmers identified two problems in understanding the mind, which he named the \"hard\" and \n\"easy\" problems of consciousness.[381] The easy problem is understanding how the brain processes \nsignals, makes plans and controls behavior. The hard problem is explaining how this*feels*or why it \nshould feel like anything at all, assuming we are right in thinking that it truly does feel like something \n(Dennett's consciousness illusionism says this is an illusion). While human information processing is easy \nto explain, human subjective experience is difficult to explain. For example, it is easy to imagine a color- \nblind person who has learned to identify which objects in their field of view are red, but it is not clear \nwhat would be required for the person to*know what red looks like*.[382] ", + "page_start": 25, + "page_end": 25, + "source_file": "wikipedia3.pdf" + }, + { + "text": "96. Wierzbicka, A. (2019). \"From 'Consciousness' to 'I Think, I Feel, I Know': A Commentary on \n\nDavid Chalmers\".*Journal of Consciousness Studies*.**26**(9–10): 257–269. \n\n97. Lau, Hakwan; Michel, Matthias (2019). \"A Socio-Historical Take on the Meta-Problem of \n\nConsciousness\".*Journal of Consciousness Studies*.**26**(9–10): 136–147. \n\n98. \"Is the hard problem of consciousness really that hard? | Brian Greene and Pat Churchland \nlock horns\" (https://www.youtube.com/watch?v=hru5d_wsu7g).*YouTube*. 9 July 2022. \n\n99. \"Abiogenesis\" (https://www.allaboutscience.org/abiogenesis.htm). \n\n100.*Ignorance and Imagination: The Epistemic Origin of the Problem of Consciousness.*Daniel \n\nStoljar. Oxford University Press. ", + "page_start": 23, + "page_end": 23, + "source_file": "wikipedia2.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia2.pdf", + "query": "What is the role of the PhilPapers organization ?", + "target_page": 6, + "target_passage": " PhilPapers is an organization that archives academic philosophy papers and periodically surveys professional philosophers about their views.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Paulson, Lawrence C. (February 2018). \"Computational Logic: Its Origins and Applications\" \n(https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5832843).*Proceedings of the Royal Society*\n*A: Mathematical, Physical and Engineering Sciences*.**474**(2210): 1–14. arXiv:1712.04375 \n(https://arxiv.org/abs/1712.04375). Bibcode:2018RSPSA.47470872P (https://ui.adsabs.harv \nard.edu/abs/2018RSPSA.47470872P). doi:10.1098/rspa.2017.0872 (https://doi.org/10.109 \n8%2Frspa.2017.0872). PMC 5832843 (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5832 \n843). PMID 29507522 (https://pubmed.ncbi.nlm.nih.gov/29507522). S2CID 3805901 (http \ns://api.semanticscholar.org/CorpusID:3805901). \nPedemonte, Bettina (25 June 2018). \"Strategic vs Definitory Rules: Their Role in Abductive \nArgumentation and their Relationship with Deductive Proof\" (https://www.ejmste.com/article/ \nstrategic-vs-definitory-rules-their-role-in-abductive-argumentation-and-their-relationship-with \n-5539).*Eurasia Journal of Mathematics, Science and Technology Education*.**14**(9): 1–17. \ndoi:10.29333/ejmste/92562 (https://doi.org/10.29333%2Fejmste%2F92562). ISSN 1305- \n8215 (https://search.worldcat.org/issn/1305-8215). S2CID 126245285 (https://api.semantics \ncholar.org/CorpusID:126245285). Archived (https://web.archive.org/web/20211207195246/h \nttps://www.ejmste.com/article/strategic-vs-definitory-rules-their-role-in-abductive-argumentati \non-and-their-relationship-with-5539) from the original on 7 December 2021. Retrieved \n8 January 2022. \nPickel, Bryan (1 July 2020). \"Structured Propositions and Trivial Composition\" (https://doi.or \ng/10.1007%2Fs11229-018-1853-1).*Synthese*.**197**(7): 2991–3006. doi:10.1007/s11229- \n018-1853-1 (https://doi.org/10.1007%2Fs11229-018-1853-1). hdl:20.500.11820/3427c028- \nf2cb-4216-a199-9679a49ce71c (https://hdl.handle.net/20.500.11820%2F3427c028-f2cb-42 \n16-a199-9679a49ce71c). ISSN 1573-0964 (https://search.worldcat.org/issn/1573-0964). \nS2CID 49729020 (https://api.semanticscholar.org/CorpusID:49729020). \nPietroski, Paul (2021). \"Logical Form: 1. Patterns of Reason\" (https://plato.stanford.edu/entri \nes/logical-form/#pat).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Archived (https://web.archive.org/web/20211002190116/https://plato.sta \nnford.edu/entries/logical-form/#pat) from the original on 2 October 2021. Retrieved \n4 December 2021. \nPlanty-Bonjour, Guy (2012).*The Categories of Dialectical Materialism: Contemporary Soviet*\n*Ontology*. Springer Science & Business Media. p. 62. ISBN 978-94-010-3517-0. \nPossin, Kevin (2016). \"Conductive Arguments: Why is This Still a Thing?\" (https://philpapers. \norg/rec/POSCAW-4).*Informal Logic*.**36**(4): 563–593. doi:10.22329/il.v36i4.4527 (https://do \ni.org/10.22329%2Fil.v36i4.4527). Archived (https://web.archive.org/web/20220108171723/ht \ntps://philpapers.org/rec/POSCAW-4) from the original on 8 January 2022. Retrieved \n8 January 2022. \nPriest, Graham; Tanaka, Koji; Weber, Zach (2018). \"Paraconsistent Logic\" (https://plato.stan \nford.edu/entries/logic-paraconsistent/).*The Stanford Encyclopedia of Philosophy*. \nMetaphysics Research Lab, Stanford University. Retrieved 14 December 2021. \nPépin, Jean (2004). \"Logos\".*Encyclopedia of Religion*(https://www.encyclopedia.com/philo \nsophy-and-religion/philosophy/philosophy-terms-and-concepts/logos). ISBN 978-0-02- \n865733-2. Archived (https://web.archive.org/web/20211229134626/https://www.encyclopedi \na.com/philosophy-and-religion/philosophy/philosophy-terms-and-concepts/logos) from the \noriginal on 29 December 2021. Retrieved 29 December 2021. \nPutnam, H. (1969). \"Is Logic Empirical?\".*Boston Studies in the Philosophy of Science*. \nVol. 5. pp. 216–241. doi:10.1007/978-94-010-3381-7_5 (https://doi.org/10.1007%2F978-94- \n010-3381-7_5). ISBN 978-94-010-3383-1. \nQuine, Willard Van Orman (1981).*Mathematical Logic*. Harvard University Press. p. 1. \nISBN 978-0-674-55451-1. \nRathjen, Michael; Sieg, Wilfried (2022). \"Proof Theory\" (https://plato.stanford.edu/entries/pro \nof-theory/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford \nUniversity. Retrieved 4 March 2023. ", + "page_start": 33, + "page_end": 33, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Shermer, Michael (25 October 2022).*Conspiracy: Why the Rational Believe the Irrational*. \nJHU Press. ISBN 978-1-4214-4445-1. \nSider, Theodore (2010).*Logic for Philosophy*. Oxford University Press. ISBN 978-0-19- \n957558-9. \nSiegel, Harvey; Biro, John (1997). \"Epistemic Normativity, Argumentation, and Fallacies\" (htt \nps://philpapers.org/rec/SIEENA).*Argumentation*.**11**(3): 277–292. \ndoi:10.1023/A:1007799325361 (https://doi.org/10.1023%2FA%3A1007799325361). \nS2CID 126269789 (https://api.semanticscholar.org/CorpusID:126269789). Archived (https:// \nweb.archive.org/web/20220228035651/https://philpapers.org/rec/SIEENA) from the original \non 28 February 2022. Retrieved 4 January 2022. \nSimpson, R. L. (2008).*Essentials of Symbolic Logic*(3rd ed.). Broadview Press. p. 14. \nISBN 978-1-77048-495-5. \nSmith, Robin (2022). \"Aristotle's Logic\" (https://plato.stanford.edu/entries/aristotle-logic/). \n*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. \nRetrieved 11 March 2023. \nSpade, Paul Vincent; Panaccio, Claude (2019). \"William of Ockham\" (https://plato.stanford.e \ndu/entries/ockham/#SummLogi).*The Stanford Encyclopedia of Philosophy*. Metaphysics \nResearch Lab, Stanford University. \nSpriggs, John (2012).*GSN – The Goal Structuring Notation: A Structured Approach to*\n*Presenting Arguments*. Springer Science & Business Media. pp. 20–22. ISBN 978-1-4471- \n2312-5. \nStairs, Allen (2017).*A Thinker's Guide to the Philosophy of Religion*. Routledge. p. 343. \nISBN 978-1-351-21981-5. \nSternberg, Robert J. \"Thought\" (https://www.britannica.com/topic/thought).*Encyclopædia*\n*Britannica*. Archived (https://web.archive.org/web/20211013145532/https://www.britannica.c \nom/topic/thought) from the original on 13 October 2021. Retrieved 14 October 2021. \nStolyar, Abram Aronovich (1 January 1984).*Introduction to Elementary Mathematical Logic*. \nCourier Corporation. ISBN 978-0-486-64561-2. \nStone, Mark A. (2012). \"Denying the Antecedent: Its Effective Use in Argumentation\" (https:// \nphilpapers.org/rec/STODTA).*Informal Logic*.**32**(3): 327–356. doi:10.22329/il.v32i3.3681 (ht \ntps://doi.org/10.22329%2Fil.v32i3.3681). Archived (https://web.archive.org/web/2022022812 \n3240/https://philpapers.org/rec/STODTA) from the original on 28 February 2022. Retrieved \n8 January 2022. \nStump, David J. \"Fallacy, Logical\" (https://www.encyclopedia.com/history/dictionaries-thesau \nruses-pictures-and-press-releases/fallacy-logical).*encyclopedia.com*. Archived (https://web. \narchive.org/web/20210215112403/https://www.encyclopedia.com/history/dictionaries-thesau \nruses-pictures-and-press-releases/fallacy-logical) from the original on 15 February 2021. \nRetrieved 20 March 2021. \nTalbott, William (2016). \"Bayesian Epistemology\" (https://plato.stanford.edu/entries/epistemo \nlogy-bayesian/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Archived (https://web.archive.org/web/20210401034856/https://plato.sta \nnford.edu/entries/epistemology-bayesian/) from the original on 1 April 2021. Retrieved \n6 March 2021. \nTarski, Alfred (1994).*Introduction to Logic and to the Methodology of the Deductive*\n*Sciences*. Oxford University Press. p. 40. ISBN 978-0-19-802139-1. \nTondl, L. (2012).*Problems of Semantics: A Contribution to the Analysis of the Language*\n*Science*. Springer Science & Business Media. p. 111. ISBN 978-94-009-8364-9. \nVelleman, Daniel J. (2006).*How to Prove It: A Structured Approach*. Cambridge University \nPress. p. 8, 103. ISBN 978-0-521-67599-4. \nVickers, John M. (2022). \"Inductive Reasoning\" (https://www.oxfordbibliographies.com/displ \nay/document/obo-9780195396577/obo-9780195396577-0171.xml).*Oxford Bibliographies*. \nOxford University Press. Retrieved 18 January 2023. ", + "page_start": 35, + "page_end": 35, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Wolf, Robert G. (1978). \"Are Relevant Logics Deviant?\" (https://philpapers.org/rec/WOLAR \nL).*Philosophia*.**7**(2): 327–340. doi:10.1007/BF02378819 (https://doi.org/10.1007%2FBF02 \n378819). S2CID 143697796 (https://api.semanticscholar.org/CorpusID:143697796). \nArchived (https://web.archive.org/web/20211216143955/https://philpapers.org/rec/WOLAR \nL) from the original on 16 December 2021. Retrieved 4 January 2022. \nZegarelli, Mark (2010).*Logic For Dummies*. John Wiley & Sons. p. 30. ISBN 978-1-118- \n05307-2. ", + "page_start": 37, + "page_end": 37, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Blair, J. Anthony; Johnson, Ralph H. (2000). \"Informal Logic: An Overview\" (https://philpaper \ns.org/rec/BLAILA-3).*Informal Logic*.**20**(2): 93–107. doi:10.22329/il.v20i2.2262 (https://doi.o \nrg/10.22329%2Fil.v20i2.2262). Archived (https://web.archive.org/web/20211209195317/http \ns://philpapers.org/rec/BLAILA-3) from the original on 9 December 2021. Retrieved \n29 December 2021. \nBlair, J. Anthony (20 October 2011).*Groundwork in the Theory of Argumentation: Selected*\n*Papers of J. Anthony Blair*. Springer Science & Business Media. p. 47. ISBN 978-94-007- \n2363-4. \nBobzien, Susanne (2020). \"Ancient Logic: 2. Aristotle\" (https://plato.stanford.edu/entries/logi \nc-ancient/#Ari).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Archived (https://web.archive.org/web/20180828102117/https://plato.sta \nnford.edu/entries/logic-ancient/#Ari) from the original on 28 August 2018. Retrieved \n3 January 2022. \nBorchert, Donald, ed. (2006a). \"Computability Theory\".*Macmillan Encyclopedia of*\n*Philosophy Volume 2*(https://philpapers.org/rec/BORMEO) (2nd ed.). Macmillan. pp. 372– \n390. ISBN 978-0-02-865782-0. \nBorchert, Donald (2006b). \"Induction\".*Macmillan Encyclopedia of Philosophy Volume 4*(htt \nps://philpapers.org/rec/BORMEO) (2nd ed.). Macmillan. pp. 635–648. ISBN 978-0-02- \n865784-4. Archived (https://web.archive.org/web/20210112065913/https://philpapers.org/re \nc/BORMEO) from the original on 12 January 2021. Retrieved 4 January 2022. \nBorchert, Donald (2006c). \"Logic, Non-Classical\".*Macmillan Encyclopedia of Philosophy*\n*Volume 5*(https://philpapers.org/rec/BORMEO) (2nd ed.). Macmillan. pp. 485–492. \nISBN 978-0-02-865785-1. Archived (https://web.archive.org/web/20210112065913/https://ph \nilpapers.org/rec/BORMEO) from the original on 12 January 2021. Retrieved 4 January 2022. \nBoris, Kulik; Alexander, Fridman (30 November 2017).*N-ary Relations for Logical Analysis*\n*of Data and Knowledge*. IGI Global. p. 74. ISBN 978-1-5225-2783-1. \nBridges, Douglas; Ishihara, Hajime; Rathjen, Michael; Schwichtenberg, Helmut (30 April \n2023).*Handbook of Constructive Mathematics*. Cambridge University Press. pp. 73–4. \nISBN 978-1-316-51086-5. \nBrody, Boruch A. (2006).*Encyclopedia of Philosophy*. Vol. 5. Donald M. Borchert (2nd ed.). \nThomson Gale/Macmillan Reference US. pp. 535–536. ISBN 978-0-02-865780-6. \nOCLC 61151356 (https://search.worldcat.org/oclc/61151356). \"The two most important \ntypes of logical calculi are propositional (or sentential) calculi and functional (or predicate) \ncalculi. A propositional calculus is a system containing propositional variables and \nconnectives (some also contain propositional constants) but not individual or functional \nvariables or constants. In the extended propositional calculus, quantifiers whose operator \nvariables are propositional variables are added.\" \nBunnin, Nicholas; Yu, Jiyuan (27 January 2009).*The Blackwell Dictionary of Western*\n*Philosophy*. John Wiley & Sons. p. 179. ISBN 978-1-4051-9112-8. \nBurgess, John P. (2009). \"1. Classical logic\".*Philosophical Logic*(https://philpapers.org/rec/ \nBURPL-3). Princeton, NJ: Princeton University Press. pp. 1–12. ISBN 978-0-691-15633-0. \nArchived (https://web.archive.org/web/20211216143954/https://philpapers.org/rec/BURPL- \n3) from the original on 16 December 2021. Retrieved 4 January 2022. \nBäck, Allan T. (2016).*Aristotle's Theory of Predication*. Brill. p. 317. ISBN 978-90-04-32109- \n0. \nCalderbank, Robert; Sloane, Neil J. A. (April 2001). \"Claude Shannon (1916–2001)\" (https:// \ndoi.org/10.1038%2F35071223).*Nature*.**410**(6830): 768. doi:10.1038/35071223 (https://doi. \norg/10.1038%2F35071223). ISSN 1476-4687 (https://search.worldcat.org/issn/1476-4687). \nPMID 11298432 (https://pubmed.ncbi.nlm.nih.gov/11298432). S2CID 4402158 (https://api.s \nemanticscholar.org/CorpusID:4402158). \nCarnielli, Walter; Pizzi, Claudio (2008).*Modalities and Multimodalities*. Springer Science & \nBusiness Media. p. 3. ISBN 978-1-4020-8590-1. ", + "page_start": 25, + "page_end": 25, + "source_file": "wikipedia1.pdf" + }, + { + "text": "•**Governance mechanisms:**In determining matters like acceptable and ethical use, the \nfundamental question is “who decides.” While this might be settled simply by whoever \nsets up and operates the dataset and related \ninfrastructure, participatory \nmechanisms — such as advisory bodies bringing together a broad range of users and \nstakeholders of a collection — could also be incorporated. ", + "page_start": 19, + "page_end": 19, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "\n\n**Compost Organizations**", + "page_start": 2, + "page_end": 2, + "source_file": "CompostGuide.pdf" + }, + { + "text": "**4.7. Involve NGOs, charities and business associations**\nAs a final note and recommendation of this report, we'll note that, in comparison with hackers and \n\npublic officers, there are other parties that could and should play a role in Open Data adoption much \n\nbigger than what they have had so far. \n\nNGOs and charities, as well as professionals or business associations, all have lots to gain from \n\nOpen Data but don't seem, in many cases, to have realized this yet. Members of the first category \n\nshould routinely ask for support directly to Open Data civic hackers to gather (either from \n\ngovernment or citizens) more up to date information that is specifically relevant for their \n\ncampaigns. \n\nThe other associations, instead, should be much more active both in publishing Open Data about ", + "page_start": 31, + "page_end": 31, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "Group companies. Based on needs identified \nGroup companies. Based on needs identified \n\nby local government and volunteer centers \nby local government and volunteer centers \n\nin the areas concerned, SMFG staff have \nin the areas concerned, SMFG staff have \n\nbeen involved in voluntary activities such \nbeen involved in voluntary activities such \n\nas clearing mud from residential areas and \nas clearing mud from residential areas and \n\nconcrete water runoff troughs alongside \nconcrete water runoff troughs alongside \n\nroads, clearing up debris, and cleaning and \nroads, clearing up debris, and cleaning and \n\nrestoring photographs and other personal \nrestoring photographs and other personal \n\nitems with memorabilia value. \nitems with memorabilia value. \n\nIn July 2011, over 400 employees of SMBC \nIn July 2011, over 400 employees of SMBC \n\nNikko Securities — mainly 350 new hires — \nNikko Securities — mainly 350 new hires — \n\nwere divided into three teams, each of which \nwere divided into three teams, each of which \n\nspent one to three weeks on volunteer \nspent one to three weeks on volunteer ", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "The Foundation has a program of awarding grants to support chapters, affiliates, user groups, and \nindividuals in projects that further the mission of the Foundation. Chapters are independent organizations \nthat share the goals of the Foundation and support the goals within a specified geographical region. In \naddition to this work, which is reflected above in the awards and grants line, an overwhelming majority of \nthe Foundation’s project activities are carried out by an international network of volunteers, whose activity \nis not reflected in the tables above. ", + "page_start": 16, + "page_end": 16, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "Iqbal, Mohammad (2013). \"The Spirit of Muslim Culture\".*The Reconstruction of Religious*\n*Thought in Islam*(http://www.allamaiqbal.com/works/prose/english/reconstruction/). Stanford \nUniversity Press. pp. 99–115. ISBN 978-0-8047-8686-7. \nIrvine, Andrew David (2022). \"Bertrand Russell\" (https://plato.stanford.edu/entries/russell/). \n*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. \nRetrieved 29 September 2022. \nJacquette, Dale (2006). \"Introduction: Philosophy of logic today\".*Philosophy of Logic*(http \ns://philpapers.org/rec/JACPOL). North Holland. pp. 1–12. ISBN 978-0-444-51541-4. \nArchived (https://web.archive.org/web/20211207184932/https://philpapers.org/rec/JACPOL) \nfrom the original on 7 December 2021. Retrieved 29 December 2021. \nJago, Mark (2014).*The Impossible: An Essay on Hyperintensionality*. OUP Oxford. p. 41. \nISBN 978-0-19-101915-9. \nJanssen, Theo M. V.; Zimmermann, Thomas Ede (2021). \"Montague Semantics\" (https://plat \no.stanford.edu/entries/montague-semantics/).*The Stanford Encyclopedia of Philosophy*. \nMetaphysics Research Lab, Stanford University. pp. 3–4. Retrieved 10 March 2023. \nJohnson, Ralph H. (1999). \"The Relation Between Formal and Informal Logic\" (https://philpa \npers.org/rec/JOHTRB-2).*Argumentation*.**13**(3): 265–274. doi:10.1023/A:1007789101256 \n(https://doi.org/10.1023%2FA%3A1007789101256). S2CID 141283158 (https://api.semantic \nscholar.org/CorpusID:141283158). Archived (https://web.archive.org/web/20211207184706/ \nhttps://philpapers.org/rec/JOHTRB-2) from the original on 7 December 2021. Retrieved \n2 January 2022. \nJohnson, Ralph H. (15 July 2014).*The Rise of Informal Logic: Essays on Argumentation,*\n*Critical Thinking, Reasoning and Politics*. University of Windsor. ISBN 978-0-920233-71-9. \nKetland, Jeffrey (2005). \"Second Order Logic\".*Macmillan Encyclopedia of Philosophy*\n*Volume 8*(https://www.encyclopedia.com/humanities/encyclopedias-almanacs-transcripts-a \nnd-maps/second-order-logic). Macmillan Reference USA. pp. 707–708. ISBN 978-0-02- \n865788-2. Archived (https://web.archive.org/web/20211207184921/https://www.encyclopedi \na.com/humanities/encyclopedias-almanacs-transcripts-and-maps/second-order-logic) from \nthe original on 7 December 2021. Retrieved 4 January 2022. \nKing, Jeffrey C. (2 September 2009). \"Formal Semantics\".*The Oxford Handbook of*\n*Philosophy of Language*. pp. 557–8. doi:10.1093/oxfordhb/9780199552238.003.0023 (http \ns://doi.org/10.1093%2Foxfordhb%2F9780199552238.003.0023). ISBN 978-0-19-955223-8. \nKing, Jeffrey C. (2019). \"Structured Propositions\" (https://plato.stanford.edu/entries/propositi \nons-structured/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Archived (https://web.archive.org/web/20211025211706/https://plato.sta \nnford.edu/entries/propositions-structured/) from the original on 25 October 2021. Retrieved \n4 December 2021. \nKlement, Kevin C. (1995b). \"Propositional Logic\" (https://iep.utm.edu/prop-log/).*Internet*\n*Encyclopedia of Philosophy*. ISSN 2161-0002 (https://search.worldcat.org/issn/2161-0002). \nRetrieved 23 September 2022. \nKline, Morris (1972).*Mathematical Thought From Ancient to Modern Times*. Oxford \nUniversity Press. ISBN 978-0-19-506135-2. \nKneale, William; Kneale, Martha (1962).*The Development of Logic*. Clarendon Press. \nISBN 978-0-19-824773-9. \nKnuuttila, Simo (1980).*Reforging the Great Chain of Being: Studies of the History of Modal*\n*Theories*. Springer Science & Business Media. p. 71. ISBN 978-90-277-1125-0. \nKorb, Kevin (2004). \"Bayesian Informal Logic and Fallacy\" (https://philpapers.org/rec/KORBI \nL).*Informal Logic*.**24**(1): 41–70. doi:10.22329/il.v24i1.2132 (https://doi.org/10.22329%2Fil. \nv24i1.2132). Archived (https://web.archive.org/web/20211110075255/https://philpapers.org/r \nec/KORBIL) from the original on 10 November 2021. Retrieved 2 January 2022. ", + "page_start": 30, + "page_end": 30, + "source_file": "wikipedia1.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0510.pdf", + "query": "What explains mostly the physical behavior that occurs in region iii of thin films ?", + "target_page": 5, + "target_passage": "The observed behaviour in region iii) can be reason- ably attributed to the decreasing relevance of the con- tribution to the total energy of the system coming from the competitive interactions among NNN planes as the film thickness decreases", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "The observed behaviour in region iii) can be reason- \nably attributed to the decreasing relevance of the con- \ntribution to the total energy of the system coming from \nthe competitive interactions among NNN planes as the \nfilm thickness decreases; moreover, the thinness of the ", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0510.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
[ 7 ] R. Seemann, S. Herminghans, C. Nets, S. Schlagowski, D. Podzimek, R. Kourad, H. Mantz, and K. Iacobs, “ Dysamics and structure formation in thin polymer melt films,” 1. Phys.- Condex. Matter[ 8 ] U. Thiele, “ Structure formation in thin kiquid films,” in S. Kalfudasis and U. Thiele, editors, “ Thin films of Soft Matter,” pages 25 – 93, Springer, Wien ( 2007 ).
[ 9 ] R. Xie. A. Karim, J. F. Ibuglas, C. C. C. C. Hun, and R. A. Weiss, “ Spinodal deverting of thin polymer films.” Phys. Rev. Lett. 8l, 1251 – 1254 ( 198 ).[ 10 ] R. Seenam, S. Herninghass, and K. facobs, “ Deveting patterns and nolecular forces : A mconcilizin, iniot,” Phys, Rev, Lett. 86.5534 – 5537 – 2001.
[ 11 ] U. Thirde. M. G. Velande, and K. Neufee, “ Deverting : Film rupture by nucleation in the spinodal regime,” Phys. Rev. Let. ( 016104 ( 2001 ).[ 12 ] M. Resitborn and K. Neuflex, “ Sarface patterns of laterally extended thin liquid tilms in three dimensions,” Phys. Rev. Lett. 8 ”, 046101 ( 2011 ).
[ 13 ] 1 Becker, G. Grin, R. Seeman, H. Maniz, K. Jacobs, K. Mexke, and R. Blossey, “ Complex deveting scenarios captured by this - tim models.” Nat. Mater 2.59 – 63 ( 2003 ).[ 14 ] C Redon, F. Brochard - Wurt, and F. Rondelez, “ Tronamics of deveting ” Phys. Rev. Lett. 66.715 – 718 ( 1991 ).
[ 15 ] R. Seeman, S. Herminghaus, and K. Jacobs, “ Shape of a liquid front upon develop.” Phys. Rev. Let. 8 ”, 196101 ( 2011 ).[ 10 ] R. Fetzer, K. Jaobs, A. Minch. B. Wagner, and T. P. Witebik, ‘ New slip regimes and the shape of deveting thin liquid films.’ Phys. Rev. Lett. MS, 127801 ( 2305 ).
[ 17 ] F. Brochan - Wyart and C. Redon, “ Dynamics of liquid rim instabilities,” Langmin K, 2124 – 233 ( 1992 ).[ 18 ] G, Reiter and A. Sharma, “ Auto - optimization of deweting rates by rin instabilities in slipping polymer films ” Phys. Rev. Lett. 8 ”, 166103 ( 2001 ).
[ 19 ] A. Minch and B. Wagner, ‘ Contact - line instability of dewetting thin films ’, ‘ Physica DB9.178 – 198 c2005 ).
", + "page_start": 25, + "page_end": 25, + "source_file": "1001.2669.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
S. H. Lee, P. 1. Yoo, S. J. Ksvon, and H. H. Lee, “ Solvent - driven dewetting and rim instability,” I.Chem. Phys. 121.4346 – 4351 ( 2004 ).
[ 52 ] L. Xia, T. F. Shi, P. K. Duta, and L. An, ‘ Rim instability by solvent - induced deverting ’. I. Chem. Phys. IZ?, 144704 ( 2007 ).[ 53 ] L. Xia, T. F. Shi, and L. 1 Aax, “ The devetiing dynamics of the polymer thin film by solvent ameale ung ”, I Chens. Phys. I29 ( 44904 ( 2008 ).
[ 54 ] M. Elbaum and S. G. Lipson, “ How does a thin weted lifn dry up ” Phys. Rev. Lett. 72.562 – 3565 ( 1994 ).[ 55 ] N. Samidered, S. G. Lipson, and D. S. Tannhauser, “ Pattern formation in drying water filtes.” Phys. Rev. E. SP, 2906 – 2913 ( 1998 ).
[ 56 ] A. Padmakar, K. Kargupta, and A. Sharma, “ Instability and devetting of exaporating thin water films on partially and completely wertable substrates.” I. Chem. Phys. I188.1735 – 1744 ( 1999 ).[ 57 ] A, V, Lysohin, A, Golovin, and L, M. Pismen, “ Fingering instability of thin evaponating liquid thims,” Phys. Rev, E6K, ( 221602 - 2002 ).
[ 58 ] L. M. Pismen, “ Spinodal devetting in a volatile liquid film,” Phys. Rev. E78.021601 ( 2004 ).[ 59 ] C. Pouland, O. Benichoa, and A. M. Carabat, “ Freely receifing evaporating droplets,” Langmuir B. 8825 – 8834 ( 2003 ).
( 60 ) Y. Gotkis, I. Ivasov, N. Murisic, and L. Kondic, “ Dynamic structure formation at the fronts of volatile faquid drops,” Phys. Rer. Lett. 97.186101 ( 2006 ).( 61 ) E. Paniliae Vasijour and P. Moriary, “ Meniscus - mediated organization of colloidal nanoparticles.” J. Phys. Chem. C IH, 16255 – 16268 ( 207 ).
( 2 ) C : Gigastic K. Dabosk - Veress, and J. R. Docher, “ Changes in the norphology of self - usembled polystyreme microphere monolayers produced by ameading.” I Colloid Interface Sci, 240.14 – 155 ( 2001 ).( 63 ) A. Onn, S. H. Davis, and S. G. Bankoff, “ Long - scale evolution of thin liquid films,” Rev. Mod. Phys. 69 ( 931 – 980 ( 1997 ).
[ 64 ] U. Thiele, “ Thin film evolution equations from ( exporating ) deveting liquid layers to epitaxial growth,” 1 Phys.- Cond. Mat ( 2010 ), ( at press ).
", + "page_start": 28, + "page_end": 28, + "source_file": "1001.2669.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
( 22 ) O. Karthaes, L. Grasjii, N. Manyama, and M. Shimomura, “ Formation of ordered mesoscopic polymer arrays by deverting.” Chaos 9.300 – 314 ( 1999 ).[ 23 ] X. Gu. D. Raghavaa, J. F. Doglas, and A. Karim, “ Hole - growth instability in the develting of evaporating polymer solution films,” J. Polym. Sci. Pt. B - Polym. Phys, 48.2025 – 2832 ( 2002 ).
[ 24 ] S. W. Hong. I. F. Xia, and Z. Q. Lin. “ Spontaneous formation of mesoscale polymer patterns in an evaporating bound solution.” Adv. Mater. Ifh J. 013 – 1417 ( 2007 ).[ 25 ] O. Lia. C : H. Ehange, I. Zhan, and V. X. Zhus, “ Study of the morphology of the three - phase contact line and in evolution by membrological examination after droplet experation of aqueous polymer solutions ” Langmin ( 24.702 – 700 ) ( 2800
[ 38 ] M. Merig. U. Thirde. I. Bradi, G. Leibiger, W. Ponge, and H. Wendrodic “ Scaning force microscopy and geometrical analysis of two - dimensional collagen network formation.” Sarface and hterface Asalysis 25.1097 ).[ 27 ] M. Merig. U. Thirde, J. Braft, D. Kenm, and W. Ponper “ Drovetting of thin collagenous precursor films,” App. Phys. A 66, S565 – S568 ( 1998 ).
[ 28 ] U. Thicke, M. Merig, and W. Pompe.; Thewetting of an exaporating thin liquid film : Heterogeneous micleation and surface instability.’ Phys. Rev. Let. 88.2609 – 2872 ( 1998 ).[ 29 ] H. Marda, ‘ An atomic force microscopy study of outered molecular assemblies and concentric ting patterns from evaporating droplets of collagen solutions,’ Langmair IE, 8505 – 8513 ( 1999 ).
[ 30 ] 1.1 Smalled, 4.5. V. 22bb, 1. C. Batler, 0.12 Laventovich, and G. C. L. Wong, “ Structure and physamics of liquid crystalline pattern formation in drying droplets of DNA.” Phys. Rev. Lett Men ( 177801 ). 2006.[ 31 ] L. Zhang, S. Mahesbwari, H. C. Chang, and Y. X. Zhu, “ Evaprative self - usembly from complex DNA - colloid suspensions,” Langmuir 24.3911 – 2917 ( 2018 ).
[ 12 ] M. Maillarid, L. Motte, A. T. Nigo, and M. P. Pileni, ‘ Rings and heragons made of nanocrystals : A. Marangoni effect.’ 1. Phys. Chem. B 184.11871 - 11877 ( 2000 ).[ 33 ] G L Ge and L. Bres, “ Evidence for spinodal phase separation in two - dimensional nanocrystal self - assembly.” 1. Phys. Chem. B 184.9573 – 9575 ( 200 ).
", + "page_start": 26, + "page_end": 26, + "source_file": "1001.2669.pdf" + }, + { + "text": "material of Ref. [40]), one clearly observes that different processes occur on different lenght \n\nscales. First, a macroscopic dewetting front recedes, leaving behind a seemingly dry substrate. \n\nThe macroscopic front can be transversely unstable resulting in large-scale (> 100µm) strongly \n\nanisotropic fingered structures. For fronts that move relatively quickly these macroscopic struc- \n\ntures cover all the available substrate. However, when at a later stage the macroscopic front be- \n\ncomes slower, those fingers become scarce and ‘macroscopic fingering’ finally ceases. At this ", + "page_start": 5, + "page_end": 5, + "source_file": "1001.2669.pdf" + }, + { + "text": "FIG. 8: (Colour online) Space-time plots are given for (left) the film thickness h and (right) the nanoparticle \n\nlayer height hp = hφ. The plot corresponds to the complete evolution resulting in the ring profile of \n\nFig. 6(b). In both panels bright [dark] parts denote high [low] regions. The prominent central dark-bright \n\nborder in the left panel indicates the change of the position of the contact line in time. Over time, four \n\nregimes can be distinguished: (i) fast motion before pinning, (ii) nearly no front motion during self-pinning, \n\n(iii) slow motion after depinning, and (iv) final evaporation from the center. ", + "page_start": 22, + "page_end": 22, + "source_file": "1001.2669.pdf" + }, + { + "text": "[1] G. Reiter, “Dewetting of thin polymer films,” Phys. Rev. Lett. 68, 75–78 (1992). \n\n[2] G. Reiter, “Mobility of polymers in films thinner than their unperturbed size,” Europhys. Lett. 23, \n\n579–584 (1993). \n\n[3] A. Sharma and G. Reiter, “Instability of thin polymer films on coated substrates: Rupture, dewetting \n\nand drop formation,” J. Colloid Interface Sci. 178, 383–399 (1996). \n\n[4] P.-G. de Gennes, “Wetting: Statics and dynamics,” Rev. Mod. Phys. 57, 827–863 (1985). ", + "page_start": 24, + "page_end": 24, + "source_file": "1001.2669.pdf" + }, + { + "text": "particles may at times play a rather more significant role. When the diffusion of the particles is \n\nslow, the evaporative dewetting fronts become transversely unstable and may result in strongly \n\nramified patterns. This instability is caused by the nanoparticles. The lower their mobility, the \n\nstronger the fingering effect, i.e., there are more fingers in (c) than in (d) because in the latter the \n\nmobility is larger. \n\nThe front instability is intriguing as it results in strongly branched structures. As the dewetting \n\nfront moves, new branches are continuously created and existing branches merge at the moving \n\ncontact line. However, the mean finger number in the streamwise direction of the resulting ramified \n\npattern is a constant. This behaviour is in contrast to the front instabilities found for dewetting ", + "page_start": 9, + "page_end": 9, + "source_file": "1001.2669.pdf" + }, + { + "text": "The patterns formed in dewetting processes have attracted strong interest since Reiter analysed the \n\nprocess quantitatively in the early nineties. In these experiments, that proved to be a paradigm in \n\nour understanding of dewetting, a uniform thin film of polystyrene (tens of nanometers thick) is \n\ndeposited on a flat silicon oxide substrate is brought above the glass transition temperature. The \n\nfilm ruptures in several places, forming holes which subsequently grow, competing for space. As a \n\nresult, a random polygonal network of liquid rims emerges. The rims may further decay into lines \n\nof small drops due to a Rayleigh-type instability [1–3]. The related problems of retracting contact \n\nlines on partially wetting substrates and the opening of single holes in rather thick films have also \n\nbeen studied [4, 5]. \n\nSubsequent work has mainly focused on many different aspects of the dewetting process for simple \n\nnon-volatile liquids and polymers (for reviews see Refs. [6–8]). All stages of the dewetting of a \n\nfilm are studied: the initial film rupture via nucleation or a surface instability (called spinodal \n\ndewetting) [1, 9–13], the growth process of individual holes [14–16], the evolution of the resulting ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2669.pdf" + }, + { + "text": "is similar to the size of the nanoparticles. At a certain distance from the macroscopic front, the \n\nultrathin film starts to evolve a locally isotropic pattern of holes. The holes themselves grow in an \n\nunstable manner resulting in an array of isotropically branched structures as shown, e.g., above in \n\nFig. 1. This indicates that at least some of the patterns described in the literature may have arisen \n\nfrom processes in similar ultrathin ‘postcursor’ films. \n\nThe existence of the ultrathin ‘postcursor’ film is an experimental finding that can be drawn on \n\nwhen choosing a theoretical approach to account for the pattern formation (see below). Note how- \n\never, that at the moment there exists no explanation for its existence. A possible hypothesis is \n\nthat the substrate strongly attracts the nanoparticles. As a result they form a dense suspension \n\nlayer having a thickness roughly equal to the diameter of the nanoparticles. The observed meso- \n\nscopic dewetting front then actually correspond to an autophobic dewetting of a low concentration \n\nsuspension from the higher concentration suspension on the surface of the substrate. ", + "page_start": 6, + "page_end": 6, + "source_file": "1001.2669.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0510.pdf", + "query": "Where are located the magnetic ions in the lattice of the studied layers ?", + "target_page": 2, + "target_passage": "the magnetic ions are located on the sites of a body-centered tetragonal (BCT) lattice", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "~Si are classical planar unit vectors representing the di- \nrection of the total angular momentum of the magnetic \nions, whose magnitude \nj(j + 1) (j = 8 for Holmium \nions) is already encompassed within the definition of the \ninteraction constants J0,1,2. As sketched in Fig. 1, the \nmagnetic ions are located on the sites of a body-centered \ntetragonal (BCT) lattice; the first sum appearing in the \nHamiltonian describes the in-plane (xy) nearest neigh- \nbor (NN) interaction, which is taken ferromagnetic (FM), \nwith exchange strength J0 > 0; the second sum rep- \nresents the coupling, of exchange strength J1, between \nspins belonging to nearest neighbor (NN) planes along \nthe z-direction (which we will assume to coincide with \nthe film growth direction); finally, the third sum takes \ninto account the interaction, of exchange strength J2, be- \ntween spins lying on next-nearest neighbor (NNN) planes \nalong z. In order to have frustration, giving rise to non- \ncollinear order along z in the bulk, NN interaction J1 \ncan be taken both ferro- or antiferromagnetic, but NNN \ncoupling J2 has necessarily to be antiferromagnetic, and \nthe condition |J2| > |J1|/4 must be fulfilled. Such simpli- \nfied Hamiltonian was already employed to simulate he- \nlical ordering in bulk systems by Diep1,17 and Loison18. \nIn the bulk limit, the state of minimal energy of a sys- \ntem described by Eq.(1) corresponds to a helical arrange- \nment of spins. The ground state energy per spin is equal \nto eg(Qz) = [−4J0 − 2J1 (4 cos (Qzc′) + δ cos (2Qzc′))] \nis the distance between NN layers, δ = J2 \nwhere c′ \nJ1 , \nand Qzc′ = arccos \nis the angle between spins ly- \ning on adjacent planes along the z-direction. The ob- \nserved helical arrangement in bulk holmium corresponds \nto Qzc′ ≃ 30.5◦10: \nsuch value can be obtained from \nthe formula above with the set of coupling constants \nJ0=67.2 K, J1=20.9 K, and J2 = −24.2 K, that we have \nemployed in our simulations. The given values for the ex- \nchange constants are the same already used by Weschke \net al. \nin Ref. 13 to interpret experimental data on \nHolmium films on the basis of a J1 − J2 model, after \na proper scaling by the numbers of NN and NNN on \nneighboring layers of a BCT lattice. \n\np ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0510.pdf" + }, + { + "text": "samples15, the projected Mn 3d magnetic moments are \nobtained as −1.4 µB and +0.8 µB per ion at remanence \nand 1000 Oe, respectively. \n\nmonolayers, assuming a uniform distribution of Mn ions \nand magnetic moments throughout the (Ga,Mn)As film. \nThis is around a factor of three thinner than in Ref.7, \nwhich could be due to the lower Mn concentration or the \ndifferent preparation method of the present samples. \n\nThe difference between these values can be understood \nas being due to an interface layer which is strongly anti- \nferromagnetically coupled to the Fe layer. At zero field, \nboth the interfacial and bulk Mn are aligned antiparallel \nto the Fe layer. At high fields, the bulk of the (Ga,Mn)As \nlayer away from the interface is re-oriented into the exter- \nnal field direction. However, the interfacial Mn remains \nantiparallel to the Fe layer and thus partially compen- \nsates the XMCD signal from the bulk of the (Ga,Mn)As. \nFrom the size of the remanent and 1000 Oe magnetic \nmoments, it can be estimated that around 25-30% of the \nTEY XMCD signal can be ascribed to the interfacial Mn \nwhich is strongly coupled to the Fe moments. ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2449.pdf" + }, + { + "text": "be achieved with different number of interacting layers: \nnotably, nearest and next-nearest layers competitive in- \nteractions are enough to get a helical structure with a \nwhatever pitch wavevector. Such observation gives us a \npossible way to solve the conundrum previously emerged, \nas we have the possibility of varying the range of inter- \nactions without modifying the helical pitch, thus decou- \npling the two relevant length scales along the film growth \ndirection, and making accessible a range of n of the or- \nder of, or smaller than, the helical pitch, but still large \nenough that a substantial number of layers can behave \nas “bulk” layers. Therefore, while in the previous papers \nwe have studied the properties of ultrathin magnetic films \nof Ho assuming a model with six interlayer exchange in- \nteractions, here we investigate by MC simulations the \nproperties of the same system by making use of the sim- \nplest model Hamiltonian able to describe the onset of a \nhelical magnetic order in Holmium, i.e. we consider only \ntwo inter-layer coupling constants, as previously done in \nRef. 11. \n\nThe paper is organized as follows: In Sec. II the model \nHamiltonian will be defined, and the MC techniques, and \nall the thermodynamic quantities relevant for this study, \nwill be introduced. In Sec. III the results obtained for \ndifferent thicknesses will be presented, both in the matter \nof the critical properties of the model and of the magnetic \nordered structures observed. Finally, in Sec. IV we shall \ndiscuss such results, drawing also some conclusions. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0510.pdf" + }, + { + "text": "In a previous study, where the magnetic properties of \nHo thin films were investigated by MC simulations of a \nHeisenberg model with easy-plane single-ion anisotropy \nand six out-of-plane coupling constants (as obtained by \nexperimental neutron scattering measurements16) on a \nHCP lattice14,15, it was found that for thicknesses compa- \nrable with the helical pitch the phase diagram landscape \nis quite different from what we find here. \nIndeed, for \nn = 9 − 16, three different magnetic phases could be sin- ", + "page_start": 5, + "page_end": 5, + "source_file": "1001.0510.pdf" + }, + { + "text": "Figure 2(a)-(c) shows the magnetic field dependence of \nXMCD asymmetry, defined as (Il − Ir)/(Il + Ir) where \nIl(r) is the absorption for left- (right-) circularly polarized \nx-rays. This is measured at the Fe and Mn L3 absorption \npeaks for a Fe(2 nm)/(Ga,Mn)As(10 nm) sample at 2 K. \nThe external field is applied along the photon incidence \ndirection, which is at 70◦ to the surface normal with \nan in-plane projection along the [110] axis. The XMCD \ndata show that the Fe film displays a square hysteresis \nloop with a single magnetization switch, as expected for \na monocrystalline Fe film with strong uniaxial magnetic \nanisotropy. The Mn XMCD shows a more complicated \nloop due to the effect of the interlayer coupling. The pro- \njected Mn moment aligns antiparallel to the Fe moment \nat remanence, and undergoes a magnetization reversal of \nopposite sign to the Fe. With further increase of the ex- \nternal magnetic field, the Mn moment gradually rotates \naway from antiparallel alignment with the Fe layer, and \ninto the field direction. Qualitatively similar behavior \nis observed for the Fe(2 nm)/(Ga,Mn)As(20 nm) sam- \nple: the (Ga,Mn)As layer is aligned antiparallel to the \nFe layer at zero field, although the bias field is lower by \napproximately a factor of two. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "L2,3 absorption edges in order to determine the magnetic \nresponse of the individual elements. In L2,3 XMCD, elec- \ntrons are excited from a 2p core level to the unoccupied \n3d valence states of the element of interest by circularly \npolarized x-rays at the resonance energies of the transi- \ntions. The difference in absorption for opposite polariza- \ntions gives a direct and element-specific measurement of \nthe projection of the 3d magnetic moment along the x- \nray polarization vector. The absorption cross-section is \nconventionally obtained by measuring the decay products \n– either fluorescent x-rays or electrons – of the photoex- \ncited core hole. The type of decay product measured \ndetermines the probing depth of the technique. For Mn \nL2,3 absorption, the probing depths for FY and TEY de- \ntection are λF Y ≈ 100 nm and λT EY ≈ 3 nm. \nIn the \ncurrent experiment, the Mn XMCD measured using FY \nand TEY are thus sensitive to the bulk of the (Ga,Mn)As \nfilm and the near-interface layers, respectively. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "Clear differences are observed between the Mn XMCD \nhysteresis loops obtained using TEY and FY detection \nmodes. For FY the magnitude of the XMCD is similar \n(but of opposite sign) at remanence and at high mag- \nnetic fields, whereas for TEY at remanence it is approx- \nimately a factor of two larger than at 1000 Oe. The \nMn L2,3 XMCD spectra recorded at remanence and at \n1000 Oe, shown in Fig. 3, confirm this result. At re- \nmanence the FY and TEY detected XMCD have similar \nmagnitudes. However, under a large external field the \nXMCD is substantially smaller in TEY than in FY, con- \nfirming that the net magnetization of the Mn ions near \nthe interface is significantly less than in the bulk of the \n(Ga,Mn)As film. This is the case even up to the high- \nest field applied (20 kOe). By applying the XMCD sum \nrules14 to the TEY data, and by comparing the spectra to \nprevious measurements on well-characterized (Ga,Mn)As ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "In the following we will denote with n the film thick- \nness, i.e. the number of spin layers along the z direction, \nand with L×L the number of spins in each layer (i.e., L \nis the lattice size along both the x and y directions). In \nour simulations thickness values from 1 to 24 were con- \nsidered, while the range of lateral size L was from 8 to \n64. Periodic boundary conditions were applied along x \nand y, while free boundaries were obviously taken along \nthe film growth direction z. \n\nThermal equilibrium was attained by the usual \nMetropolis algorithm19, \nsupplemented by the over- \nrelaxed technique20 in order to speed-up the sampling \nof the spin configuration space: a typical “Monte Carlo \nstep” was composed by four Metropolis and four-five \nover-relaxed moves per particle. Such judicious mix of \nmoves is able both to get faster the thermal equilibrium \nand to minimize the correlation “time” between succes- \nsive samples, i.e. the undesired effects due to lack of in- ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0510.pdf" + }, + { + "text": "FIG. 6: Rotation angle ∆ϕl between magnetic moments on \nNN layers (l + 1, l) at some low temperatures, for thickness \nn = 5 and n = 6, and lateral dimension L = 64. \n\nthe same is true for the crossing point of the Binder cu- \nmulant of the average magnetization M (not reported in \nfigure), which is located at TC(8) = 133.3(3) K. These \ndata give a first rough indication that also for n = 8 all \nthe planes of the sample are still ordering almost at the \nsame temperature; such property has been observed for \nall the investigated thicknesses n below 16, so that TC(n) \nresults quite n-independent (see also Fig. 5) . \nl , M y \n\nwhere (M x \nl ) is the magnetic vector profile for each \nplane l. ∆ϕl is displayed in Fig. 6a and Fig. 6b, for \nn = 6 and n = 5, respectively. In Fig. 6a, a quite clear \nfan stabilization is observed when the temperature de- \nfor n = 5, ∆ϕl keeps an \ncreases, while in Fig. 6b, i.e. \nalmost temperature independent very small value; what’s \nmore, ∆ϕl seems to loose any temperature dependence \nas T = 0 is approached. We attribute the absence of fan \narrangement for n ≤ 5 as simply due to the lack of “bulk \nplanes” inside the film, so that we are left with only a 2d \ntrend at TC(n), i.e. at the temperature where the order \nparameters defined in Eqs. (2) and (3) show a critical \nbehaviour. ", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0510.pdf" + }, + { + "text": "measurements were performed on beamline I06 at the \nDiamond Light Source, and on beamline 4.0.2 at the Ad- \nvanced Light Source. Total-electron yield (TEY) and \nfluorescence yield (FY) were monitored simultaneously \nusing the sample drain current and the photocurrent of a \ndiode mounted at 90◦ to the incident beam, respectively. \nwere \nmagnetometry \nand \ncontrol Fe/GaAs(001) \nfirst \non \nperformed \ngrown under \nthe \nsamples, \n(Ga,Mn)As/GaAs(001) \nsame conditions as the bilayers, \nto determine the \nmagnetic anisotropies of the individual layers and the \nCurie temperature of the (Ga,Mn)As layer. The Fe film \nhas a uniaxial magnetic anisotropy with easy axis along \nthe [110] orientation, similar to previous studies6. For \nthe (Ga,Mn)As control sample, there is a competition \nbetween cubic and uniaxial magnetic anisotropies, with \nthe former dominant at low temperatures and favoring \neasy axes along the in-plane h100i orientations, and the \nlatter dominant close to TC (∼35 K) giving an easy axis \nalong the [1¯10] orientation. Figure 1 shows [110] magne- \ntization versus temperature curves and low temperature \nhysteresis loops for a bilayer film containing a 20 nm \nthick (Ga,Mn)As layer. The total remnant moment of \nthe bilayer film decreases on cooling under zero magnetic \nfield below the TC of the (Ga,Mn)As, indicating that \nthis layer aligns antiparallel to the Fe magnetization \nat zero field. The hysteresis curve shows a two-step \nmagnetization reversal, indicating different behavior of \nthe Fe and (Ga,Mn)As layers, with the smaller loop \nattributed to the dilute moment (Ga,Mn)As film. The \nminor hysteresis loop shown in Fig. 1 clearly shows a \nshift from zero field by a bias field HE, indicating that \nthe Fe layer induces an exchange bias in the magnetic \nsemiconductor. The shape and size of the minor loop \nis in agreement with the hysteresis loop for the control \n(Ga,Mn)As sample, also shown in Fig. 1. This strongly \nindicates that the exchange bias affects the whole of the \n(Ga,Mn)As layer in the bilayer sample. \n\nSQUID ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0510.pdf", + "query": "What is the minimum number of spin layers in a film before a correct bulk is reached ?", + "target_page": 1, + "target_passage": "For n > 16, n being the number of spin layers in the film, a correct bulk limit is reached", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "In the following we will denote with n the film thick- \nness, i.e. the number of spin layers along the z direction, \nand with L×L the number of spins in each layer (i.e., L \nis the lattice size along both the x and y directions). In \nour simulations thickness values from 1 to 24 were con- \nsidered, while the range of lateral size L was from 8 to \n64. Periodic boundary conditions were applied along x \nand y, while free boundaries were obviously taken along \nthe film growth direction z. \n\nThermal equilibrium was attained by the usual \nMetropolis algorithm19, \nsupplemented by the over- \nrelaxed technique20 in order to speed-up the sampling \nof the spin configuration space: a typical “Monte Carlo \nstep” was composed by four Metropolis and four-five \nover-relaxed moves per particle. Such judicious mix of \nmoves is able both to get faster the thermal equilibrium \nand to minimize the correlation “time” between succes- \nsive samples, i.e. the undesired effects due to lack of in- ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0510.pdf" + }, + { + "text": "to a certain extent the particle-particle attraction. Normally, the solution is deposited on to a plain \n\nsilicon substrate that is covered by the native oxide layer only [34]. However, one may locally \n\nchange the wetting behaviour of the solvent by further oxidising the substrate [38]. By adding \n\nexcess thiol one can also vary the properties of the solvent [40]. \n\nTwo different procedures are employed for the deposition of the solution on to the substrate: spin- \n\ncoating or a meniscus technique [61, 62]. The choice is important as it strongly influences the \n\nevaporation rate and, as a result, the pattern formation process. When using spin-coating, one finds \n\nthat directly after deposition, evaporation competes with dewetting until all the solvent has evapo- \n\nrated. The resulting deposits of nanoparticles are imaged by atomic force microscopy (AFM). For \n\nspin-coated films, the evaporation rate is high and structuring is normally finished before the spin- \n\ncoater is stopped. Conversely, the solvent evaporation rate is strongly decreased when employing \n\nthe meniscus technique [61], i.e., by depositing a drop of solution on a Teflon ring that is wetted by ", + "page_start": 5, + "page_end": 5, + "source_file": "1001.2669.pdf" + }, + { + "text": "samples15, the projected Mn 3d magnetic moments are \nobtained as −1.4 µB and +0.8 µB per ion at remanence \nand 1000 Oe, respectively. \n\nmonolayers, assuming a uniform distribution of Mn ions \nand magnetic moments throughout the (Ga,Mn)As film. \nThis is around a factor of three thinner than in Ref.7, \nwhich could be due to the lower Mn concentration or the \ndifferent preparation method of the present samples. \n\nThe difference between these values can be understood \nas being due to an interface layer which is strongly anti- \nferromagnetically coupled to the Fe layer. At zero field, \nboth the interfacial and bulk Mn are aligned antiparallel \nto the Fe layer. At high fields, the bulk of the (Ga,Mn)As \nlayer away from the interface is re-oriented into the exter- \nnal field direction. However, the interfacial Mn remains \nantiparallel to the Fe layer and thus partially compen- \nsates the XMCD signal from the bulk of the (Ga,Mn)As. \nFrom the size of the remanent and 1000 Oe magnetic \nmoments, it can be estimated that around 25-30% of the \nTEY XMCD signal can be ascribed to the interfacial Mn \nwhich is strongly coupled to the Fe moments. ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2449.pdf" + }, + { + "text": "which may further disrupt the interface order. The ori- \ngin of the interface magnetism then had to be inferred by \ncomparison to a series of reference samples7. Demonstra- \ntion of coupling between the bulk of the layers, i.e., an \nexchange bias effect, would provide direct evidence of the \ninterface magnetic order. Moreover, such coupling would \noffer new means of manipulating the FM semiconductor \nspin state and utilizing the proximity polarization effect \nin a spintronic device. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2449.pdf" + }, + { + "text": "be achieved with different number of interacting layers: \nnotably, nearest and next-nearest layers competitive in- \nteractions are enough to get a helical structure with a \nwhatever pitch wavevector. Such observation gives us a \npossible way to solve the conundrum previously emerged, \nas we have the possibility of varying the range of inter- \nactions without modifying the helical pitch, thus decou- \npling the two relevant length scales along the film growth \ndirection, and making accessible a range of n of the or- \nder of, or smaller than, the helical pitch, but still large \nenough that a substantial number of layers can behave \nas “bulk” layers. Therefore, while in the previous papers \nwe have studied the properties of ultrathin magnetic films \nof Ho assuming a model with six interlayer exchange in- \nteractions, here we investigate by MC simulations the \nproperties of the same system by making use of the sim- \nplest model Hamiltonian able to describe the onset of a \nhelical magnetic order in Holmium, i.e. we consider only \ntwo inter-layer coupling constants, as previously done in \nRef. 11. \n\nThe paper is organized as follows: In Sec. II the model \nHamiltonian will be defined, and the MC techniques, and \nall the thermodynamic quantities relevant for this study, \nwill be introduced. In Sec. III the results obtained for \ndifferent thicknesses will be presented, both in the matter \nof the critical properties of the model and of the magnetic \nordered structures observed. Finally, in Sec. IV we shall \ndiscuss such results, drawing also some conclusions. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0510.pdf" + }, + { + "text": "Similar behavior is observed for bilayer samples con- \ntaining a 10 nm or 50 nm (Ga,Mn)As layer, with a \nbias field which is approximately inversely proportional \nto the thickness d of the ferromagnetic semiconductor \nlayer (Fig. 1, inset). This 1/d dependence of HE was \nfound previously for MnAs/(Ga,Mn)As bilayers4, and \nis generally observed in exchanged-biased thin films12. \nFrom this dependence it is possible to describe the ex- \nchange bias in terms of an interface energy per unit area, \n∆E = MF SHEd = 0.003 erg/cm2. This value is rather \nsmall compared to typical exchange bias systems12, re- \nflecting the low moment density MF S of the diluted \nFM semiconductor layer. However, the bias field for a \ngiven (Ga,Mn)As thickness is larger than is observed for \nMnO/(Ga,Mn)As structures13, while the reproducibility \nand flexibility of the present structures is much higher \ndue to the single-crystalline ferromagnetic nature of the \nFe layer. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "140 \n\n120 ) \nK \n( \n100 \n*)*\n*n*\n*(*\n80 *C*\n\n*TN (n)*\n*TC (n)*\n*bulk*\n\n*T*\n*,*\n60 \n*)*\n*n*\n*(*\n40 \n*N*\n*T*\n*TN*\n20 \n\n0 \n0 2 4 6 8 \n10 \n*n*\n\nFIG. 5: Transition temperatures TN (n) and TC (n) vs. film \nthickness n. ", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0510.pdf" + }, + { + "text": "In summary, we have demonstrated antiferromagnetic \ncoupling between Fe and (Ga,Mn)As layers in bilayer \nstructures. A markedly different coupling is observed for \nthe bulk of the (Ga,Mn)As layer and for Mn moments \nin the near-interface region. A thickness-dependent ex- \nchange bias field is observed to affect the whole of the \nbulk (Ga,Mn)As layer, which aligns antiparallel to the \nFe layer at low fields, and switches to parallel when the \nexternal field is large enough to overcome the bias field \nand the magnetocrystalline anisotropy fields. In contrast, \nthe interfacial Mn moments remain aligned antiparallel \nto the Fe layer even at 20 kOe, the largest field studied, \nand are polarized at temperatures well above the TC of \nthe bulk (Ga,Mn)As layer. The latter observation con- \nfirms the recently reported result of Ref. 7, in which \nthe Fe/(Ga,Mn)As bilayers were produced by a different \nmethod but showed qualitatively similar behavior of the \ninterfacial moments. Our results shed new light on the \nmagnetic coupling in Fe/(Ga,Mn)As hybrid layers which \nare of potential interest for room temperature spintron- \nics, and also offer a means of controlling the spin orien- \ntation in a FM semiconductor. \nfrom EU grants \nacknowledge \nand \nSemiSpinNet-215368 \nSTFC studentship grant CMPC07100. The Advanced \nLight Source is supported by the U.S. Department of \nEnergy under Contract No. \nDE-AC02-05CH11231. \nWe thank Leigh Shelford for help during the Diamond \nbeamtime. \n\nWe ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2449.pdf" + }, + { + "text": "] \ni \nc \ns \n- \nl \nr \nt \n\nFerromagnetic (FM) semiconductors offer the prospect \nof combining high-density storage and gate-controlled \nlogic in a single material. The realization of spin-valve \ndevices from FM semiconductors requires the controlled \nswitching of magnetization in adjacent layers between \nantiferromagnetic (AFM) and FM configurations. This \nhas motivated several theoretical investigations of inter- \nlayer coupling in all-semiconductor devices1, and AFM \ncoupling has recently been demonstrated in (Ga,Mn)As \nmultilayers separated by p-type non-magnetic spacers2. \nHowever, the Curie temperature TC of (Ga,Mn)As is \ncurrently limited to 185 K in single layers3, and is \ntypically much lower for layers embedded within a \nheterostructure2, which is an obstacle to the practical \nimplementation of semiconductor spintronics. \n\nm \n\n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\nHere, we demonstrate an antiferromagnetic coupling \nand exchange bias in Fe/(Ga,Mn)As bilayer films, by \ncombining element-specific XMCD measurements and \nbulk-sensitive superconducting quantum interference de- \nvice (SQUID) magnetometry. As with previous studies \nof FM metal/FM semiconductor bilayers4,5 (and in con- \ntrast to AFM coupled FM metal/FM metal exchange bias \nstructures10,11) the layers are in direct contact without \na non-magnetic spacer in between. We distinguish in- \nterface and bulk (Ga,Mn)As layers that are respectively \nstrongly and weakly antiferromagnetically coupled to the \nFe overlayer. In agreement with Ref.7, the interface layer \nremains polarized at room temperature. \n\n1 \nv \n9 \n4 \n4 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2449.pdf" + }, + { + "text": "where the sum refers to spins belonging to NN layers \ni and j, respectively, while Qz is the bulk helical pitch \nvector along the z direction. The second possibility is \nthat of looking at the integral of the structure factor: \n\nwhere β = 1/kBT , and o is one of the relevant observ- \nables, i.e. ml, M, κ, MHM . In this paper, we shall mainly \nlocate the critical temperature by looking at the intersec- \ntion of the graphs of the Binder cumulant25, Eq. (9), as a \nfunction of T obtained at different L. For clarity reasons, \nwe introduce also the following symbols: by TN (n) we \nwill denote the helical/fan phase transition temperature \nfor thickness n, TC(n) will instead indicate the order- \ning temperature of the sample as deduced by looking at \nthe behaviour of the average order parameter (3), while \nT l \nC(n) will be the l-th plane transition temperature re- \nlated to the order parameter defined in Eq. (2). \n\nπ \n\n1 \nK Z \n0 \nMHM = dqzS(~q) (5) ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0510.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_JWN_2014.pdf", + "query": "What the rough sales amount of the nordstrom.com website ?", + "target_page": 3, + "target_passage": "$2 billion in nordstrom.com sales", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Nordstrom.com net sales increased $115, or 19%, on top of last year’s 30% increase for the same period. Nordstromrack.com and \nHauteLook net sales increased $24, or 28%, compared with the same period in 2013. Both were primarily driven by expanded merchandise \nselection and ongoing technology investments to enhance the customer experience. ", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**4 million**\n\nNEARLY \n\n**NEW CUSTOMERS**SHOPPED AT \nNORDSTROM RACK—THAT’S MORE THAN \nAT ANY OTHER CHANNEL. \n\n**27**\n\n**NEW NORDSTROM RACK STORES.**\nPLUS, RACK SALES INCREASED 17% AND \nRACK COMPARABLE SALES GAINED 3.8%. ", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Our Nordstrom.com, Nordstromrack.com and HauteLook channels continued to experience outsized growth. Nordstrom.com net sales \nincreased 23% and Nordstromrack.com and HauteLook net sales increased 22%, both driven by expanded merchandise selection and \nongoing technology investments to enhance the customer experience. \n\nNordstrom Rack net sales increased $477, or 17%, compared with 2013, reflecting incremental volume from existing stores and the impact of \n27 new stores since fiscal 2013. Comparable sales increased 3.8% for the year. Shoes and Accessories were the top-performing categories \nfor the year. On a comparable basis, the average selling price of Nordstrom Rack merchandise increased while the number of items sold was \nflat. \n\nNet Sales (2013 vs. 2012) \nNet sales for 2013 increased 3.4% compared with 2012, driven by a comparable sales increase of 2.5%, attributable to growth at \nNordstrom.com and Nordstrom Rack’s accelerated store expansion. During 2013, we opened 22 Nordstrom Rack stores and relocated one \nNordstrom full-line store and two Nordstrom Rack stores. These additions represented 1.6% of our total net sales for 2013 and increased our \nsquare footage by 2.9%. The 53rd week in 2012 contributed approximately $162 in additional net sales. ", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Nordstrom Rack net sales for the quarter increased $130, or 17%, reflecting 27 new Nordstrom Rack store openings since the fourth quarter \nof 2013, while comparable sales increased 3.2%. On a comparable basis, the average selling price of Nordstrom Rack merchandise \nincreased while the number of items sold was flat. Shoes and Accessories were the category highlights for Nordstrom Rack. \n\nGross Profit \nOur total company gross profit rate decreased 53 basis points compared with the same period in the prior year, primarily due to increased \nmarkdowns at Nordstrom Rack. \n\nRetail Selling, General, and Administrative Expenses \nOur Retail SG&A rate increased 80 basis points primarily due to expenses related to the acquisition of Trunk Club and ongoing technology \nand fulfillment expenses. \n\nCredit Expenses \nIn the fourth quarter, expenses for our Credit segment of $54 increased from $38 in the prior year. The increase was primarily driven by \nhigher operational expenses resulting from a 6% increase in credit volume during the fourth quarter of 2014. The fourth quarter of 2013 also \nincluded the impact of the conversion of our Nordstrom Rewards travel benefit into Nordstrom Notes, which decreased operational expenses \nin the prior year. \n\nFor further information on our quarterly results in 2014 and 2013, refer to Note 17: Selected Quarterly Data in the Notes to Consolidated \nFinancial Statements in Item 8: Financial Statements and Supplementary Data. ", + "page_start": 36, + "page_end": 36, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**Item 7. Management’s Discussion and Analysis of Financial Condition and Results of Operations.**\nDollar, share and square footage amounts in millions except percentages, per share and per square foot amounts \n\n**OVERVIEW**\nNordstrom is a leading fashion specialty retailer offering apparel, shoes, cosmetics and accessories for women, men and children. We offer \nan extensive selection of high-quality brand-name and private label merchandise through our various channels: “Nordstrom” branded full-line \nstores and online store at Nordstrom.com, Nordstrom Rack stores, Nordstromrack.com and HauteLook and other retail channels, including \nTrunk Club showrooms and TrunkClub.com, our Jeffrey boutiques and our clearance store that operates under the name “Last Chance.” As \nof January 31, 2015, our stores are located in 38 states throughout the United States and in one province in Canada. In addition, we offer our \ncustomers a Nordstrom Rewards™ loyalty program along with a variety of payment products and services, including credit and debit cards. \n\nWe continue to see the ongoing evolution of retail, with increasing customer interaction between our stores and ecommerce. We are making \nprogress to meet customer expectations of a personalized experience that merges the richness of stores with the convenience of online. \nBecause the customer views us simply as Nordstrom, we believe there is tremendous value in strengthening our platform for the customer \nexperience that encompasses full-price, off-price, in-store and online. While each channel represents a substantial growth opportunity, there \nare significant synergies across channels to create a unique customer experience to gain market share. ", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Nordstrom net sales for 2013 were $9,327, an increase of 1.0% compared with 2012, with comparable sales up 2.3%. Strong growth at \nNordstrom.com was partially offset by sales decreases at our full-line stores. Both the average selling price and the number of items sold \nincreased on a comparable basis in 2013 compared with 2012. Category highlights included Cosmetics, Men’s Shoes and Women’s Apparel. \n\nFull-line net sales for 2013 were $7,705, a decrease of 3.3% compared with 2012, which was primarily driven by a comparable sales \ndecrease of 2.1% for the year. The top-performing geographic regions for full-line stores for 2013 were the Southwest and Southeast. \nNordstrom.com showed strong sales growth with net sales of $1,622, an increase of 28% compared with 2012, with comparable sales up \n30% on a comparable 52-week basis. These increases were driven by expanded merchandise selection and ongoing technology \ninvestments to enhance the customer experience. \n\nNordstrom Rack net sales were $2,738, up 12.0% compared with 2012, primarily due to 37 new store openings in 2012 and 2013. \nComparable sales increased 2.7% for the year. Cosmetics and Shoes were the strongest-performing categories for the year. Both the \naverage selling price and the number of items sold increased on a comparable basis in 2013 compared with 2012. ", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "For printed versions of these items or any other inquiries, please contact: \n\nNordstrom Investor Relations \nPO Box 2737 \nSeattle, Washington 98111 \n(206) 303-3200 \ninvrelations@nordstrom.com \n\n**Item 1A. Risk Factors.**\n\nOur business faces many risks. We believe the risks described below outline the items of most concern to us. \n\n**RISKS DUE TO STRATEGIC AND OPERATIONAL FACTORS**\n\n**Our customer strategy focuses on providing a seamless, cohesive and high-quality experience across all Nordstrom channels and**\n**failure to successfully execute our plans could negatively impact our current business and future profitability.**\nWe are enhancing our customer shopping experience in our stores, online, and in mobile and social channels by pursuing a heightened \nfocus on technology and ecommerce to fuel our growth. With the accelerated pace of change in the retail environment, we may not be able to \nmeet our customers’ changing expectations in how they shop in stores or through ecommerce. If we target the wrong opportunities, fail to \nmake investments at the right time or pace, fail to make the best investments in the right channels or make an investment commitment \nsignificantly above or below our needs, it may result in the loss of our competitive position. If these technologies and investments do not \nperform as expected or are not seamlessly integrated, our profitability and growth could be adversely affected. In addition, if we do not \nmaintain our current systems, we may see interruptions to our business and increased costs in order to bring our systems up to date. ", + "page_start": 17, + "page_end": 17, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**COMPETITIVE CONDITIONS**\nWe operate in a highly competitive business environment. We compete with other national, regional, local and online retailers that may carry \nsimilar lines of merchandise, including department stores, specialty stores, off-price stores, boutiques and Internet businesses. Our specific \ncompetitors vary from market to market. We believe the keys to competing in our industry are providing great customer service and customer \nexperiences in stores and online, which includes compelling price and value, fashion newness, quality of products, selection, convenience, \ntechnology, product fulfillment, personalization and appealing, relevant store environments in top locations. \n\n**INVENTORY**\nWe plan our merchandise purchases and receipts to coincide with expected sales trends. For instance, our merchandise purchases and \nreceipts increase prior to our Anniversary Sale, which has historically extended over the last two weeks of July. We also purchase and \nreceive a larger amount of merchandise in the fall as we prepare for the holiday shopping season (from late November through December). \nBeginning in 2012, we increased our investment in pack and hold inventory at Nordstrom Rack, which involves the strategic purchase of \nmerchandise from some of our full-line stores’ top brands in advance of the upcoming selling seasons to take advantage of favorable buying \nopportunities. This inventory is typically held for six months on average and has contributed to the growth in our Nordstrom Rack business. \nWe pay for our merchandise purchases under the terms established with our vendors. ", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Our fourth quarter sales trends were consistent with trends the company experienced throughout 2014. We continued to make progress \nexecuting our customer strategy through investments to drive growth across channels. Net earnings for the fourth quarter of 2014 were $255, \nor $1.32 per diluted share, compared with $268, or $1.37 per diluted share, in 2013. The Trunk Club acquisition reduced earnings before \ninterest and taxes in the fourth quarter by $11. \n\nNet Sales \nTotal net sales increased in the fourth quarter by 9.0%, driven by a comparable sales increase of 4.7% and 35 new stores in 2014. \n\nNordstrom net sales, which consist of the full-line stores in the U.S. and Nordstrom.com businesses, increased $141, or 5.0%, compared with \nthe same period in 2013, while comparable sales increased 4.5%. Both the number of items sold and the average selling price of our \nmerchandise increased on a comparable basis. Category highlights for the quarter were Cosmetics, Accessories and Men’s Apparel. \n\nU.S. full-line net sales for the quarter increased $26, or 1.2%, compared with the same period in 2013, with an increase in comparable sales \nof 0.5%. The Southwest and Southeast were the top-performing geographic regions. ", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "At Nordstrom Rack, we offer customers great brands at great prices, with 48 of the top 50 full-line brands represented. We opened 27 \nNordstrom Rack stores in 2014, a record number of openings, contributing to Nordstrom Rack’s total sales growth of 17%. \n\nOur online businesses continue to be our fastest-growing channels. In the spring of 2014, we expanded our capabilities through the launch of \nNordstromrack.com, providing a seamless integration with HauteLook. We more than doubled our merchandise selection, which accelerated \ngrowth in this channel in the second half of 2014. Demonstrating synergies across our businesses, we enabled customers to return \npurchases from HauteLook and Nordstromrack.com to any of our Nordstrom Rack stores, which drove nearly one million incremental trips to \nNordstrom Rack stores. \n\nNordstrom.com finished its fifth consecutive year of approximately 20% or more comparable sales growth, with a key driver being increased \nmerchandise selection. In 2015, we plan to open our third fulfillment center, located in Pennsylvania, which will enhance the customer \nexperience through faster delivery. Furthermore, we have extended our full-price offering with our acquisition of Trunk Club, a high-growth \nbusiness offering a new approach to personalized service. ", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_JWN_2014.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_JWN_2014.pdf", + "query": "How many employees did Nordstrom count in 2014 ?", + "target_page": 17, + "target_passage": "During 2014, we employed approximately 67,000 employees on a full- or part-time basis.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "In order to offer merchandise that our customers want, we purchase from a wide variety of high-quality suppliers, including domestic and \nforeign businesses. We also have arrangements with agents and contract manufacturers to produce our private label merchandise. We \nexpect our suppliers to meet our “Nordstrom Partnership Guidelines,” which address our corporate social responsibility standards for matters \nsuch as legal and regulatory compliance, labor, health and safety and the environment, and are available on our website at Nordstrom.com. \n\n**EMPLOYEES**\nDuring 2014, we employed approximately 67,000 employees on a full- or part-time basis. Due to the seasonal nature of our business, \nemployment increased to approximately 68,000 employees in July 2014 and 73,500 in December 2014. All of our employees are non-union. \nWe believe our relationship with our employees is good. \n\n**CAUTIONARY STATEMENT**\nCertain statements in this Annual Report on Form 10-K contain or may suggest “forward-looking” information (as defined in the Private \nSecurities Litigation Reform Act of 1995) that involve risks and uncertainties, including, but not limited to, anticipated financial outlook for the \nfiscal year ending January 30, 2016, anticipated annual total and comparable sales rates, anticipated new store openings in existing, new \nand international markets, anticipated Return on Invested Capital and trends in our operations. Such statements are based upon the current \nbeliefs and expectations of the company’s management and are subject to significant risks and uncertainties. Actual future results may differ \nmaterially from historical results or current expectations depending upon factors including, but not limited to: ", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "At Nordstrom Rack, we offer customers great brands at great prices, with 48 of the top 50 full-line brands represented. We opened 27 \nNordstrom Rack stores in 2014, a record number of openings, contributing to Nordstrom Rack’s total sales growth of 17%. \n\nOur online businesses continue to be our fastest-growing channels. In the spring of 2014, we expanded our capabilities through the launch of \nNordstromrack.com, providing a seamless integration with HauteLook. We more than doubled our merchandise selection, which accelerated \ngrowth in this channel in the second half of 2014. Demonstrating synergies across our businesses, we enabled customers to return \npurchases from HauteLook and Nordstromrack.com to any of our Nordstrom Rack stores, which drove nearly one million incremental trips to \nNordstrom Rack stores. \n\nNordstrom.com finished its fifth consecutive year of approximately 20% or more comparable sales growth, with a key driver being increased \nmerchandise selection. In 2015, we plan to open our third fulfillment center, located in Pennsylvania, which will enhance the customer \nexperience through faster delivery. Furthermore, we have extended our full-price offering with our acquisition of Trunk Club, a high-growth \nbusiness offering a new approach to personalized service. ", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "We considered 2014 a watershed year in our company history, with our successful entry into Canada, continued expansion of our Nordstrom \nRack business through store growth, the launch of Nordstromrack.com and the acquisition of Trunk Club. Our performance in 2014 reflected \ncontinued progress in executing our customer strategy through investments to drive growth across channels. We achieved total net sales \ngrowth of 7.8%, adding nearly $1 billion to our top-line and delivering record sales and earnings per diluted share. Our financial position \nremains strong and this marked the sixth consecutive year we generated over $1 billion in cash flow from operations. \n\nOur partnership with vendors and brands enhances our product offering. We offer Topshop merchandise at 53 full-line stores and online, with \nplans to reach over 80 stores in 2015. Our new partnership with Madewell in 2015, initially available at 15 of our stores and online, is another \nway to provide sought-after brands that appeal to new and existing customers. \n\nIn 2014, we opened our first full-line store in Canada in Calgary, Alberta, reflecting a multi-year effort from our team to address the unique \nchallenges of crossing the border. With our store outperforming our expectations, we are encouraged with our customers’ response in this \nmarket. We are looking forward to opening stores in 2015 in Ottawa, Ontario and Vancouver, British Columbia. In the U.S. we increased our \npresence with two full-line stores in The Woodlands, Texas and Jacksonville, Florida. In 2015, we plan to open three full-line stores in Puerto \nRico, Minneapolis, Minnesota and Milwaukee, Wisconsin. ", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Net Sales (2014 vs. 2013) \nIn 2014, total company net sales increased 7.8%, which was attributable to the comparable sales increase of 4.0%. During the year, we \nopened three Nordstrom full-line stores, including our first store in Canada, and 27 Nordstrom Rack stores. Additionally, as a result of the \nacquisition of Trunk Club, we acquired four Trunk Club showrooms and opened one additional Trunk Club showroom in 2014. These \nadditions increased our square footage by 5.5% and represented 2.8% of our total net sales for 2014. \n\nNordstrom net sales, which consist of the U.S. full-line and Nordstrom.com businesses, were $9,678 in 2014, an increase of 3.8% compared \nwith 2013, with comparable sales up 3.6%. These increases reflected continued momentum in our Nordstrom.com channel. Both the number \nof items sold and the average selling price increased on a comparable basis in 2014. Category highlights included Accessories, Cosmetics \nand Men’s Apparel. \n\nU.S. full-line net sales for 2014 were $7,682, a decrease of 0.3% compared with 2013 and comparable sales decreased by 0.5%. The top- \nperforming geographic regions for full-line stores were the Southeast and Southwest. ", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**Nordstrom, Inc.**\n**Notes to Consolidated Financial Statements**\nDollar and share amounts in millions except per share, per option and per unit amounts \n\nA summary of restricted stock unit activity (excluding Trunk Club) for 2014 is presented below: ", + "page_start": 69, + "page_end": 69, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**Steven C. Mattics,**46 \nExecutive Vice President; \nChairman and Chief Executive Officer of \nNordstrom fsb, \nPresident of Nordstrom Credit, Inc. \n\n**Scott A. Meden,**52 \nExecutive Vice President and \nGeneral Merchandise Manager, \nShoe Division \n\n**Robert J. Middlemas,**58 \nExecutive Vice President and \nRegional Manager, \nSouthern California \n\n**Margaret Myers,**68 \nExecutive Vice President and \nGeneral Merchandise Manager, \nAccessories and Women’s \nSpecialized Divisions \n\n**Blake W. Nordstrom,**54 \nPresident \n\n**Erik B. Nordstrom,**51 \nExecutive Vice President and \nPresident, Nordstrom.com \n\n**James F. Nordstrom, Jr.,**42 \nExecutive Vice President and \nPresident, Stores \n\n**Peter E. Nordstrom,**53 \nExecutive Vice President and \nPresident, Merchandising \n\n**Brian Saltzman,**47 \nExecutive Vice President, \nUser Experience and Optimization ", + "page_start": 91, + "page_end": 91, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**PART I**\n\n**Item 1. Business.**\n\n**DESCRIPTION OF BUSINESS**\nFounded in 1901 as a retail shoe business in Seattle, Nordstrom later incorporated in Washington state in 1946 and went on to become one \nof the leading fashion specialty retailers based in the U.S. As of March 16, 2015, we operate 290 U.S. stores located in 38 states as well as a \nrobust ecommerce business through Nordstrom.com, Nordstromrack.com and HauteLook and TrunkClub.com. We also operate two \nNordstrom full-line stores in Canada. The west and east coasts of the U.S. are the areas in which we have the largest presence. We have \ntwo reportable segments: Retail and Credit. ", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**Item 7. Management’s Discussion and Analysis of Financial Condition and Results of Operations.**\nDollar, share and square footage amounts in millions except percentages, per share and per square foot amounts \n\n**OVERVIEW**\nNordstrom is a leading fashion specialty retailer offering apparel, shoes, cosmetics and accessories for women, men and children. We offer \nan extensive selection of high-quality brand-name and private label merchandise through our various channels: “Nordstrom” branded full-line \nstores and online store at Nordstrom.com, Nordstrom Rack stores, Nordstromrack.com and HauteLook and other retail channels, including \nTrunk Club showrooms and TrunkClub.com, our Jeffrey boutiques and our clearance store that operates under the name “Last Chance.” As \nof January 31, 2015, our stores are located in 38 states throughout the United States and in one province in Canada. In addition, we offer our \ncustomers a Nordstrom Rewards™ loyalty program along with a variety of payment products and services, including credit and debit cards. \n\nWe continue to see the ongoing evolution of retail, with increasing customer interaction between our stores and ecommerce. We are making \nprogress to meet customer expectations of a personalized experience that merges the richness of stores with the convenience of online. \nBecause the customer views us simply as Nordstrom, we believe there is tremendous value in strengthening our platform for the customer \nexperience that encompasses full-price, off-price, in-store and online. While each channel represents a substantial growth opportunity, there \nare significant synergies across channels to create a unique customer experience to gain market share. ", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**Robert B. Sari,**58 \nExecutive Vice President, \nGeneral Counsel and Secretary \n\n**Michael Sato,**48 \nExecutive Vice President, \nSupply Chain \n\n**Tricia D. Smith,**43 \nExecutive Vice President and \nGeneral Merchandise Manager, \nDesigner, Women’s and Kids’ \nApparel \n\n**Geevy S. K. Thomas,**50 \nExecutive Vice President and \nPresident, Nordstrom Rack \n\n**Paige L. Thomas,**43 \nExecutive Vice President and \nGeneral Merchandise Manager, \nNordstrom Rack \n\n**Mark J. Tritton,**51 \nExecutive Vice President and \nPresident, Nordstrom Product Group \n\n**David M. Witman,**56 \nExecutive Vice President and \nGeneral Merchandise Manager, \nMen’s Apparel \n\n**Kenneth J. Worzel,**50 \nExecutive Vice President, \nStrategy and Development ", + "page_start": 91, + "page_end": 91, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Our fourth quarter sales trends were consistent with trends the company experienced throughout 2014. We continued to make progress \nexecuting our customer strategy through investments to drive growth across channels. Net earnings for the fourth quarter of 2014 were $255, \nor $1.32 per diluted share, compared with $268, or $1.37 per diluted share, in 2013. The Trunk Club acquisition reduced earnings before \ninterest and taxes in the fourth quarter by $11. \n\nNet Sales \nTotal net sales increased in the fourth quarter by 9.0%, driven by a comparable sales increase of 4.7% and 35 new stores in 2014. \n\nNordstrom net sales, which consist of the full-line stores in the U.S. and Nordstrom.com businesses, increased $141, or 5.0%, compared with \nthe same period in 2013, while comparable sales increased 4.5%. Both the number of items sold and the average selling price of our \nmerchandise increased on a comparable basis. Category highlights for the quarter were Cosmetics, Accessories and Men’s Apparel. \n\nU.S. full-line net sales for the quarter increased $26, or 1.2%, compared with the same period in 2013, with an increase in comparable sales \nof 0.5%. The Southwest and Southeast were the top-performing geographic regions. ", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_JWN_2014.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_JWN_2014.pdf", + "query": "How many stores did Nordstrom posses at the end of 2014 ?", + "target_page": 22, + "target_passage": "Number of stores, end of year : 292", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "In 2014, we opened three Nordstrom full-line stores (The Woodlands, Texas; Calgary, Alberta; and Jacksonville, Florida) and 27 Nordstrom \nRack stores (Palm Desert, California; San Francisco, California; Chicago, Illinois; Riverside, California; Skokie, Illinois; Tulsa, Oklahoma; \nWauwatosa, Wisconsin; Brooklyn, New York; Columbus, Ohio; Houston, Texas; Manhassett, New York; Chicago, Illinois; Dayton, Ohio; \nHouston, Texas; Queens, New York; Brentwood, Tennessee; Greenville, South Carolina; Madison, Wisconsin; Tempe, Arizona; Brooklyn, \nNew York; Livingston, New Jersey; West Palm Beach, Florida; Brandon, Florida; Columbia, South Carolina; Des Moines, Iowa; Philadelphia, \nPennsylvania; and Summerlin, Nevada). As part of our purchase of Trunk Club in August 2014, we acquired four Trunk Club showrooms (Los \nAngeles, California; Chicago, Illinois; Dallas, Texas; and Washington D.C.) and opened one additional Trunk Club showroom (New York City, \nNew York) in December 2014. Additionally, in 2014, we closed three Nordstrom full-line stores (Orlando, Florida; Vancouver, Washington; and \nPortland, Oregon). ", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "At Nordstrom Rack, we offer customers great brands at great prices, with 48 of the top 50 full-line brands represented. We opened 27 \nNordstrom Rack stores in 2014, a record number of openings, contributing to Nordstrom Rack’s total sales growth of 17%. \n\nOur online businesses continue to be our fastest-growing channels. In the spring of 2014, we expanded our capabilities through the launch of \nNordstromrack.com, providing a seamless integration with HauteLook. We more than doubled our merchandise selection, which accelerated \ngrowth in this channel in the second half of 2014. Demonstrating synergies across our businesses, we enabled customers to return \npurchases from HauteLook and Nordstromrack.com to any of our Nordstrom Rack stores, which drove nearly one million incremental trips to \nNordstrom Rack stores. \n\nNordstrom.com finished its fifth consecutive year of approximately 20% or more comparable sales growth, with a key driver being increased \nmerchandise selection. In 2015, we plan to open our third fulfillment center, located in Pennsylvania, which will enhance the customer \nexperience through faster delivery. Furthermore, we have extended our full-price offering with our acquisition of Trunk Club, a high-growth \nbusiness offering a new approach to personalized service. ", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "To date in 2015, we have opened one Nordstrom full-line store in Ottawa, Ontario. During the remainder of 2015, we have announced the \nopening of four additional Nordstrom full-line stores (San Juan, Puerto Rico; Vancouver, British Columbia; Minneapolis, Minnesota; and \nWauwatosa, Wisconsin) and the opening of 27 additional Nordstrom Rack stores (Bakersfield, California; Redlands, California; Reno, \nNevada; Princeton, New Jersey; Westwood, Massachusetts; Webster, Texas; Laguna Niguel, California; Miami, Florida; Springfield, Virginia; \nSt. Louis Park, Minnesota; Dublin, California; Albany, New York; Anchorage, Alaska; Baton Rouge, Louisiana; Buffalo, New York; Cerritos, \nCalifornia; Clearwater, Florida; Eatontown, New Jersey; Emeryville, California; Fort Collins, Colorado; Long Beach, California; Mount \nPleasant, South Carolina; Newark, Delaware; Rockaway, New Jersey; Syracuse, New York; Thousand Oaks, California; and Wayne, New \nJersey). \n\nWe also own six merchandise distribution centers (Portland, Oregon; Dubuque, Iowa; Ontario, California; Newark, California; Upper \nMarlboro, Maryland; and Gainesville, Florida) and we own one fulfillment center on leased land (Cedar Rapids, Iowa), all of which are utilized \nby our Retail segment. Trunk Club and HauteLook, which are included in our Retail segment, lease three administrative offices (Chicago, \nIllinois; Los Angeles, California and New York City, New York) and one fulfillment center (San Bernardino, California). We plan to open a third, \nowned fulfillment center (Elizabethtown, Pennsylvania) in the second half of 2015. We lease office buildings in Centennial, Colorado and \nScottsdale, Arizona, both for use by our Credit segment. Our administrative offices in Seattle, Washington are a combination of leased and \nowned space. We also lease a data center in Centennial, Colorado. ", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**Nordstrom, Inc.**\n**Notes to Consolidated Financial Statements**\nDollar and share amounts in millions except per share, per option and per unit amounts \n\n**NOTE 1: NATURE OF OPERATIONS AND SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES**\n\n**The Company**\nFounded in 1901 as a shoe store in Seattle, Washington, Nordstrom, Inc. is now a leading fashion specialty retailer that offers customers a \nwell-edited selection of high-quality fashion brands focused on apparel, shoes, cosmetics and accessories for men, women and children. This \nbreadth of merchandise allows us to serve a wide range of customers who appreciate quality fashion and a superior shopping experience. \nWe offer an extensive selection of high-quality brand-name and private label merchandise through multiple retail channels, including 116 \n“Nordstrom” branded full-line stores in the U.S. and at Nordstrom.com (collectively, “Nordstrom”), one Canada full-line store, 167 off-price \nNordstrom Rack stores, Nordstromrack.com and HauteLook, five Trunk Club showrooms and TrunkClub.com, two Jeffrey boutiques and one \nLast Chance clearance store. Our stores are located in 38 states throughout the U.S and in one province in Canada. ", + "page_start": 52, + "page_end": 52, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**PART I**\n\n**Item 1. Business.**\n\n**DESCRIPTION OF BUSINESS**\nFounded in 1901 as a retail shoe business in Seattle, Nordstrom later incorporated in Washington state in 1946 and went on to become one \nof the leading fashion specialty retailers based in the U.S. As of March 16, 2015, we operate 290 U.S. stores located in 38 states as well as a \nrobust ecommerce business through Nordstrom.com, Nordstromrack.com and HauteLook and TrunkClub.com. We also operate two \nNordstrom full-line stores in Canada. The west and east coasts of the U.S. are the areas in which we have the largest presence. We have \ntwo reportable segments: Retail and Credit. ", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "We had no store relocations in 2014, compared with one Nordstrom full-line store and two Nordstrom Rack relocations in 2013 and three \nNordstrom Rack relocations in 2012. Our 2014 new store openings increased our square footage by 5.5%. \n\nTo date in 2015, we have opened our second full-line store in Canada. We plan to open 27 Nordstrom Rack stores, three additional \nNordstrom full-line stores in the U.S. and another full-line store in Canada during 2015. Planned net store openings are expected to increase \nour retail square footage by approximately 6.1%. ", + "page_start": 38, + "page_end": 38, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "We considered 2014 a watershed year in our company history, with our successful entry into Canada, continued expansion of our Nordstrom \nRack business through store growth, the launch of Nordstromrack.com and the acquisition of Trunk Club. Our performance in 2014 reflected \ncontinued progress in executing our customer strategy through investments to drive growth across channels. We achieved total net sales \ngrowth of 7.8%, adding nearly $1 billion to our top-line and delivering record sales and earnings per diluted share. Our financial position \nremains strong and this marked the sixth consecutive year we generated over $1 billion in cash flow from operations. \n\nOur partnership with vendors and brands enhances our product offering. We offer Topshop merchandise at 53 full-line stores and online, with \nplans to reach over 80 stores in 2015. Our new partnership with Madewell in 2015, initially available at 15 of our stores and online, is another \nway to provide sought-after brands that appeal to new and existing customers. \n\nIn 2014, we opened our first full-line store in Canada in Calgary, Alberta, reflecting a multi-year effort from our team to address the unique \nchallenges of crossing the border. With our store outperforming our expectations, we are encouraged with our customers’ response in this \nmarket. We are looking forward to opening stores in 2015 in Ottawa, Ontario and Vancouver, British Columbia. In the U.S. we increased our \npresence with two full-line stores in The Woodlands, Texas and Jacksonville, Florida. In 2015, we plan to open three full-line stores in Puerto \nRico, Minneapolis, Minnesota and Milwaukee, Wisconsin. ", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**Item 7. Management’s Discussion and Analysis of Financial Condition and Results of Operations.**\nDollar, share and square footage amounts in millions except percentages, per share and per square foot amounts \n\n**OVERVIEW**\nNordstrom is a leading fashion specialty retailer offering apparel, shoes, cosmetics and accessories for women, men and children. We offer \nan extensive selection of high-quality brand-name and private label merchandise through our various channels: “Nordstrom” branded full-line \nstores and online store at Nordstrom.com, Nordstrom Rack stores, Nordstromrack.com and HauteLook and other retail channels, including \nTrunk Club showrooms and TrunkClub.com, our Jeffrey boutiques and our clearance store that operates under the name “Last Chance.” As \nof January 31, 2015, our stores are located in 38 states throughout the United States and in one province in Canada. In addition, we offer our \ncustomers a Nordstrom Rewards™ loyalty program along with a variety of payment products and services, including credit and debit cards. \n\nWe continue to see the ongoing evolution of retail, with increasing customer interaction between our stores and ecommerce. We are making \nprogress to meet customer expectations of a personalized experience that merges the richness of stores with the convenience of online. \nBecause the customer views us simply as Nordstrom, we believe there is tremendous value in strengthening our platform for the customer \nexperience that encompasses full-price, off-price, in-store and online. While each channel represents a substantial growth opportunity, there \nare significant synergies across channels to create a unique customer experience to gain market share. ", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Net Sales (2014 vs. 2013) \nIn 2014, total company net sales increased 7.8%, which was attributable to the comparable sales increase of 4.0%. During the year, we \nopened three Nordstrom full-line stores, including our first store in Canada, and 27 Nordstrom Rack stores. Additionally, as a result of the \nacquisition of Trunk Club, we acquired four Trunk Club showrooms and opened one additional Trunk Club showroom in 2014. These \nadditions increased our square footage by 5.5% and represented 2.8% of our total net sales for 2014. \n\nNordstrom net sales, which consist of the U.S. full-line and Nordstrom.com businesses, were $9,678 in 2014, an increase of 3.8% compared \nwith 2013, with comparable sales up 3.6%. These increases reflected continued momentum in our Nordstrom.com channel. Both the number \nof items sold and the average selling price increased on a comparable basis in 2014. Category highlights included Accessories, Cosmetics \nand Men’s Apparel. \n\nU.S. full-line net sales for 2014 were $7,682, a decrease of 0.3% compared with 2013 and comparable sales decreased by 0.5%. The top- \nperforming geographic regions for full-line stores were the Southeast and Southwest. ", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "As of March 16, 2015, the**Retail**segment includes our 115 “Nordstrom” branded full-line stores in the U.S. and Nordstrom.com, 167 off-price \nNordstrom Rack stores, two Canada full-line stores, Nordstromrack.com and HauteLook, and other retail channels including five Trunk Club \nshowrooms and TrunkClub.com, our two Jeffrey boutiques and one clearance store that operates under the name “Last Chance.” Through \nthese multiple retail channels, we strive to deliver the best customer experience possible. We offer an extensive selection of high-quality \nbrand-name and private label merchandise focused on apparel, shoes, cosmetics and accessories. Our integrated Nordstrom full-line stores \nand online store allow us to provide our customers with a seamless shopping experience. In-store purchases are primarily fulfilled from that \nstore’s inventory, but when inventory is unavailable at that store it may also be shipped to our customers from our fulfillment center in Cedar \nRapids, Iowa, or from other Nordstrom full-line stores. Online purchases are primarily shipped to our customers from our Cedar Rapids \nfulfillment center, but may also be shipped from our Nordstrom full-line stores. Our customers can also pick up online orders in our Nordstrom \nfull-line stores if inventory is available at one of our locations. These capabilities allow us to better serve customers across various channels \nand improve sales. Nordstrom Rack stores purchase high-quality brand-name merchandise primarily from the same vendors carried in \nNordstrom full-line stores and also serve as outlets for clearance merchandise from our Nordstrom stores and other retail channels. During \nthe year, we launched Nordstromrack.com and the associated mobile app. Nordstromrack.com combines the technology expertise of \nHauteLook with the merchant expertise of Nordstrom Rack. Nordstromrack.com and HauteLook offer limited-time sale events on fashion and \nlifestyle brands as well as a persistent selection of off-price, high-quality brand-name merchandise and are integrated with a single customer \nlog-in, shared shopping cart and streamlined checkout process. Furthermore, we can accommodate returns from these sites by mail or at \nany Nordstrom Rack location. ", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_JWN_2014.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2538.pdf", + "query": "What type of nanostructured material works notably well to build gas nanosensors ?", + "target_page": 1, + "target_passage": "carbon nanotubes (CNT) [2] have been shown to work remarkably well as de- tectors of small gas molecules", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "In summary, we have presented a general model of nanos- \ntructured chemical sensors which takes the adsorption en- \nergies of the relevant chemical species and their individual \nscattering resistances as the only input. On the basis of this \nmodel we have performed a computational screening of tran- \nsition metal doped CNTs, and found that Ni-doped CNTs are \npromising candidates for detecting CO in a background of air. \nThe model may be applied straightforwardly to other nanos- \ntructures than CNTs, other functionalizations than metal dop- \ning and other gas compositions than air. \n\n[14] S. B. Fagan, R. Mota, A. J. R. da Silva, and A. Fazzio, “Ab \ninitio study of an iron atom interacting with single-wall car- \nbon nanotubes”, Phys. Rev. B 67(20), 205414 (May 2003), \ndoi:10.1103/PhysRevB.67.205414. \n\n[15] Y. Yagi, T. M. Briere, M. H. F. Sluiter, V. Kumar, A. A. Farajian, \nand Y. Kawazoe, “Stable geometries and magnetic properties of \nsingle-walled carbon nanotubes doped with 3d transition met- \nals: A first-principles study”, Phys. Rev. B 69(7), 075414 (Feb \n2004), doi:10.1103/PhysRevB.69.075414. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "Computational Design of Chemical Nanosensors: Metal Doped Carbon Nanotubes \n\nJ. M. Garc´ıa-Lastra1,2,∗ D. J. Mowbray1,2, K. S. Thygesen2, A. Rubio1,3, and K. W. Jacobsen2 \n1Nano-Bio Spectroscopy group and ETSF Scientific Development Centre, \nDpto. F´ısica de Materiales, Universidad del Pa´ıs Vasco, \nCentro de F´ısica de Materiales CSIC-UPV/EHU- MPC and DIPC, Av. Tolosa 72, E-20018 San Sebasti´an, Spain \n2Center for Atomic-scale Materials Design, Department of Physics, \nTechnical University of Denmark, DK-2800 Kgs. Lyngby, Denmark \n3Fritz-Haber-Institut der Max-Planck-Gesellschaft, Berlin, Germany \n\nWe use computational screening to systematically investigate the use of transition metal doped carbon nan- \notubes for chemical gas sensing. For a set of relevant target molecules (CO, NH3, H2S) and the main components \nof air (N2, O2, H2O), we calculate the binding energy and change in conductance upon adsorption on a metal \natom occupying a vacancy of a (6,6) carbon nanotube. Based on these descriptors, we identify the most promis- \ning dopant candidates for detection of a given target molecule. From the fractional coverage of the metal sites \nin thermal equilibrium with air, we estimate the change in the nanotube resistance per doping site as a function \nof the target molecule concentration assuming charge transport in the diffusive regime. Our analysis points to \nNi-doped nanotubes as candidates for CO sensors working under typical atmospheric conditions. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2538.pdf" + }, + { + "text": "[21] A. V. Krasheninnikov, P. O. Lehtinen, A. S. Foster, \nP. Pyykk¨o, and R. M. Nieminen, \n“Embedding transition- \nmetal atoms in graphene: Structure, bonding, and mag- \nPhys. Rev. Lett. 102(12), 126807 (Mar. 2009), \nnetism”, \ndoi:10.1103/PhysRevLett.102.126807. \n\n[5] C. Hierold, Carbon Nanotube Devices: Properties, Modeling, \nIntegration and Applications (Wiley-VCH, Weinheim, 2008). \n[6] F. Villalpando-P´aez, A. H. Romero, E. Mu˜noz-Sandoval, \nL. M. Mart´ınez, H. Terrones, and M. Terrones, \n“Fabrica- \ntion of vapor and gas sensors using films of aligned CNx \nnanotubes”, Chem. Phys. Lett. 386(1-3), 137 (Mar. 2004), \ndoi:10.1016/j.cplett.2004.01.052. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "∗ Electronic address: juanmaria.garcia@ehu.es [18] C. S. Yeung, L. V. Liu, and Y. A. Wang, \n\n“Adsorption \nof small gas molecules onto Pt-doped single-walled carbon \nJ. Phys. Chem. C 112(19), 7401 (Apr. 2008), \nnanotubes”, \ndoi:10.1021/jp0753981. \n[1] Gas Sensing Materials, MRS Bull., vol. 24 (1999). \n[2] J. C. Chalier, X. Blase, and S. Roche, “Electronic and transport \nproperties of nanotubes”, Rev. Mod. Phys. 79(2), 677 (May \n2007), doi:10.1103/RevModPhys.79.677. [19] T. Vo, Y.-D. Wu, R. Car, and M. Robert, \n\n“Structures, in- \nteractions, and ferromagnetism of Fe-carbon nanotube sys- \nJ. Phys. Chem. C 112(22), 400 (May 2008), \ntems”, \ndoi:10.1021/jp0761968. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "[8] S. Brahim, S. Colbern, R. Gump, and L. Grigorian, “Tailoring \nJ. Appl. Phys. \ngas sensing properties of carbon nanotubes”, \n104(2), 024502 (Jul. 2008), doi:10.1063/1.2956395. \n[9] C. Morgan, Z. Alemipour, and M. Baxendale, \n\n“Variable \nrange hopping in oxygen-exposed single-wall carbon nanotube \nnetworks”, Phys. Stat. Solidi A 205(6), 1394 (May 2008), \ndoi:10.1002/pssa.200778113. \n\nTo our knowledge, controlled doping of CNTs with transi- \ntion metal atoms has so far not been achieved. It has, how- \never, been found that metal atoms incorporated into the CNT \nlattice during catalytic growth are afterwards very difficult to \nremove [30]. Furthermore, it has been shown that CNT vacan- \ncies, which are needed for the metallic doping, may be formed \nin a controlled way by irradiation by Ar ions [31]. This sug- \ngests that metallic doping of CNTs should be possible. \n\n[10] D. J. Mowbray, C. Morgan, and K. S. Thygesen, \n\n“In- \nfluence of O2 and N2 on the conductivity of carbon nan- \notube networks”, Phys. Rev. B 79(19), 195431 (May 2009), \ndoi:10.1103/PhysRevB.79.195431. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "is the total energy of the pristine nanotube with a physisorbed \ntransition metal atom. We have considered the monovacancy \nand two divacancies shown in Fig. 1. The energy required to \nform an empty vacancy is obtained from where E[X@M@VC] is the total energy of molecule X on \na transition metal atom occupying a vacancy, and E[X] is the \ngas phase energy of the molecule. \n\nFrom the adsorption energies plotted in Fig. 2(a), we see \nthat the earlier transition metals tend to bind the adsorbates \nstronger than the late transition metals. The latest metals in \nthe series (Cu and Zn) bind adsorbates rather weakly in the \ndivacancy structures. We also note that O2 binds significantly \nstronger than any of the three target molecules on Ti, V, Cr, \nand Mn (except for Cr in divacancy I where H2S is found to \ndissociate). Active sites containing these metals are therefore \nexpected to be completely passivated if oxygen is present in \nthe background. Further, we find H2O is rather weakly bound \nto most of the active sites. This ensures that these types of \nsensors are robust against changes in humidity. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2538.pdf" + }, + { + "text": "change in CNT resistivity may then be obtained from the cal- \nculated coverages and single impurity conductances. \n\nWe find that oxidation of the active metal site passivates \nthe sensor in the case of doping by Ti, V, Cr, and Mn un- \nder standard conditions (room temperature and 1 bar of pres- \nsure). Among the remaining metals, we identify Ni as is the \nmost promising candidate for CO detection. For this system \nthe change in resistance per active site is generally significant \n(>1 Ω) for small changes in CO concentration in the relevant \nrange of around 0.1–10 ppm. Our approach is quite general \nand is directly applicable to other nanostructures than CNTs, \nother functionalizations than metal doping, and other back- \ngrounds than atmospheric air. \n\nAll total energy calculations and structure optimizations \nhave been performed with the real-space density functional \ntheory (DFT) code GPAW [22] which is based on the projector \naugmented wave method. We use a grid spacing of 0.2 ˚A for \nrepresenting the density and wave functions and the PBE ex- \nchange correlation functional [23]. Transport calculations for \nthe optimized structures have been performed using the non- \nequilibrium Green’s function method [24] with an electronic \nHamiltonian obtained from the SIESTA code [25] in a dou- \nble zeta polarized (DZP) basis set. Spin polarization has been \ntaken into account in all calculations. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2538.pdf" + }, + { + "text": "[11] L. Valentini, F. Mercuri, I. Armentano, C. Cantalini, S. Picozzi, \nL. Lozzi, S. Santucci, A. Sgamellotti, and J. M. Kenny, “Role of \ndefects on the gas sensing properties of carbon nanotubes thin \nfilms: experiment and theory”, Chem. Phys. Lett. 387(4-6), 356 \n(Apr. 2004), doi:10.1016/j.cplett.2004.02.038. \n\n[12] Z. Zanolli and J.-C. Charlier, “Defective carbon nanotubes for \nsingle-molecule sensing”, Phys. Rev. B 80(15), 155447 (Oct. \n2009), doi:10.1103/PhysRevB.80.155447. \n\n[13] J. M. Garc´ıa-Lastra, K. S. Thygesen, M. Strange, and \n´Angel Rubio, \n“Conductance of sidewall-functionalized \ncarbon nanotubes: Universal dependence on adsorption \nPhys. Rev. Lett. 101(23), 236806 (Dec. 2008), \nsites”, \ndoi:10.1103/PhysRevLett.101.236806. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "FIG. 2: Calculated (a) adsorption energy Eads in eV and (b) change in \nconductance ∆G in units of G0 =2e2/h for N2, O2, H2O, CO, NH3, \nand H2S on 3d transition metals occupying a monovacancy (top), \ndivacancy I (middle), and divacancy II (bottom) in a (6,6) carbon \nnanotube. \nFIG. 1: Structural schematics and formation energy for a 3d tran- \nsition metal occupied monovacancy (black), divacancy I (gray), or \ndivacancy II (white) in a (6,6) carbon nanotube. Formation energies \nof the empty vacancies are indicated by dashed lines. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2538.pdf" + }, + { + "text": "[3] J. Kong, N. R. Franklin, C. Zhou, M. G. Chapline, S. Peng, \n“Nanotube molecular wires as \nScience 287(5453), 622 (Jan. 2000), \nK. Cho, and H. Dai, \nchemical sensors”, \ndoi:10.1126/science.287.5453.622. \n\n[20] J. A. F¨urst, M. Brandbyge, A.-P. Jauho, and K. Stokbro, “Ab \ninitio study of spin-dependent transport in carbon nanotubes \nwith iron and vanadium adatoms”, Phys. Rev. B 78(19), 195405 \n(Nov. 2008), doi:10.1103/PhysRevB.78.195405. \n\n[4] P. G. Collins, K. Bradley, M. Ishigami, and A. Zettl, \n\n“Ex- \ntreme oxygen sensitivity of electronic properties of car- \nScience 287(5459), 1801 (Mar. 2000), \nbon nanotubes”, \ndoi:10.1126/science.287.5459.1801. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2538.pdf", + "query": "What seems to be a great technique to ensure vacancies are formed in carbon nanotubes (CNT) ?", + "target_page": 4, + "target_passage": "Furthermore, it has been shown that CNT vacan- cies, which are needed for the metallic doping, may be formed in a controlled way by irradiation by Ar ion", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "Metallic doping of a (6,6) CNT has been modeled in a su- \npercell containing six repeated minimal unit cells along the \nCNT axis (dimensions: 15 ˚A×15 ˚A×14.622 ˚A). For this size \nof supercell a Γ-point sampling of the Brillouin zone was \nfound to be sufficient. The formation energy for creating a \nvacancy (VC) occupied by a transition metal atom (M) was \ncalculated using the relation \n\nEform[M@VC] = E[M@VC] + nE[C] − E[M@NT] (1) \n\nwhere E[M@VC] is the total energy of a transition metal \natom occupying a vacancy in the nanotube, n is the number \nof carbon atoms removed to form the vacancy, E[C] is the en- \nergy per carbon atom in a pristine nanotube, and E[M@NT] ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2538.pdf" + }, + { + "text": "[8] S. Brahim, S. Colbern, R. Gump, and L. Grigorian, “Tailoring \nJ. Appl. Phys. \ngas sensing properties of carbon nanotubes”, \n104(2), 024502 (Jul. 2008), doi:10.1063/1.2956395. \n[9] C. Morgan, Z. Alemipour, and M. Baxendale, \n\n“Variable \nrange hopping in oxygen-exposed single-wall carbon nanotube \nnetworks”, Phys. Stat. Solidi A 205(6), 1394 (May 2008), \ndoi:10.1002/pssa.200778113. \n\nTo our knowledge, controlled doping of CNTs with transi- \ntion metal atoms has so far not been achieved. It has, how- \never, been found that metal atoms incorporated into the CNT \nlattice during catalytic growth are afterwards very difficult to \nremove [30]. Furthermore, it has been shown that CNT vacan- \ncies, which are needed for the metallic doping, may be formed \nin a controlled way by irradiation by Ar ions [31]. This sug- \ngests that metallic doping of CNTs should be possible. \n\n[10] D. J. Mowbray, C. Morgan, and K. S. Thygesen, \n\n“In- \nfluence of O2 and N2 on the conductivity of carbon nan- \notube networks”, Phys. Rev. B 79(19), 195431 (May 2009), \ndoi:10.1103/PhysRevB.79.195431. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "FIG. 2: Calculated (a) adsorption energy Eads in eV and (b) change in \nconductance ∆G in units of G0 =2e2/h for N2, O2, H2O, CO, NH3, \nand H2S on 3d transition metals occupying a monovacancy (top), \ndivacancy I (middle), and divacancy II (bottom) in a (6,6) carbon \nnanotube. \nFIG. 1: Structural schematics and formation energy for a 3d tran- \nsition metal occupied monovacancy (black), divacancy I (gray), or \ndivacancy II (white) in a (6,6) carbon nanotube. Formation energies \nof the empty vacancies are indicated by dashed lines. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2538.pdf" + }, + { + "text": "[21] A. V. Krasheninnikov, P. O. Lehtinen, A. S. Foster, \nP. Pyykk¨o, and R. M. Nieminen, \n“Embedding transition- \nmetal atoms in graphene: Structure, bonding, and mag- \nPhys. Rev. Lett. 102(12), 126807 (Mar. 2009), \nnetism”, \ndoi:10.1103/PhysRevLett.102.126807. \n\n[5] C. Hierold, Carbon Nanotube Devices: Properties, Modeling, \nIntegration and Applications (Wiley-VCH, Weinheim, 2008). \n[6] F. Villalpando-P´aez, A. H. Romero, E. Mu˜noz-Sandoval, \nL. M. Mart´ınez, H. Terrones, and M. Terrones, \n“Fabrica- \ntion of vapor and gas sensors using films of aligned CNx \nnanotubes”, Chem. Phys. Lett. 386(1-3), 137 (Mar. 2004), \ndoi:10.1016/j.cplett.2004.01.052. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "The calculated formation energies for the 3d transition met- \nals are shown in Fig. 1. From the horizontal lines we see that \nboth divacancies are more stable than the monovacancy. This \nmay be attributed to the presence of a two-fold coordinated C \natom in the monovacancy, while all C atoms remain three-fold \ncoordinated in the divacancies. When a transition metal atom \noccupies a vacancy, the strongest bonding to the C atoms is \nthrough its d orbitals [26]. For this reason, Cu and Zn, which \nboth have filled d-bands, are rather unstable in the CNT. For \nthe remaining metals, adsorption in the monovacancies leads \nto quite stable structures. This is because the three-fold coor- \ndination of the C atoms and the CNT’s hexagonal structure are \nrecovered when the metal atom is inserted. On the other hand, \nmetal adsorption in divacancies is slightly less stable because \nof the resulting pentagon defects, see upper panel in Fig. 1. A \nsimilar behaviour has been reported by Krasheninnikov et al. \nfor transition metal atoms in graphene [21]. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2538.pdf" + }, + { + "text": "[11] L. Valentini, F. Mercuri, I. Armentano, C. Cantalini, S. Picozzi, \nL. Lozzi, S. Santucci, A. Sgamellotti, and J. M. Kenny, “Role of \ndefects on the gas sensing properties of carbon nanotubes thin \nfilms: experiment and theory”, Chem. Phys. Lett. 387(4-6), 356 \n(Apr. 2004), doi:10.1016/j.cplett.2004.02.038. \n\n[12] Z. Zanolli and J.-C. Charlier, “Defective carbon nanotubes for \nsingle-molecule sensing”, Phys. Rev. B 80(15), 155447 (Oct. \n2009), doi:10.1103/PhysRevB.80.155447. \n\n[13] J. M. Garc´ıa-Lastra, K. S. Thygesen, M. Strange, and \n´Angel Rubio, \n“Conductance of sidewall-functionalized \ncarbon nanotubes: Universal dependence on adsorption \nPhys. Rev. Lett. 101(23), 236806 (Dec. 2008), \nsites”, \ndoi:10.1103/PhysRevLett.101.236806. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "In summary, we have presented a general model of nanos- \ntructured chemical sensors which takes the adsorption en- \nergies of the relevant chemical species and their individual \nscattering resistances as the only input. On the basis of this \nmodel we have performed a computational screening of tran- \nsition metal doped CNTs, and found that Ni-doped CNTs are \npromising candidates for detecting CO in a background of air. \nThe model may be applied straightforwardly to other nanos- \ntructures than CNTs, other functionalizations than metal dop- \ning and other gas compositions than air. \n\n[14] S. B. Fagan, R. Mota, A. J. R. da Silva, and A. Fazzio, “Ab \ninitio study of an iron atom interacting with single-wall car- \nbon nanotubes”, Phys. Rev. B 67(20), 205414 (May 2003), \ndoi:10.1103/PhysRevB.67.205414. \n\n[15] Y. Yagi, T. M. Briere, M. H. F. Sluiter, V. Kumar, A. A. Farajian, \nand Y. Kawazoe, “Stable geometries and magnetic properties of \nsingle-walled carbon nanotubes doped with 3d transition met- \nals: A first-principles study”, Phys. Rev. B 69(7), 075414 (Feb \n2004), doi:10.1103/PhysRevB.69.075414. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "[31] C. Gomez-Navarro, P. J. de Pablo, J. Gomez-Herrero, B. Biel, \nF. J. Garcia-Vidal, A. Rubio, and F. Flores, “Tuning the con- \nductance of single-walled carbon nanotubes by ion irradiation \nin the Anderson localization regime”, Nature Materials 4, 534 \n(Jun. 2005), doi:10.1038/nmat1414. \n\nUniversity Press, London, 1961). \n[27] P. Atkins and J. de Paula, Physical Chemistry, 8th ed. (Oxford \nUniversity Press, London, 2006). \n[28] D. Lide, Handbook of Chemistry and Physics, 87th ed. (CRC- \nPress, 2006–2007). \n[29] T. Markussen, R. Rurali, A.-P. Jauho, and M. Brandbyge, “Scal- ", + "page_start": 4, + "page_end": 4, + "source_file": "1001.2538.pdf" + }, + { + "text": "The authors acknowledge financial support from Span- \nish MEC (FIS2007-65702-C02-01), “Grupos Consolidados \nUPV/EHU del Gobierno Vasco” (IT-319-07), e-I3 ETSF \nproject (Contract Number 211956), “Red Espa˜nola de Super- \ncomputaci´on”, NABIIT and the Danish Center for Scientific \nComputing. The Center for Atomic-scale Materials Design \n(CAMD) is sponsored by the Lundbeck Foundation. JMG-L \nacknowledges funding from Spanish MICINN through Juan \nde la Cierva and Jos´e Castillejo programs. \n\n[16] S. H. Yang, W. H. Shin, J. W. Lee, S. Y. Kim, S. I. Woo, and \nJ. K. Kang, “Interaction of a transition metal atom with intrinsic \ndefects in single-walled carbon nanotubes”, J. Phys. Chem. B \n110(28), 13941 (Jun. 2006), doi:10.1021/jp061895q. \n\n[17] K. T. Chan, J. B. Neaton, and M. L. Cohen, “First-principles \nstudy of metal adatom adsorption on graphene”, Phys. Rev. B \n77, 235430 (Jun. 2008), doi:10.1103/PhysRevB.77.235430. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2538.pdf" + }, + { + "text": "is the total energy of the pristine nanotube with a physisorbed \ntransition metal atom. We have considered the monovacancy \nand two divacancies shown in Fig. 1. The energy required to \nform an empty vacancy is obtained from where E[X@M@VC] is the total energy of molecule X on \na transition metal atom occupying a vacancy, and E[X] is the \ngas phase energy of the molecule. \n\nFrom the adsorption energies plotted in Fig. 2(a), we see \nthat the earlier transition metals tend to bind the adsorbates \nstronger than the late transition metals. The latest metals in \nthe series (Cu and Zn) bind adsorbates rather weakly in the \ndivacancy structures. We also note that O2 binds significantly \nstronger than any of the three target molecules on Ti, V, Cr, \nand Mn (except for Cr in divacancy I where H2S is found to \ndissociate). Active sites containing these metals are therefore \nexpected to be completely passivated if oxygen is present in \nthe background. Further, we find H2O is rather weakly bound \nto most of the active sites. This ensures that these types of \nsensors are robust against changes in humidity. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2538.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HNI_2003.pdf", + "query": "How many employees did HON Industries count in 2003 ?", + "target_page": 15, + "target_passage": "Members (employees) at year-end : 8,926", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "As we celebrate our 60th year, HON INDUSTRIES has seen leaner, more focused, and have more clearly defined brands \n\nmuch change. The industry has changed. The world has than ever before. Our challenge is to grow, aggressively and \n\nchanged. Our business has changed. What has not changed profitably, through market-driven solutions while maintain- \n\nare the culture and values on which we were founded: integ- ing focus on what we do best — operational excellence. Our ", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**Dear Shareholders:**\n\nWe, the members of the HON INDUSTRIES Board of Directors, believe that integrity is central to good corporate governance. This belief is \n\nreflected in the HON INDUSTRIES vision statement (shown on the back of this annual report), adopted many years ago. Our Vision statement \n\nrepresents much more than a traditional “mission,” and it goes much deeper than company policy. The beliefs and values represented in that \n\ndocument are the very foundation of our corporate culture, and guide the attitude and actions of every member, every day. \n\nFrom its beginnings, HON INDUSTRIES has sought to implement its vision through sound policies and practices, and by maintaining \n\na strong Board composed predominantly of outside directors. We are fully committed to executing our responsibilities, and we will continue to \n\nmaintain the company’s long-standing tradition of an independent, well-informed, active, and engaged Board of Directors. \n\nOur board meetings and procedures have been developed and refined to encourage open and informed communication. The company’s \n\naccounting policies have always been conservative and straightforward. The Board’s three committees — Audit; Human Resources and \n\nCompensation; Public Policy and Corporate Governance — have consisted entirely of non-management directors for many years. \n\nDuring 2003, we have given significant attention to the newly released rules emanating from the Sarbanes-Oxley Act of 2002 and the ", + "page_start": 60, + "page_end": 60, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "our rapid continuous improvement (RCI) programs, in 1992. It announced in February 2003, was an important part of \n\nis not only a process to drive out cost, it is a powerful tool to this process. \n\nengage every member every day in making choices to improve Our office furniture and hearth businesses are healthy \n\nthe value we provide to our customers. and well-positioned for growth; still we continue to face a com- \n\npetitive business environment. We are confident of our financial \n\nsecurity, and certain that our transition to becoming a market- **E N H A N C I N G C U L T U R E A N D C A P A B I L I T I E S**\n\nOur values are simple yet powerful. They are as relevant today driven, operationally excellent company will continue to en- \n\nas they were when the company was founded 60 years ago. hance shareholder value. The transformation continues. We will \n\nOur member-owner culture of shared responsibility and shared be seeking shareholder approval, in early May 2004, to change \n\nreward engages all members in the ongoing business improve- the name of HON INDUSTRIES to HNI Corporation, drawing ", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "New York Stock Exchange listing requirements — rules intended to improve corporate governance across the country. It is gratifying to report that \n\nHON INDUSTRIES governance practices were already in accord with the spirit of the rules. \n\nIt is an honor to serve as directors of HON INDUSTRIES. We are very proud to represent you, the shareholder, as we oversee the man- \n\nagement of this great company. Please be assured that we intend to remain vigilant and focused on good corporate governance. ", + "page_start": 60, + "page_end": 60, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**To the Board of Directors and Shareholders, HON INDUSTRIES Inc.:**\n\nIn our opinion, the accompanying consolidated balance sheets and the related consolidated statements of income, shareholders’ equity, and cash \n\nflows present fairly, in all material respects, the financial position of HON INDUSTRIES Inc. and its subsidiaries at January 3, 2004, and \n\nDecember 28, 2002, and the results of their operations and their cash flows for the fiscal years ended January 3, 2004, and December 28, 2002, \n\nin conformity with accounting principles generally accepted in the United States of America. These financial statements are the responsibility of \n\nthe Company’s management; our responsibility is to express an opinion on these financial statements based on our audits. We conducted our \n\naudits of these statements in accordance with auditing standards generally accepted in the United States of America, which require that we plan \n\nand perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes \n\nexamining, on a test basis, evidence supporting the amounts and disclosures in the financial statements, assessing the accounting principles used \n\nand significant estimates made by management, and evaluating the overall financial statement presentation. We believe that our audits provide a ", + "page_start": 57, + "page_end": 57, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**To the Board of Directors and Shareholders of HON INDUSTRIES Inc.**\n\nWe have audited the accompanying consolidated balance sheets of HON INDUSTRIES Inc. and Subsidiaries as of December 29, 2001, \n\nDecember 30, 2000*, and January 1, 2000*, and the related consolidated statements of income, shareholders equity, and cash flows for each of \n\nthe fiscal years then ended. These financial statements are the responsibility of the Company’s management. Our responsibility is to express an \n\nopinion on these financial statements based on our audits. \n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States. Those standards require that \n\nwe plan and perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit \n\nincludes examining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing \n\nthe accounting principles used and significant estimates made by management, as well as evaluating the overall financial statement presentation. \n\nWe believe that our audits provide a reasonable basis for our opinion. \n\nIn our opinion, the consolidated financial statements referred to above present fairly, in all material respects, the financial position of \n\nHON INDUSTRIES Inc. and Subsidiaries as of December 29, 2001, December 30, 2000*, and January 1, 2000*, and the results of its operations ", + "page_start": 58, + "page_end": 58, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**Nature of Operations** date. Equity securities are classified as available-for-sale and are stated \n\nHON INDUSTRIES Inc., with its subsidiaries (the “Company”), is a at current market value with unrealized gains and losses included as a \n\nprovider of office furniture and hearth products. Both industries are separate component of equity, net of any related tax effect. Debt securi- \n\nreportable segments; however, the Company’s office furniture business ties are classified as held-to-maturity and are stated at amortized cost. \n\nis its principal line of business. Refer to the Operating Segment The specific identification method is used to determine realized gains \n\nInformation note for further information. Office furniture products are and losses on the trade date. Short-term investments include municipal \n\nsold through a national system of dealers, wholesalers, mass merchan- bonds, money market preferred stock, and U.S. treasury notes. Long- \n\ndisers, warehouse clubs, retail superstores, end-user customers, and to term investments include U.S. government securities, municipal bonds, \n\nfederal and state governments. Dealer, wholesaler, and retail super- certificates of deposit, and asset- and mortgage-backed securities. \n\nstores are the major channels based on sales. Hearth products include ", + "page_start": 42, + "page_end": 42, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "We, the members of HON INDUSTRIES, are dedicated to creating long-term value for all of our stakeholders, to \n\nexceeding our customers’ expectations, and to making our company a great place to work. We will always treat each \n\nother, as well as customers, suppliers, shareholders, and our communities, with fairness and respect. \n\nOur success depends upon business simplification, rapid continuous improvement, and innovation in every- \n\nthing we do, individual and collective integrity, and the relentless pursuit of the following long-standing beliefs: \n\n**W E W I L L B E P R O F I T A B L E .**\n\nWe pursue mutually profitable relationships with customers and suppliers. Only when our company achieves an ade- \n\nquate profit can the other elements of this Vision be realized. \n\n**W E W I L L C R E A T E L O N G - T E R M V A L U E F O R S H A R E H O L D E R S .**\n\nWe create long-term value for shareholders by earning financial returns significantly greater than our cost of capital and \n\npursuing profitable growth opportunities. We will safeguard our shareholders’ equity by maintaining a strong balance \n\nsheet to allow flexibility in responding to a continuously changing market and business environment. ", + "page_start": 63, + "page_end": 63, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "autonomous, decentralized businesses with strong brands \n\nfocused on distinct markets. \n\nImportant to our company’s success, is a strong Board \n\nof Directors who bring their individual skills, knowledge, and \n\nStan A. Askren experience to our company. Their involvement, independence, \n\nand integrity provide the ongoing foundation for effective gov- P R E S I D E N T \n\nernance and corporate oversight for you, our shareholders. \n\nThis year we recognize retiring directors Lorne R. \n\nWaxlax, Robert W. Cox, and M. Farooq Kathwari. We thank \n\nthem for their dedication. We are also pleased to welcome \n\nJoseph Scalzo, President, Personal Care Products, The Gillette \n\nCompany, to our board. \n\nOur CEO succession process is progressing smoothly. \n\nThe appointment of Stan Askren as President of HON \n\nINDUSTRIES and as a member of the Board of Directors, ", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**ITEM 1. BUSINESS**\n\n**Company Overview**\n\nWe are a leading provider of services in the domestic non-hazardous solid waste industry. We provide \nnon-hazardous solid waste collection services for commercial, industrial, municipal and residential customers \nthrough 140 collection companies in 22 states. We also own or operate 96 transfer stations, 58 solid waste \nlandÑlls and 35 recycling facilities. \n\nAs of December 31, 2004, our operations were organized into Ñve regions whose boundaries may change \nfrom time to time: Eastern, Central, Southern, Southwestern and Western. Each region is organized into \nseveral operating areas and each area contains a group of operating locations. Each of our regions and \nsubstantially all our areas provide collection, transfer, recycling and disposal services. We believe that this \norganizational structure facilitates the integration of our operations within each region, which is a critical \ncomponent of our operating strategy. See Note 10 of the Notes to Consolidated Financial Statements for \nfurther discussion of operating segments. \n\nWe had revenue of $2,708.1 million and $2,517.8 million and operating income of $452.3 million and \n$412.7 million for the years ended December 31, 2004 and 2003, respectively. The $190.3 million, or 7.6%, \nincrease in revenue from 2003 to 2004 is primarily attributable to the successful execution of our operating and \ngrowth strategies described below. The $39.6 million, or 9.6%, increase in operating income from 2003 to 2004 \nis partially due to higher self-insurance expense during 2003 related to existing claims and was attributable to \nthe expansion of our operations and various changes in estimates as a result of continued negative trends \nthrough the 2003 policy year. The remaining increase in operating income is due to the successful execution of \nour operating and growth strategies described below. ", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_RSG_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed8.pdf", + "query": "Did automating the writing of EM-to-IP handoffs notes using LLM lead to life-threatening outputs ?", + "target_page": 8, + "target_passage": "none of the incorrect output text elements reached life-threatening risk", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Discussion**\n\nThe study demonstrated success in generating EM-to-IP handoff notes using both a fine tuned, \n\npretrained LLM and rule-based approaches within an end user–developed note template. It is \n\nimportant to note that (largely due to time constraints within the EM care delivery model) the \n\nperformance of EM-to-IP handoff notes was not the current standard of care in EM. The study site’s \n\nunique electronic handoff process enabled a comparison between physician-written and \n\nLLM-generated handoff notes. Traditional automated evaluations of the model output suggested ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed8.pdf" + }, + { + "text": "**Conclusions**\n\nThis study’s results suggest promise for future thoughtful integration of LLM-generated EM-to-IP \n\nhandoff notes into clinical admission workflows, as well as the associated potential downstream \n\nquality and efficiency gains. Our novel clinical evaluation framework demonstrates an effective \n\npreimplementation strategy to measure potential patient safety implications of incorrectness \n\nidentified in LLM-generated clinical care summaries, which will guide future model refinement and \n\nimplementation strategies. In the absence of a current written standard of care in EM, this innovation \n\ncould represent a transformative advancement in the quality of EM-to-IP transitions of care. ", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed8.pdf" + }, + { + "text": "**Abstract**\n\n**IMPORTANCE**An emergency medicine (EM) handoff note generated by a large language model \n\nof EM-to-inpatient (IP) handoffs. \n\n**OBJECTIVE**To develop LLM-generated EM-to-IP handoff notes and evaluate their accuracy and \n\nsafety compared with physician-written notes. \n\n**DESIGN, SETTING, AND PARTICIPANTS**This cohort study used EM patient medical records with \n\nacute hospital admissions that occurred in 2023 at NewYork-Presbyterian/Weill Cornell Medical \n\nEM-to-IP handoff notes. Using both conventional automated methods (ie, recall-oriented \n\nscore [BERTScore], and source chunking approach for large-scale inconsistency evaluation [SCALE]) \n\nand a novel patient safety-focused framework, LLM-generated handoff notes vs physician-written \n\nnotes were compared. Data were analyzed from October 2023 to March 2024. \n\n**EXPOSURE**LLM-generated EM handoff notes. \n\n**MAIN OUTCOMES AND MEASURES**LLM-generated handoff notes were evaluated for (1) lexical \n\nsimilarity with respect to physician-written notes using ROUGE and BERTScore; (2) fidelity with \n\nrespect to source notes using SCALE; and (3) readability, completeness, curation, correctness, \n\nusefulness, and implications for patient safety using a novel framework. ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed8.pdf" + }, + { + "text": "**RESULTS**In this study of 1600 EM patient records (832 [52%] female and mean [SD] age of 59.9 \n\n[18.9] years), LLM-generated handoff notes, compared with physician-written ones, had higher \n\nROUGE (0.322 vs 0.088), BERTScore (0.859 vs 0.796), and SCALE scores (0.691 vs 0.456), \n\nindicating the LLM-generated summaries exhibited greater similarity and more detail. As reviewed by \n\n3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) \n\nusefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean \n\n(SD) patient safety scores of 4.06 (0.86) out of 5 (compared with 4.50 [0.56] for physician-written). \n\nNone of the LLM-generated summaries were classified as a critical patient safety risk. \n\n**CONCLUSIONS AND RELEVANCE**In this cohort study of 1600 EM patient medical records, \n\nLLM-generated EM-to-IP handoff notes were determined superior compared with physician-written \n\nsummaries via conventional automated evaluation methods, but marginally inferior in usefulness ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed8.pdf" + }, + { + "text": "Abbreviations: EM, emergency medicine; IP, inpatient. \n\na Automated EM handoff notes are generated from \n\nthe curation of the data through both rule-based and \nlarge language model–summarization approaches. \n\nDecember 3, 2024 4/12 ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed8.pdf" + }, + { + "text": "EHR-based handoff workflow via a standardized EM-to-IP handoff note template, designed for real- \n\ntime completion by the EM care team at time of admission. At 3 and 6 months postlaunch, informal \n\nevaluation of new EM-to-IP handoff notes through random medical record review and unstructured \n\nclinician feedback sessions revealed variable completeness, quality, and subsequent usefulness of \n\nthe handoff notes. ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\n**Additional Contributions:**We are grateful for the help we received from Rita Giordana Pulpo, MA (Parsons and \nCornell Tech), for the designs in our manuscript; Caroline Reiner, BA (Yale University) for her contributions in \nhelping design the data pipeline method for emergency medicine handoff note summarization; and Travis Gossey, \nMD (Northwestern), for his contributions with our project sponsorship, facilitating data access, and assisting with \nphysician recruitment. None of them were compensated for their contributions. \n\n**REFERENCES**\n**1**. Cohen MD and Hilligoss PB. The published literature on handoffs in hospitals: deficiencies identified in an \nextensive review. Qual Saf Health Care. 2010;19(6):493-497. doi:10.1136/qshc.2009.033480 \n\n**2**. Donaldson MS, Corrigan JM, Kohn LT. To err is human: building a safer health system. National Academy Press; \n2000. ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine**\n\nevaluation frameworks may not address the anticipated effect LLM performance limitations could \nhave on patient safety.38-41 \n\nIn this study, we aim to expand on prior work of clinical summarization to rigorously evaluate \n\nthe outcomes of a fine-tuned model developed to generate accurate and safe summaries of the care \n\nrendered during an ED visit, with the long-term goal of integrating automated, structured EM-to-IP \n\nhandoff notes into an EHR-based electronic handoff admission workflow (see eAppendix 1 in \n\nSupplement 1). We fine-tune pretrained LLMs on well curated datasets of structured and \n\nunstructured EHR data from the ED encounter to summarize the patient’s ED care. We improved the \n\ncorrectness of model generations and customized the summaries in a structured format designed \n\nby a team of EM and internal medicine physician leaders for optimal usefulness. We proposed a novel \n\npatient safety-focused LLM evaluation framework to examine the LLM-generated handoff notes’ \n\nquality and accuracy and the downstream patient safety implications of any identified inaccuracies. \n\nTo evaluate noninferiority, we compared the LLM-generated handoff notes with the preexisting \n\nphysician-written EM-to-IP handoff notes as the active control, using both the proposed patient ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\nLLM-model training, an informatics professional (V.H.) worked over a period of 200 hours with 3 \n\nboard certified emergency medicine physician leaders with experience in formal quality and patient \n\nsafety review processes (M.M., A.F., and P.S.) to improve the dataset through manual curation and \n\nannotation. As the task of EM-handoff note generation is not dependent on racial characteristics of \n\nthe patients, we removed all mentions of race during the annotation stage as a means to avoid race \n\nbias; therefore, the model was trained to generate text without race-based assumptions. Although \n\nresource intensive, a small and carefully curated dataset of at least 1000 examples has been shown \nto be sufficient to produce remarkable results for the language model chosen.42 Given the size of \nour dataset, we created a train and test dataset with a ratio of 1500:100, with a higher ratio of data \n\nplaced in the training set and eschewed a validation set to lower the variance of the models. We used \n\nk-fold cross validation on the training dataset to avoid sampling bias for the hyperparameter \n\noptimization of the LLMs. ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\nrecords and perform manual comparative evaluations of 50 LLM-generated and 50 clinician- \n\ngenerated summary notes within the context of complex ED encounters. This approach is unlikely \n\nscalable, invoking complex postimplementation governance questions that remain unanswered in \n\nthe medical literature and invoke the need for future research focused on the possibility of AI \nperforming the clinical evaluations.56 Lastly, the relatively infrequent but potentially significant \npatient safety implications of model output incorrectness and incompleteness warrants further \n\nmodel refinement and repeat clinical evaluation, as described in the eAppendix 1 in Supplement 1 \n\noverview of our rigorous preimplementation model development and testing framework. ", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed8.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed8.pdf", + "query": "How did automating the writing of EM-to-IP handoffs notes using LLM affect the usefulness of these notes ?", + "target_page": 1, + "target_passage": "LLM-generated EM-to-IP handoff notes were determined superior compared with physician-written summaries via conventional automated evaluation methods, but marginally inferior in usefulness", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "**Discussion**\n\nThe study demonstrated success in generating EM-to-IP handoff notes using both a fine tuned, \n\npretrained LLM and rule-based approaches within an end user–developed note template. It is \n\nimportant to note that (largely due to time constraints within the EM care delivery model) the \n\nperformance of EM-to-IP handoff notes was not the current standard of care in EM. The study site’s \n\nunique electronic handoff process enabled a comparison between physician-written and \n\nLLM-generated handoff notes. Traditional automated evaluations of the model output suggested ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed8.pdf" + }, + { + "text": "**Conclusions**\n\nThis study’s results suggest promise for future thoughtful integration of LLM-generated EM-to-IP \n\nhandoff notes into clinical admission workflows, as well as the associated potential downstream \n\nquality and efficiency gains. Our novel clinical evaluation framework demonstrates an effective \n\npreimplementation strategy to measure potential patient safety implications of incorrectness \n\nidentified in LLM-generated clinical care summaries, which will guide future model refinement and \n\nimplementation strategies. In the absence of a current written standard of care in EM, this innovation \n\ncould represent a transformative advancement in the quality of EM-to-IP transitions of care. ", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed8.pdf" + }, + { + "text": "**Abstract**\n\n**IMPORTANCE**An emergency medicine (EM) handoff note generated by a large language model \n\nof EM-to-inpatient (IP) handoffs. \n\n**OBJECTIVE**To develop LLM-generated EM-to-IP handoff notes and evaluate their accuracy and \n\nsafety compared with physician-written notes. \n\n**DESIGN, SETTING, AND PARTICIPANTS**This cohort study used EM patient medical records with \n\nacute hospital admissions that occurred in 2023 at NewYork-Presbyterian/Weill Cornell Medical \n\nEM-to-IP handoff notes. Using both conventional automated methods (ie, recall-oriented \n\nscore [BERTScore], and source chunking approach for large-scale inconsistency evaluation [SCALE]) \n\nand a novel patient safety-focused framework, LLM-generated handoff notes vs physician-written \n\nnotes were compared. Data were analyzed from October 2023 to March 2024. \n\n**EXPOSURE**LLM-generated EM handoff notes. \n\n**MAIN OUTCOMES AND MEASURES**LLM-generated handoff notes were evaluated for (1) lexical \n\nsimilarity with respect to physician-written notes using ROUGE and BERTScore; (2) fidelity with \n\nrespect to source notes using SCALE; and (3) readability, completeness, curation, correctness, \n\nusefulness, and implications for patient safety using a novel framework. ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed8.pdf" + }, + { + "text": "**RESULTS**In this study of 1600 EM patient records (832 [52%] female and mean [SD] age of 59.9 \n\n[18.9] years), LLM-generated handoff notes, compared with physician-written ones, had higher \n\nROUGE (0.322 vs 0.088), BERTScore (0.859 vs 0.796), and SCALE scores (0.691 vs 0.456), \n\nindicating the LLM-generated summaries exhibited greater similarity and more detail. As reviewed by \n\n3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) \n\nusefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean \n\n(SD) patient safety scores of 4.06 (0.86) out of 5 (compared with 4.50 [0.56] for physician-written). \n\nNone of the LLM-generated summaries were classified as a critical patient safety risk. \n\n**CONCLUSIONS AND RELEVANCE**In this cohort study of 1600 EM patient medical records, \n\nLLM-generated EM-to-IP handoff notes were determined superior compared with physician-written \n\nsummaries via conventional automated evaluation methods, but marginally inferior in usefulness ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed8.pdf" + }, + { + "text": "EHR-based handoff workflow via a standardized EM-to-IP handoff note template, designed for real- \n\ntime completion by the EM care team at time of admission. At 3 and 6 months postlaunch, informal \n\nevaluation of new EM-to-IP handoff notes through random medical record review and unstructured \n\nclinician feedback sessions revealed variable completeness, quality, and subsequent usefulness of \n\nthe handoff notes. ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed8.pdf" + }, + { + "text": "Abbreviations: EM, emergency medicine; IP, inpatient. \n\na Automated EM handoff notes are generated from \n\nthe curation of the data through both rule-based and \nlarge language model–summarization approaches. \n\nDecember 3, 2024 4/12 ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine**\n\nevaluation frameworks may not address the anticipated effect LLM performance limitations could \nhave on patient safety.38-41 \n\nIn this study, we aim to expand on prior work of clinical summarization to rigorously evaluate \n\nthe outcomes of a fine-tuned model developed to generate accurate and safe summaries of the care \n\nrendered during an ED visit, with the long-term goal of integrating automated, structured EM-to-IP \n\nhandoff notes into an EHR-based electronic handoff admission workflow (see eAppendix 1 in \n\nSupplement 1). We fine-tune pretrained LLMs on well curated datasets of structured and \n\nunstructured EHR data from the ED encounter to summarize the patient’s ED care. We improved the \n\ncorrectness of model generations and customized the summaries in a structured format designed \n\nby a team of EM and internal medicine physician leaders for optimal usefulness. We proposed a novel \n\npatient safety-focused LLM evaluation framework to examine the LLM-generated handoff notes’ \n\nquality and accuracy and the downstream patient safety implications of any identified inaccuracies. \n\nTo evaluate noninferiority, we compared the LLM-generated handoff notes with the preexisting \n\nphysician-written EM-to-IP handoff notes as the active control, using both the proposed patient ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\n**Additional Contributions:**We are grateful for the help we received from Rita Giordana Pulpo, MA (Parsons and \nCornell Tech), for the designs in our manuscript; Caroline Reiner, BA (Yale University) for her contributions in \nhelping design the data pipeline method for emergency medicine handoff note summarization; and Travis Gossey, \nMD (Northwestern), for his contributions with our project sponsorship, facilitating data access, and assisting with \nphysician recruitment. None of them were compensated for their contributions. \n\n**REFERENCES**\n**1**. Cohen MD and Hilligoss PB. The published literature on handoffs in hospitals: deficiencies identified in an \nextensive review. Qual Saf Health Care. 2010;19(6):493-497. doi:10.1136/qshc.2009.033480 \n\n**2**. Donaldson MS, Corrigan JM, Kohn LT. To err is human: building a safer health system. National Academy Press; \n2000. ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\nLLM-model training, an informatics professional (V.H.) worked over a period of 200 hours with 3 \n\nboard certified emergency medicine physician leaders with experience in formal quality and patient \n\nsafety review processes (M.M., A.F., and P.S.) to improve the dataset through manual curation and \n\nannotation. As the task of EM-handoff note generation is not dependent on racial characteristics of \n\nthe patients, we removed all mentions of race during the annotation stage as a means to avoid race \n\nbias; therefore, the model was trained to generate text without race-based assumptions. Although \n\nresource intensive, a small and carefully curated dataset of at least 1000 examples has been shown \nto be sufficient to produce remarkable results for the language model chosen.42 Given the size of \nour dataset, we created a train and test dataset with a ratio of 1500:100, with a higher ratio of data \n\nplaced in the training set and eschewed a validation set to lower the variance of the models. We used \n\nk-fold cross validation on the training dataset to avoid sampling bias for the hyperparameter \n\noptimization of the LLMs. ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\nrecords and perform manual comparative evaluations of 50 LLM-generated and 50 clinician- \n\ngenerated summary notes within the context of complex ED encounters. This approach is unlikely \n\nscalable, invoking complex postimplementation governance questions that remain unanswered in \n\nthe medical literature and invoke the need for future research focused on the possibility of AI \nperforming the clinical evaluations.56 Lastly, the relatively infrequent but potentially significant \npatient safety implications of model output incorrectness and incompleteness warrants further \n\nmodel refinement and repeat clinical evaluation, as described in the eAppendix 1 in Supplement 1 \n\noverview of our rigorous preimplementation model development and testing framework. ", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed8.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv5_ccby4license.pdf", + "query": "What company released MegatronLM ?", + "target_page": 2, + "target_passage": "NVIDIA released the MegatronLM", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "\n\nM*1.2 ", + "page_start": 238, + "page_end": 238, + "source_file": "00-80T-80.pdf" + }, + { + "text": "**Total**\n\n**Production (mmboe)** **47.1** 54.2 \n\n**Sales volume (mmboe)** **49.9** 55.4 \n\n**Sales revenue ($million)** **1,500.9** 1,465.0 ", + "page_start": 15, + "page_end": 15, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**Implementing the IBM Storwize**\n**V7000 with IBM Spectrum**\n**Virtualize V8.2.1**\n\nJon Tate \n\nJack Armstrong \n\nTiago Bastos \n\nPawel Brodacki \n\nFrank Enders \n\nSergey Kubin \n\nDanilo Miyasiro \n\nRodrigo Suzuki ", + "page_start": 0, + "page_end": 0, + "source_file": "sg247938.pdf" + }, + { + "text": "The Company is actively seeking future development opportunities in the United \nKingdom. In May 2003, the Company acquired a 25% interest in Metro Casinos \nLimited, a United Kingdom gaming company which operates a casino in Bristol. \nSee Note 10 for discussion of other potential developments in the United Kingdom. \n\nIn June 2004, the Company entered into a joint venture agreement to develop, \nbuild and operate a hotel-casino resort in Macau S.A.R. The agreement is subject \nto, among other things, the approval of the government of Macau S.A.R., and other \nregulatory approvals, as well as the entry into a subconcession agreement with the \nholder of one of the existing concessions. ", + "page_start": 55, + "page_end": 55, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "\nPOWER \n:D \nREK? ", + "page_start": 120, + "page_end": 120, + "source_file": "00-80T-80.pdf" + }, + { + "text": "Thanks to the authors of the previous edition of this book: \n\nErwan Auffret, Pawel Brodacki, Libor Miklas, Glen Routley, James Whitaker \n\nThanks to the following people for their contributions to this project: \n\nChristopher Bulmer \nDebbie Butts \nCarlos Fuente \nEvelyn Perez \nMatt Smith \n**IBM Hursley, UK**\n\nJames Whitaker \nImran Imtiaz \nAdam Lyon-Jones \n**IBM Manchester, UK**\n\nJordan Fincher \nKaren Brown \nMary Connell \nNavin Manohar \nTerry Niemeyer \n**IBM US**\n\nSpecial thanks to the Broadcom Inc. staff in San Jose, California for their support of this \nresidency in terms of equipment and support in many areas: \n\nSangam Racherla \nBrian Steffler \nMarcus Thordal \n**Broadcom Inc.**", + "page_start": 18, + "page_end": 18, + "source_file": "sg247938.pdf" + }, + { + "text": "R E V E N U E S F R O M M A J O R C U S T O M E R S 9 \n\nThe Company had one major customer which represented approximately $9.1 million (14.4 percent), $7.4 million (12.4 percent) and $11.0 million \n(19.1 percent) of the Company’s operating revenues during the years 2003, 2002 and 2001, respectively. ", + "page_start": 20, + "page_end": 20, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "markets. Signature products include high-den- \n**•**Created CAPTM — a comprehensive family of **•**A lead exhibitor in the first-ever Office \nsity shelving and mobile storage systems \nlibrary products designed to effectively fur- Furniture Expo in Mexico City. \ndesigned for efficient space utilization. Holga \nnish today’s diverse learning environments **•**Successfully completed projects for key \nalso offer a broad range of traditional metal \nand sports stadium suites. multinational accounts in Ireland, Barbados, \nfiling and storage products. \nJamaica, Egypt, and Hong Kong, among others. \n**W W W . P A O L I . C O M**\n**H I G H L I G H T S / A W A R D S :** **•**Opened the first HON INDUSTRIES’ show- \n\n**•**Introduced 8000 Series Stackable Storage room outside the United States in Monterrey, \n\nunits, which provide a wide array of customiz- Mexico. \n\nable storage options within a standard plat- \n**W W W . H O N I N T E R N A T I O N A L . C O M**\nform. The Series complements our new 8000 ", + "page_start": 28, + "page_end": 28, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "\nPOWER \nREO’D ", + "page_start": 179, + "page_end": 179, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n\nThe parameter JMz-l ", + "page_start": 240, + "page_end": 240, + "source_file": "00-80T-80.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv5_ccby4license.pdf", + "query": "What is the average emission of a human being per year in terms of CO2eq ?", + "target_page": 3, + "target_passage": "the average human is responsible for an estimated 5t CO2e per year", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "\n\nCONSUMPTION \n\n30.000 \n\nt \nI \n\n0” \n2 25,000 \n\n5 \na \n\n20,000 ", + "page_start": 137, + "page_end": 137, + "source_file": "00-80T-80.pdf" + }, + { + "text": "**Figure 14.**Difference in annual maximum daily maximum temperature between 2°C and 1.5°C global warming, for individual \nensemble members and ensemble mean. \n\nensemble mean \n\n", + "page_start": 19, + "page_end": 19, + "source_file": "pubmed11.pdf" + }, + { + "text": "**1. Introduction**\n\nThe public’s distinct understanding of the cause and effect of the global climate issue is an obstacle \nto joint mitigation actions. In addition to a diversity of views co-existing in the public discourse [1,2], \nprevious studies noticed that the public had even failed to reach an agreement on whether “climate \nchange” or “global warming” is the most appropriate definition of the global climate concern [3–5]. \nAccording to the definition provided by [6], global warming describes global climate issues as \na continuous increase in the average temperature of Earth’s surface due to anthropogenic emissions \nof greenhouse gases, whereas climate change includes not only temperature rise but also a range of \n\nInt. J. Environ. Res. Public Health**2020**, 17, 1062; doi:10.3390/ijerph17031062 www.mdpi.com/journal/ijerph ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed10.pdf" + }, + { + "text": "287 EU-OSHA, Emerging risks: Workers’ safety and health in green jobs \n288 United States Environmental Protection Agency: Green Engineering \n289 United Nations Environmental Programme (UNEP): Global Chemicals Outlook \n290 CEFIC, Facts and figures: Chemical Industry Contributes $5.7 Trillion to Global GDP and Supports 120 Million \nJobs, New Report Shows, here \n291 UNEP, 2019: Global Chemicals Outlook II - From Legacies to Innovative Solutions: Implementing the 2030 \nAgenda for Sustainable Development (p. 27). \n292 Naidu et al., 2021: Chemical pollution: A growing peril and potential catastrophic risk to humanity \n293 Eurostat: Production and consumption of chemicals by hazard class, here \n294 Statistics Sweden SCB: Environmental accounts – Chemical indicators 2019 \n295 EU-OSHA: ESENER Data visualisation 2019 Risk factors present in the establishment – Chemical or \nbiological substances. \n296 OSHWiki: Climate change - Impact on Occupational Safety and Health. \n297 Pace advanced from intergenerational conception (children live and work like their parents) to a generational \nconception (children work in a different occupation, compared to their parents but have one main job all their life), \nto intragenerational conceptions (several changes during lifetime), according to: Rosa, 2013: Social acceleration – \nA new theory of modernity. \n298 Eurostat: Employment and activity by sex, age and citizenship (%) - annual data, here ", + "page_start": 151, + "page_end": 151, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "r \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n–0.2 \n. \n. \n. \n. \n**Figure 18.**Hunger and Climate Vulnerability Index at 1.5°C global warming (ensemble mean). \n. \n. \n. ", + "page_start": 21, + "page_end": 21, + "source_file": "pubmed11.pdf" + }, + { + "text": "**Figure 26: Work-related DALYs – estimates by WHO/ILO and ICOH for the EU27**\n\nPutting the absolute numbers of WHO/ILO in relation to the EU27 population above 16 years this results \nin approximately**1,172 lost life years per 100,000 working-age population**(WHO/ILO). ICOH \ncalculates in absolute numbers 6.8 million lost life years for the labour force population, resulting**in**\n**3,364 DALYs per 100,000 labour force**. \n\nIt can be concluded that despite methodological differences the estimates**do not vary that much if the**\n**same reference population**is used in the calculation. Future research will contribute to a better \nattribution of the impact of work on these diseases.**In the future, relevant disease groups will be**\n**incorporated in these estimates**, that is, the impact of work on the prevalence of**mental diseases**\nand of communicable diseases caused by biological agents needs to be incorporated. \n\nThe next table shows the**difference between major occupational risk factors and deaths**at the \nEU27 level and the global level. At EU27 level asbestos-related cancers are clearly the most frequent \nreason for work-related deaths with nearly 60% of all cases; the two next main causes are COPD (15.9%) \nand CVD (12.3%). The global situation is quite different. CVD account for nearly 40%, COPD for 24% \nand injuries for 19%. ", + "page_start": 83, + "page_end": 83, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**Figure 19.**Difference in Hunger and Climate Vulnerability Index between 2°C and 1.5°C global warming, for individual ensemble \nmembers and ensemble mean. \n\n4. Discussion \n\nIn most cases, global mean changes at 2°C are larger than those at 1.5°C, not only for individual \nmembers but also for the ensemble as a whole. All ensemble members show increases in TXx at \n2°C which are larger than all changes at 1.5°C, and same true for most other variables. ", + "page_start": 21, + "page_end": 21, + "source_file": "pubmed11.pdf" + }, + { + "text": "**LPG (‘000 t)**\n\nCooper **108.7**\n\nSurat/Denison **0.1**\n\nBayu-Undan **49.8**\n\n**Total production** **158.6**\n\nTotal sales volume **148.6**\n\nTotal sales revenue ($million) **90.5**", + "page_start": 15, + "page_end": 15, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "In the past hundred years, the global climate has experienced great changes1–4. According to the sixth assess- \nment report of IPCC, the global average surface temperature increased by 1.09 °C between 1850 and 2020, and \nalmost all regions in the world experienced surface warming5. Due to global warming, the extreme climate events \nbecome more and more frequent, and the ecological environment problems caused by climate change are more \nand more serious, which restrict the sustainable development of human society and health6–10. Global warming \nhas gradually changed from a scientific issue to a major social issue of common concern to governments and \npeople of all countries11–13. In 2016, nearly 200 parties of the United Nations Framework Convention on climate \nchange reached the Paris Agreement at the climate change conference in Paris14. Paris Agreement has indicated \nthat it is urgent to hold the increase in global average temperature well below 2.0 °C above pre-industrial levels \nand pursue efforts to limit the temperature increase to 1.5 °C above pre-industrial levels. ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed9.pdf" + }, + { + "text": "**Figure 1.**Changes of global temperature of 20 years moving average from 2020 to 2099 simulated by 5 ESMs \nunder 4 RCP scenarios. Note: The black horizontal dashed lines: global warming by 1.5 °C and 2.0 °C; the black \nvertical solid line: the years when global warming reaches 1.5 °C and 2.0 °C simulated by the selected models \nand scenarios. ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed9.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv5_ccby4license.pdf", + "query": "How did the Black Lives Matter movement influence the writing of Wikipedia articles ?", + "target_page": 5, + "target_passage": " the Black Lives Matter movement (BLM) influenced Wikipedia article generation and editing such that, as the BLM movement grew, articles covering shootings of Black people in- creased in coverage and were generated with reduced latency", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Thus at each step, from initial participation in Internet fora, to \ncontinued presence there, to the collection and finally the filtering \nof training data, current practice privileges the hegemonic view- \npoint. In accepting large amounts of web text as ‘representative’ \nof ‘all’ of humanity we risk perpetuating dominant viewpoints, \nincreasing power imbalances, and further reifying inequality. We \ninstead propose practices that actively seek to include communities \nunderrepresented on the Internet. For instance, one can take inspi- \nration from movements to decolonize education by moving towards \noral histories due to the overrepresentation of colonial views in \ntext [35, 76, 127], and curate training datasets through a thoughtful \nprocess of deciding what to put in, rather than aiming solely for \nscale and trying haphazardly to weed out, post-hoc, flotsam deemed \n‘dangerous’, ‘unintelligible’, or ‘otherwise bad’. \n\n4.2 Static Data/Changing Social Views \nA central aspect of social movement formation involves using lan- \nguage strategically to destabilize dominant narratives and call at- \ntention to underrepresented social perspectives. Social movements \nproduce new norms, language, and ways of communicating. This \nadds challenges to the deployment of LMs, as methodologies re- \nliant on LMs run the risk of ‘value-lock’, where the LM-reliant \ntechnology reifies older, less-inclusive understandings. \n\nFor instance, the Black Lives Matter movement (BLM) influenced \nWikipedia article generation and editing such that, as the BLM \nmovement grew, articles covering shootings of Black people in- \ncreased in coverage and were generated with reduced latency [135]. \nImportantly, articles describing past shootings and incidents of po- \nlice brutality were created and updated as articles for new events \nwere created, reflecting how social movements make connections \nbetween events in time to form cohesive narratives [102]. More \ngenerally, Twyman et al. [135] highlight how social movements \nactively influence framings and reframings of minority narratives ", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "in the type of online discourse that potentially forms the data that \nunderpins LMs. \n\nAn important caveat is that social movements which are poorly \ndocumented and which do not receive significant media attention \nwill not be captured at all. Media coverage can fail to cover protest \nevents and social movements [41, 96] and can distort events that \nchallenge state power [36]. This is exemplified by media outlets \nthat tend to ignore peaceful protest activity and instead focus on \ndramatic or violent events that make for good television but nearly \nalways result in critical coverage [81]. As a result, the data under- \npinning LMs stands to misrepresent social movements and dispro- \nportionately align with existing regimes of power. \n\nDeveloping and shifting frames stand to be learned in incomplete \nways or lost in the big-ness of data used to train large LMs — particu- \nlarly if the training data isn’t continually updated. Given the com- \npute costs alone of training large LMs, it likely isn’t feasible for \neven large corporations to fully retrain them frequently enough to \nkeep up with the kind of language change discussed here. Perhaps \nfine-tuning approaches could be used to retrain LMs, but here again, \nwhat would be required is thoughtful curation practices to find ap- \npropriate data to capture reframings and techniques for evaluating \nwhether such fine-tuning appropriately captures the ways in which \nnew framings contest hegemonic representations. ", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "For example (unaudited): \n\n• Wikipedia and the other projects operated by the Foundation receive more than 19.4 billion pageviews \n\nper month, making them one of the most popular Web properties worldwide. Wikipedia is available in \nmore than 332 languages and contains more than 63 million articles contributed by a global volunteer \ncommunity. \n\n• For the year ended June 30, 2024, the educational content of the Foundation’s largest project, \nWikipedia, grew by approximately 1.9 million articles to approximately 63.4 million articles. \n\n• For the year ended June 30, 2024, volunteers added approximately 12.2 million images, movies, and \nsound files to the Foundation’s multimedia repository, making the total 106.7 million files. \n\n• Volunteers also contribute in several ways to the Foundation’s wiki software: volunteer software \n\ndevelopers add new functionality to the code base, and volunteer language specialists add to the code \nbase by translating the wiki interface into different languages. During the year ended June 30, 2024, \nthere were 47,773 commits merged, through the efforts of approximately 511 authors/contributors, of \nwhich 8,161 commits were through the efforts of approximately 244 volunteers. ", + "page_start": 17, + "page_end": 17, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "Hum. Serv.**2012**, 30, 160–185. [CrossRef] \n\n54. Yang, G. Narrative agency in hashtag activism: The case of# BlackLivesMatter. Media Commun.**2016**, 4, 13. \n55. Bruns, A.; Burgess, J.E. The use of Twitter hashtags in the formation of ad hoc publics. In Proceedings of the \n6th European Consortium for Political Research (ECPR) General Conference 2011, Reykjavík, Iceland, 25–27 \nAugust 2011. \n\n56. Rzeszotarski, J.M.; Spiro, E.S.; Matias, J.N.; Monroy-Hernández, A.; Morris, M.R. Is anyone out there?: \nUnpacking Q&A hashtags on twitter. In Proceedings of the SIGCHI Conference on Human Factors in \nComputing Systems, Toronto, ON, Canada, 26 April–1 May 2014; pp. 2755–2758. \n\n57. Tsur, O.; Rappoport, A. What’s in a hashtag?: Content based prediction of the spread of ideas in microblogging \ncommunities. In Proceedings of the Fifth ACM International Conference on Web Search and Data Mining, \nSeattle, WA, USA, 8–12 February 2012; pp. 643–652. \n\n58. Yang, L.; Sun, T.; Zhang, M.; Mei, Q. We know what@ you# tag: Does the dual role affect hashtag adoption? \nIn Proceedings of the 21st international conference on World Wide Web, Lyon, France, 16–20 April 2012; \npp. 261–270. \n\n59. Weller, K.; Dröge, E.; Puschmann, C. Citation Analysis in Twitter: Approaches for Defining and Measuring \nInformation Flows within Tweets during Scientific Conferences. In Proceedings of the Making Sense of \nMicroposts 2011, Heraklion, Greece, 30 May 2011; pp. 1–12. \n\n60. Meraz, S. Hashtag wars and networked framing: The private/public networked protest repertoires of occupy \non twitter. In Between the Public and Private in Mobile Communication; Routledge: Abingdon, UK, 2017; \npp. 303–323. \n\n61. Meraz, S.; Papacharissi, Z. Networked gatekeeping and networked framing on# Egypt. Int. J. Press.**2013**, 18, ", + "page_start": 18, + "page_end": 18, + "source_file": "pubmed10.pdf" + }, + { + "text": "[35] Benjamin Dangl. 2019. The Five Hundred Year Rebellion: Indigenous Movements \nand the Decolonization of History in Bolivia. AK Press. \n[36] Christian Davenport. 2009. Media bias, perspective, and state repression: The \nBlack Panther Party. Cambridge University Press. \n[37] Ferdinand de Saussure. 1959. Course in General Linguistics. The Philosophical \nSociety, New York. Translated by Wade Baskin. ", + "page_start": 10, + "page_end": 10, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "Furthermore, while user-generated content sites like Reddit, \nTwitter, and Wikipedia present themselves as open and accessible \nto anyone, there are structural factors including moderation prac- \ntices which make them less welcoming to marginalized populations. \nJones [64] documents (using digital ethnography techniques [63]) \nmultiple cases where people on the receiving end of death threats \non Twitter have had their accounts suspended while the accounts \nissuing the death threats persist. She further reports that harass- \nment on Twitter is experienced by “a wide range of overlapping \ngroups including domestic abuse victims, sex workers, trans people, \nqueer people, immigrants, medical patients (by their providers), \nneurodivergent people, and visibly or vocally disabled people.” The \nnet result is that a limited set of subpopulations can continue to \neasily add data, sharing their thoughts and developing platforms \nthat are inclusive of their worldviews; this systemic pattern in turn \nworsens diversity and inclusion within Internet-based communica- \ntion, creating a feedback loop that lessens the impact of data from \nunderrepresented populations. \n\nEven if populations who feel unwelcome in mainstream sites set \nup different fora for communication, these may be less likely to be \nincluded in training data for language models. Take, for example, \nolder adults in the US and UK. Lazar et al. outline how they both in- \ndividually and collectively articulate anti-ageist frames specifically \nthrough blogging [71], which some older adults prefer over more \npopular social media sites for discussing sensitive topics [24]. These \nfora contain rich discussions about what constitutes age discrimi- \nnation and the impacts thereof. However, a blogging community \nsuch as the one described by Lazar et al. is less likely to be found \nthan other blogs that have more incoming and outgoing links. ", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "In some cases, social media users have long struggled to define the most appropriate hashtag for \ncertain events [60,66]. By observing the usage pattern of trending hashtags “#CrimingWhileWhite” and \n“#AliveWhileBlack” in a struggle against racism, [67] discovered that two related hashtags generated \nin a single event will draw public attention to different sides of a story and cause noticeable structural \nand linguistic differences in public discourse. \n\nWhen hashtags are used in combination with each other, their co-occurrence pattern in big data \ncan hint to the cognitive associations in people’s thoughts [60,68]. Researchers can extract nonlinear \nsocial media narratives [69] and discover the networked frame crowdsourced by the public [61]. In the \nfield of climate communication, co-occurrence of environment and social-political hashtags is thought \nto strengthen the associations between a variety of trans-regional issues in protests and build collective \naction frames [70]. The role of climate change issues in the Australian federal election was also \ndiscovered with a co-hash analysis [71]. Reference [72] examined how hashtags concerning science, \npolitical campaigns, geographical discussions, societal concerns, and new technologies co-occurred \nwith “IPCC”, offering a broad context for studying IPCC communication on social media. ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed10.pdf" + }, + { + "text": "discussions which will be included via the crawling methodology, \nand finally the texts likely to be contained after the crawled data \nare filtered. In all cases, the voices of people most likely to hew to \na hegemonic viewpoint are also more likely to be retained. In the \ncase of US and UK English, this means that white supremacist and \nmisogynistic, ageist, etc. views are overrepresented in the training \ndata, not only exceeding their prevalence in the general population \nbut also setting up models trained on these datasets to further \namplify biases and harms. \n\nStarting with who is contributing to these Internet text collec- \ntions, we see that Internet access itself is not evenly distributed, \nresulting in Internet data overrepresenting younger users and those \nfrom developed countries [100, 143].12 However, it’s not just the In- \nternet as a whole that is in question, but rather specific subsamples \nof it. For instance, GPT-2’s training data is sourced by scraping out- \nbound links from Reddit, and Pew Internet Research’s 2016 survey \nreveals 67% of Reddit users in the United States are men, and 64% \nbetween ages 18 and 29.13 Similarly, recent surveys of Wikipedians \nfind that only 8.8–15% are women or girls [9]. ", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "most similar to the ones used in GPT-2’s training data, i.e. docu- \nments linked to from Reddit [25], plus Wikipedia and a collection \nof books. While this was reportedly effective at filtering out docu- \nments that previous work characterized as “unintelligible” [134], \nwhat is unmeasured (and thus unknown) is what else it filtered out. \nThe Colossal Clean Crawled Corpus [107], used to train a trillion \nparameter LM in [43], is cleaned, inter alia, by discarding any page \ncontaining one of a list of about 400 “Dirty, Naughty, Obscene or \nOtherwise Bad Words” [p.6].14 This list is overwhelmingly words \nrelated to sex, with a handful of racial slurs and words related to \nwhite supremacy (e.g. swastika, white power) included. While possi- \nbly effective at removing documents containing pornography (and \nthe associated problematic stereotypes encoded in the language of \nsuch sites [125]) and certain kinds of hate speech, this approach will \nalso undoubtedly attenuate, by suppressing such words as twink, \nthe influence of online spaces built by and for LGBTQ people.15 If \nwe filter out the discourse of marginalized populations, we fail to \nprovide training data that reclaims slurs and otherwise describes \nmarginalized identities in a positive light. ", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "Press: Amsterdam, The Netherlands, 2013; p. 335. \n\n70. Grundberg, M.D.; Lindgren, S. Translocal frame extensions in a networked protest: Situating the# IdleNoMore \n\nhashtag. IC Rev. Cient*í*fica De Inf. Y Comun.**2015**, 11, 49–57. \n\n71. Bruns, A.; Burgess, J.E. # ausvotes: How Twitter covered the 2010 Australian federal election. Commun. \n\nPolitics Cult.**2011**, 44, 37–56. \n\n72. Pearce, W.; Holmberg, K.; Hellsten, I.; Nerlich, B. Climate change on Twitter: Topics, communities and \n\nconversations about the 2013 IPCC Working Group 1 report. PLoS ONE**2014**, 9, e94785. [CrossRef] \n\n73. Zhao, W.X.; Jiang, J.; Weng, J.; He, J.; Lim, E.P.; Yan, H.; Li, X. Comparing twitter and traditional media using \ntopic models. In Proceedings of the European Conference on Information Retrieval, Dublin, Ireland, 18–21 \nApril 2011; pp. 338–349. \n\n74. Doctor, V. Hashtag History: When and What Started It? Available online: https://www.hashtags.org/featured/ \n\nhashtag-history-when-and-what-started-it/ (accessed on 16 January 2020). \n\n75. Newman, T.P. Tracking the release of IPCC AR5 on Twitter: Users, comments, and sources following the \nrelease of the Working Group I Summary for Policymakers. Public Underst. Sci.**2017**, 26, 815–825. [CrossRef] \nSegerberg, A.; Bennett, W.L. Social media and the organization of collective action: Using Twitter to explore \nthe ecologies of two climate change protests. Commun. Rev.**2011**, 14, 197–215. [CrossRef] \nStatista. Number of Monthly Active Twitter Users Worldwide from 1st Quarter 2010 to 1st Quarter 2019 (in \nMillions). 2019. Available online: https://www.statista.com/statistics/282087/number-of-monthly-active- \ntwitter-users/ (accessed on 10 October 2019). \n\n76. \n\n77. \n\n78. Liu, Y.; Kliman-Silver, C.; Mislove, A. The tweets they are a-changin’: Evolution of Twitter users and behavior. \nIn Proceedings of the Eighth International AAAI Conference on Weblogs and Social Media, Ann Arbor, MI, \nUSA, 1–4 June 2014. \n\n79. Williams, H.T.; McMurray, J.R.; Kurz, T.; Lambert, F.H. Network analysis reveals open forums and echo \nchambers in social media discussions of climate change. Glob. Environ. Chang.**2015**, 32, 126–138. [CrossRef] \n80. Guo, L.; Rohde, J.A.; Wu, H.D. Who is responsible for Twitter’s echo chamber problem? Evidence from 2016 \n\nUS election networks. Inf. Commun. Soc.**2020**, 23, 234–251. [CrossRef] \n\n81. Gephi. Websites of Gephi. Available online: https://gephi.org (accessed on 16 January 2020). \n82. Calabrese, C.; Anderton, B.N.; Barnett, G.A. Online Representations of “Genome Editing” Uncover \nOpportunities for Encouraging Engagement: A Semantic Network Analysis. Sci. Commun.**2019**, 41, \n222–242. [CrossRef] \nFruchterman, T.M.; Reingold, E.M. Graph drawing by force-directed placement. Softw. Pract. Exp.**1991**, 21, \n1129–1164. [CrossRef] \n\n83. \n\n84. Myers, J.L.; Well, A.D.; Lorch, R.F., Jr. Research Design and Statistical Analysis; Routledge: Abingdon, UK, 2013. \n85. Krackhardt, D. Predicting with networks: Nonparametric multiple regression analysis of dyadic data. Soc. \n\nNetw.**1988**, 10, 359–381. [CrossRef] \n\n86. Borgatti, S.P.; Everett, M.G.; Freeman, L.C. Ucinet for Windows: Software for Social Network Analysis; Analytic \n\nTechnologies: Harvard, MA, USA, 2002; Volume 6. \n\n87. Zaval, L.; Keenan, E.A.; Johnson, E.J.; Weber, E.U. How warm days increase belief in global warming. Nat. \n\nClim. Chang.**2014**, 4, 143. [CrossRef] \n\n88. Marx, S.M.; Weber, E.U.; Orlove, B.S.; Leiserowitz, A.; Krantz, D.H.; Roncoli, C.; Phillips, J. Communication \nand mental processes: Experiential and analytic processing of uncertain climate information. Glob. Environ. \nChang.**2007**, 17, 47–58. [CrossRef] \n\n89. Bostrom, A.; Morgan, M.G.; Fischhoff, B.; Read, D. What do people know about global climate change? 1. \n\nMental models. Risk Anal.**1994**, 14, 959–970. [CrossRef] \n\n90. Moser, S.C. Communicating climate change: History, challenges, process and future directions. Wiley \n\nInterdiscip. Rev. Clim. Chang.**2010**, 1, 31–53. [CrossRef] \n\n91. Huang, J.; Thornton, K.M.; Efthimiadis, E.N. Conversational tagging in twitter. In Proceedings of the 21st \nACM Conference on Hypertext and Hypermedia, Toronto, ON, Canada, 13–16 June 2010; pp. 173–178. \n\n92. Callon, M. Acting in an Uncertain World; MIT Press: Cambridge, MA, USA, 2009. \n93. O’Neill, S.; Williams, H.T.; Kurz, T.; Wiersma, B.; Boykoff, M. Dominant frames in legacy and social media \n\ncoverage of the IPCC Fifth Assessment Report. Nat. Clim. Chang.**2015**, 5, 380. [CrossRef] ", + "page_start": 19, + "page_end": 19, + "source_file": "pubmed10.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2648.pdf", + "query": "Concerning electrolyte solutions, what assumption makes the primitive model (PM) regarding ions?", + "target_page": 1, + "target_passage": "simple phenomenological models such as the primitive model (PM), for which the ions are assimi- lated to charged hard spheres", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "0 \n1 \n0 \n2 \n\nn \na \nJ \n\n5 \n1 \n\nSince the pioneering works of Debye, H¨uckel, and \nOnsager, electrolyte solutions have been commonly \ndescribed by continuous solvent models, \nfor which \nthe McMillan-Mayer theory [1] provides a rigorous \nstatistical-mechanical foundation. Within that level of \ndescription, simple phenomenological models such as the \nprimitive model (PM), for which the ions are assimi- \nlated to charged hard spheres [2], can lead to explicit \nformulas for the thermodynamic and structural proper- \nties (e.g., with the help of the mean spherical approxima- \ntion (MSA) [3] or the binding MSA (BIMSA) [4]). These \nmodels are the most practical to use [5], since they allow \nfor a direct link between the experimental measurements \nand the microscopic parameters of the system. Never- \ntheless, they ignore the molecular structure of the sol- \nvent. Consequently, they cannot properly account for \nthe complex specific effects of the ions, which appear in \nnumerous biological, chemical, and physical interfacial \nphenomena [6, 7], without further developments. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2648.pdf" + }, + { + "text": "Models of electrolyte solutions from molecular descriptions: The example of NaCl \nsolutions \n\nJohn Jairo Molina1,2,3,∗ Jean-Fran¸cois Dufrˆeche1,2,3,† Mathieu \nSalanne1,2, Olivier Bernard1,2, Marie Jardat1,2, and Pierre Turq1,2 \n1 UPMC-Universit´e Paris 06, UMR 7195, PECSA, F-75005 Paris, France \n2 CNRS, UMR 7195, PECSA, F-75005 Paris, France \n3 Institut de Chimie S´eparative de Marcoule (ICSM), \nUMR 5257 CEA–CNRS–Universit´e Montpellier 2, Site de Marcoule, \nBˆatiment 426, BP 17171, 30207 Bagnols-sur-C`eze Cedex, France \n\nWe present a method to derive implicit solvent models of electrolyte solutions from all-atom \ndescriptions; providing analytical expressions of the thermodynamic and structural properties of \nthe ions consistent with the underlying explicit solvent representation. Effective potentials between \nions in solution are calculated to perform perturbation theory calculations, in order to derive the \nbest possible description in terms of charged hard spheres. Applying this method to NaCl solutions \nyields excellent agreement with the all-atom model, provided ion association is taken into account. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2648.pdf" + }, + { + "text": "To overcome this difficulty, we have explicitly intro- \nduced the CIP in our model (species 3). Straightforward \ncalculations, based on a characteristic-function formal- \nism, allow us to define an equivalent model in which \nthe free ions and the CIP are explicitly taken into ac- \ncount [19, 20]. We apply this formalism by defining a \npair as an anion and a cation at a distance less than \n4 ˚A, which corresponds to the position of the effective \npotential maximum. The interaction between free, like \ncharges in this new system remains unchanged, and the \ncation-anion interactions are easily approximated by ex- ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2648.pdf" + }, + { + "text": "[1] W. G. McMillan and J. E. Mayer, J. Chem. Phys. 13, [12] D. Horinek and R. R. Netz, Phys. Rev. Lett. 99, 226104 \n276 (1945). (2007). \n\n[2] J. M. G. Barthel, H. Krienke, and W. Kunz, Physical \nChemistry of Electrolyte Solutions (Springer, 1998). \n[3] L. Blum, in Theoretical Chemistry: Advances and Per- \nspectives, edited by H. Eyring and D. Henderson (Aca- \ndemic Press, 1980), vol. 5, pp. 1–66. \n\n[13] M. Lund, P. Jungwirth, and C. E. Woodward, Phys. Rev. \nLett. 100, 258105 (2008). \n\n[14] S. Van Damme et al., J. Phys. Chem. B 113, 3105 (2009). \n[15] J.-P. Hansen and I. R. McDonald, Theory of Simple Liq- ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2648.pdf" + }, + { + "text": "To conclude, we have combined MD simulations with \nLPT to construct simple models of electrolyte solutions \nwhich account for the molecular nature of the solvent. \nThe final result is fully analytical and it yields the ther- \nmodynamic and structural properties of the solution, in \nagreement with the original molecular description. The \nmethodology can in principle be adapted to any molecu- \nlar description of the system (MD simulations involving \ninteraction potentials accounting for polarization effects \nor Car-Parrinello MD simulations for example) as long \nas the ion-ion RDF are known. It can also be generalized \nto study interfaces. The method appears to be a promis- \ning approach toward the description of the specific effects \nof ions, especially for complex systems whose modeling \nrequires an analytic solution. \n\n8 \n\nFIG. 5: (Color online) RDF obtained from MC simulations \n(diamond), BIMSA3 (solid line), and MSA-fit (dot dashed) \nat two concentrations. \n\nThe RDF obtained within BIMSA3 are compared with \nthe MC and MSA-fit results in Fig. 5. Our BIMSA3 \nmodel accounts for the strong molecular peak of the CIP \nand provides the correct distances of minimal approach; \nwhereas the naive MSA-fit procedure ignores the former \nand gives poor estimates for the latter. At larger sep- \narations, the BIMSA3 results do not reproduce the os- \ncillations observed in the MC simulations, but the cor- \nresponding energy oscillations in the effective potentials \nIn addition, the perturbation term \nare less than kBT . ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2648.pdf" + }, + { + "text": "molecular dynamics (MD) results. Different approxima- \ntions of the PM are employed for the case of NaCl elec- \ntrolyte solutions: a two component model (MSA2), that \nonly takes free ions into account, and two different three \ncomponent models (MSA3 and BIMSA3), which include \na third species (the contact ion pair). As we proceed \nto show, LPT allows us to select the best simple model \nwhich accurately accounts for the thermodynamics and \nthe physical-chemistry of the system. \n\nThe first stage consists in calculating the McMillan- \nMayer effective ion-ion interaction potentials V eff \nij (r), by \ninverting the radial distribution functions (RDF) gij(r) \nobtained by MD. The simulations were carried out on \na box of 2000 water molecules and 48 NaCl pairs us- \ning the same interaction potentials as in reference [16]. \n1. \nThis setup corresponds to a concentration of 0.64 mol l− \nNPT ensemble sampling at standard pressure and tem- \nperature was enforced, with a time step of 1 fs and a \npressure bath coupling constant of 1 ps. An equilibration \nrun of 0.25 ns was followed by a production run of 0.6 ns \nfor five different initial configurations. The averages of \nthe resulting RDF were then used for the potential inver- \nsion via the HNC closure [15]. These effective potentials \nare assumed to be concentration independent and will be \nused for simulations at all concentrations. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2648.pdf" + }, + { + "text": "] \nh \np \n- \nm \ne \nh \nc \n. \ns \nc \ni \ns \ny \nh \np \n[ \n\n1 \nv \n8 \n4 \n6 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na \n\nAn alternative procedure consists in carrying out \nmolecular simulations, where both the solvent and solute \nare treated explicitly. After a rigorous averaging over \nthe solvent configurations, a coarse-grained description \nof the ions, which still includes the effect of the solvent \nstructure, can be obtained [8–11]. However, this set of \nmethods is purely numeric; they do not provide any an- \nalytical expression for thermodynamic quantities. They \nare therefore restricted to simple geometries [12, 13] (bulk \nsolutions or planar interfaces). The description of com- \nplex systems, such as porous or electrochemical materi- \nals, is still based on continuous solvent models [14]. \n\nIn this letter we present a method aimed at bridging \nthe gap between analytical and numerical approaches. It \nis based on the application of liquid perturbation theory \n(LPT) [15] to effective ion-ion potentials extracted from ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2648.pdf" + }, + { + "text": "trapolating the original potential at the barrier separat- \ning pairs from free ions (as shown in Fig. 3). We assume \nthat the interaction potential is averaged over the rota- \ntional degrees of freedom of the CIP and thus pairwise \nadditive. Hereafter, the quantities referring to such a \nthree-component model are written with a tilda symbol. \nThe short-range potentials involving the pair can be de- \nrived, in the infinite dilution limit, from an average of \nthe contributing ion interactions. In Fourier space, ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2648.pdf" + }, + { + "text": "Subtracting \nlong-range Coulombic potential \nV LR \nij (r) (which depends on the dielectric constant of the \nsolvent) from V eff \nij (r), we obtain the short-range contri- \nbution V SR \nij (r) to the effective potentials. These are given \nin Fig. 1 (species 1 and 2 refer to Na+ and Cl− free ions, \nrespectively). All the short-range potentials exhibit os- \ncillations corresponding to the solvent layering between \nthe ions, but this effect is particularly important for the \ncation-anion interaction: a considerable potential barrier \n(& 2kBT ) separates the first two attractive wells. To \nserve as a reference, Monte Carlo (MC) simulations were \nperformed with these effective potentials; a comparison \nbetween MD and MC RDF is also provided in Fig. 1. The \nexcellent agreement between both sets of RDF validates \nthe HNC inversion procedure [17], and allows us to com- \n\nthe ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2648.pdf" + }, + { + "text": "We first used LPT for a two-component system (Na+ \nand Cl− free ions) within the MSA (model MSA2), for \n1. The mini- \nconcentrations ranging from 0.1 to 2.0 mol l− \nmization leads to almost constant diameters on the whole \nrange of concentration: σ1 = 3.67 ˚A and σ2 = 4.78 ˚A. \nAs shown in Fig. 2, these parameters yield osmotic co- \nefficients close to MC calculations only at very low con- \n1 (experimental values are \ncentration, i.e., c ≤ 0.1 mol l− \ngiven for indicative purposes only, since a perfect model \nwill exactly match the MC results). For molar solutions, \nthe LPT results differ considerably from MC calculations. \nThis discrepancy can easily be understood by comparing \nthe diameters found within the MSA2 calculation with \nthe effective potentials given in Fig. 1. The anion/cation \ncontact distance obtained within the MSA2 calculation \nis 4.2 ˚A, which is in the region of the second minimum of \nthe effective potential and corresponds to the situation \nwhere there is a single layer of water molecules between \nthe ions. The first minimum of the potential, which cor- \nresponds to the contact ion pair (CIP) is thus completely \nignored by the MSA2 calculation. If the MSA diameters \nare directly fitted to reproduce the MC osmotic pres- \nsure, much smaller values are obtained. These MSA-fit \nhydrated diameters, which are compared to the MSA2 \ndiameters in the bottom part of Fig. 2, are averages of \nthe CIP and the solvent-separated ion pair. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2648.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2648.pdf", + "query": "What is the principle of the liquid perturbation theory (LPT) ?", + "target_page": 2, + "target_passage": "The principle of LPT is to describe the properties of a given system in terms of those of a well known reference system, with the differ- ence between them treated as a perturbation in the ref- erence potential", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "by a film of liquid or by a nanoparticle, respectively. Note that the probability densities correspond \n\nto number densities as we use the lattice spacing σ = 1 as our unit of length. \n\nTo develop the DDFT, one must first derive the underlying free energy functional F [ρl, ρn], and \n\nsecondly, devise dynamical equations for both density fields that account for the conserved and the \n\nnon-conserved aspects of their dynamics, i.e., transport and phase change processes, respectively. \n\nFor a system governed by the hamiltonian (3), we may construct a mean-field (Bragg-Williams) \n\napproximation for the free energy of the system [78, 84] which contains an entropic contribution \n\nand contributions from the interactions between the different species (nanoparticles and liquid). \n\nThe free energy is a semi-grand free energy, since the liquid is treated grand canonically (it is \n\ncoupled to a reservoir with chemical potential µ), whereas the nanoparticles are treated in the ", + "page_start": 13, + "page_end": 13, + "source_file": "1001.2669.pdf" + }, + { + "text": "(cid:88) (cid:88) \nE = − \nlilj − µ li \n\ni \n\nwhere (cid:80) \n\n denotes a sum over nearest neighbour pairs and εll, εnn and εnl are the liquid-liquid, \nparticle-particle and liquid-particle interaction energies, respectively. Fixing the three interaction \n\nstrength parameters εll, εnn, εnl and the effective chemical potential µ determines the equilibrium \n\nstate of the system. We choose εll as unit of energy – i.e. we set εll = 1. \n\nThe hamiltonian determines the equilibrium state and the energy landscape of the system. How- \n\never, as the system ‘dries in’ during the course of the solvent evaporation, the final nanoparticle \n\nconfigurations do not necessarily represent equilibrium structures. This implies that the system \n\ndynamics is of paramount importance. It is determined by the possible Monte Carlo moves, their \n\nrelative frequencies, and the probabilities for their acceptance. Two types of moves are allowed: (i) \n\nevaporation/condensation of liquid and (ii) diffusion of nanoparticles within the liquid. A mobility \n\nM corresponds to the ratio of cycles of particle and solvent moves and reflects the physical ratio of ", + "page_start": 8, + "page_end": 8, + "source_file": "1001.2669.pdf" + }, + { + "text": "scopic film. We have seen that the KMC model is able to describe the interplay of solute diffusion \n\nwithin the solvent and solvent evaporation/condensation. It also takes the liquid-liquid, liquid- \n\nparticle and particle-particle interactions into account and therefore allows us to distinguish differ- \n\nent regimes of the transverse (fingering) instability of the evaporative dewetting front: a transport \n\nregime where the instability is almost completely independent of the interaction strengths and \n\na demixing regime where particles and liquid demix at the receding front thereby increasing its \n\ntransverse instability. \n\nThe dynamical density functional theory describes the coupled dynamics of the density fields of \n\nthe liquid and the nanoparticles. In the form described above (i.e. based on the two-dimensional \n\nhamiltonian (3)) we obtain a simple theory that allows us to study the time evolution of the evapo- \n\nrating ultrathin film and also to investigate the influence of processes such as surface diffusion by \n\nthe liquid, which are not incorporated in the KMC model. However, it is straightforward to extend \n\nthe theory to consider a fully three-dimensional fluid film, in which one can distinguish between ", + "page_start": 23, + "page_end": 23, + "source_file": "1001.2669.pdf" + }, + { + "text": "FIG. 3: (Colour online) Dependence of the mean finger number left behind by the unstable dewetting \n\nfront on the particle-liquid interaction strength εnl. The regions marked (i) to (iv) are discussed in the \n\nmain text. The insets display typical snapshots obtained in the four different regions. Particles are black, \n\nliquid is grey (green online) and the empty substrate is white. The remaining parameters are kT = 0.2, \n\nM = 20, µ = −2.2, ρav \nn = 0.1, (cid:15)nn = 2.0, domain size 1200 × 1200. For the insets, from left to right, \n\n(cid:15)nl = 1.2, 1.4, 1.45, 1.8. ", + "page_start": 12, + "page_end": 12, + "source_file": "1001.2669.pdf" + }, + { + "text": "also diffuse over the substrate (conserved dynamics). The conserved part is treated along the lines \n\ndeveloped above for the nanoparticles. For the non-conserved part we assume a standard form \n\n[85], i.e., the change in time of ρl is proportional to −(µsurf(r, t) − µ) = −δF [ρn, ρl]/δρl(r) \n\nwhere µsurf(r, t) is the local chemical potential of the liquid at the point r on the surface at time t. \n\nThis gives the evolution equation for the liquid density \n(cid:21) (cid:20) \n\n∂ρl \n∂t \nδF [ρn, ρl] \nδρl δF [ρn, ρl] \nδρl \nM c − M nc = ∇ · \nl ρl∇ \n, \nl \n\nwhere we assume that the coefficients M c \nl and M nc \nl \nare constants. \n\n16 ", + "page_start": 15, + "page_end": 15, + "source_file": "1001.2669.pdf" + }, + { + "text": "over-damped stochastic equations of motion [80–83]. Here, we assume that Mn(ρl) = αΘs(ρl − \n\n0.5), where Θs(x) is a continuous function that switches smoothly from the value 0 to the value \n\n1 at x = 0 (i.e. it is essentially a smooth analogue of the Heaviside function). This ensures that \n\nthe nanoparticles are immobile when the local liquid density is small (dry substrate) and have a \n\n\n \n \n \n \n [html]\n
ComparisonFor the evolution of the liquid density distribution we assume that the liquid is able to evaporatefrom the surface into the vapour ( reservoir ) above the surface ( non - conserved dynamics ) and may
\n\n15 ", + "page_start": 14, + "page_end": 14, + "source_file": "1001.2669.pdf" + }, + { + "text": "We first used LPT for a two-component system (Na+ \nand Cl− free ions) within the MSA (model MSA2), for \n1. The mini- \nconcentrations ranging from 0.1 to 2.0 mol l− \nmization leads to almost constant diameters on the whole \nrange of concentration: σ1 = 3.67 ˚A and σ2 = 4.78 ˚A. \nAs shown in Fig. 2, these parameters yield osmotic co- \nefficients close to MC calculations only at very low con- \n1 (experimental values are \ncentration, i.e., c ≤ 0.1 mol l− \ngiven for indicative purposes only, since a perfect model \nwill exactly match the MC results). For molar solutions, \nthe LPT results differ considerably from MC calculations. \nThis discrepancy can easily be understood by comparing \nthe diameters found within the MSA2 calculation with \nthe effective potentials given in Fig. 1. The anion/cation \ncontact distance obtained within the MSA2 calculation \nis 4.2 ˚A, which is in the region of the second minimum of \nthe effective potential and corresponds to the situation \nwhere there is a single layer of water molecules between \nthe ions. The first minimum of the potential, which cor- \nresponds to the contact ion pair (CIP) is thus completely \nignored by the MSA2 calculation. If the MSA diameters \nare directly fitted to reproduce the MC osmotic pres- \nsure, much smaller values are obtained. These MSA-fit \nhydrated diameters, which are compared to the MSA2 \ndiameters in the bottom part of Fig. 2, are averages of \nthe CIP and the solvent-separated ion pair. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2648.pdf" + }, + { + "text": "[1] W. G. McMillan and J. E. Mayer, J. Chem. Phys. 13, [12] D. Horinek and R. R. Netz, Phys. Rev. Lett. 99, 226104 \n276 (1945). (2007). \n\n[2] J. M. G. Barthel, H. Krienke, and W. Kunz, Physical \nChemistry of Electrolyte Solutions (Springer, 1998). \n[3] L. Blum, in Theoretical Chemistry: Advances and Per- \nspectives, edited by H. Eyring and D. Henderson (Aca- \ndemic Press, 1980), vol. 5, pp. 1–66. \n\n[13] M. Lund, P. Jungwirth, and C. E. Woodward, Phys. Rev. \nLett. 100, 258105 (2008). \n\n[14] S. Van Damme et al., J. Phys. Chem. B 113, 3105 (2009). \n[15] J.-P. Hansen and I. R. McDonald, Theory of Simple Liq- ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2648.pdf" + }, + { + "text": "To conclude, we have combined MD simulations with \nLPT to construct simple models of electrolyte solutions \nwhich account for the molecular nature of the solvent. \nThe final result is fully analytical and it yields the ther- \nmodynamic and structural properties of the solution, in \nagreement with the original molecular description. The \nmethodology can in principle be adapted to any molecu- \nlar description of the system (MD simulations involving \ninteraction potentials accounting for polarization effects \nor Car-Parrinello MD simulations for example) as long \nas the ion-ion RDF are known. It can also be generalized \nto study interfaces. The method appears to be a promis- \ning approach toward the description of the specific effects \nof ions, especially for complex systems whose modeling \nrequires an analytic solution. \n\n8 \n\nFIG. 5: (Color online) RDF obtained from MC simulations \n(diamond), BIMSA3 (solid line), and MSA-fit (dot dashed) \nat two concentrations. \n\nThe RDF obtained within BIMSA3 are compared with \nthe MC and MSA-fit results in Fig. 5. Our BIMSA3 \nmodel accounts for the strong molecular peak of the CIP \nand provides the correct distances of minimal approach; \nwhereas the naive MSA-fit procedure ignores the former \nand gives poor estimates for the latter. At larger sep- \narations, the BIMSA3 results do not reproduce the os- \ncillations observed in the MC simulations, but the cor- \nresponding energy oscillations in the effective potentials \nIn addition, the perturbation term \nare less than kBT . ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2648.pdf" + }, + { + "text": "the dominant dynamic process, but does not allow one to probe this assumption. In Section III B \n\nwe show how one may develop a dynamical density functional theory (DDFT) that describes the \n\nsystem at a similar level to the KMC. However, the DDFT may also be easily extended to include \n\nother effects such as fluid diffusion, that the KMC does not incorporate. ", + "page_start": 8, + "page_end": 8, + "source_file": "1001.2669.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HIG_2001.pdf", + "query": "By how much did the Hartford group's link to AARP website account concerning buisness made over the internet ?", + "target_page": 16, + "target_passage": "In 2001 the company’s link to AARP’s Web site accounted for much of the $55 million worth of auto business The Hartford generated over the Internet", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "most dynamic sources of business growth. In 2001 the \n\ncompany’s link to AARP’s Web site accounted for much \n\nof the $55 million worth of auto business The Hartford \n\ngenerated over the Internet. \n\nBecause The Hartford quotes and issues this busi- \n\nness online (and added online billing in 2001), acquisi- \n\ntion and processing costs are 15 to 20 percent lower \n\nthan those of traditional direct-marketing or face-to- \n\nface sales. Because of this and other factors, the \n\nexpense ratio for AARP business is 30 percent below \n\nthat of the industry in general. And the customer \n\nrenewal rate is 96 percent, versus the industry’s 88 per- \n\n\n \n \n \n \n [html]profitable auto business The Hartford writes.\n
The relationship also has The Hartford thinkingahead toward new business and an even stronger rela -tionship with AARP members. The Hartford can cross -
\n\nmarket auto insurance to homeowner’s customers and \n\nhomeowner’s insurance to auto customers, which \n\npresents a tremendous growth opportunity. In addition, ", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "agency writes three times as much business with \n\nThe Hartford, in both personal and commercial lines, as \n\nit writes with any other insurer. \n\nMutually beneficial partnerships with successful \n\nbusinesses of all sizes are the foundation of The \n\nHartford’s business model. \n\nPerhaps no relationship represents shared values \n\nand shared success better than the one with AARP, \n\nwhich signed a new eight-year contract with The \n\nHartford that began Jan. 1, 2002. The AARP insurance \n\nprogram with The Hartford is a model of affinity mar- \n\nketing and distribution savvy. AARP’s membership— \n\nthose age 50 and over—is the fastest-growing segment \n\nof the U.S. population. Computer use among this group \n\nis growing by an estimated 20 percent per year, and the \n\npopulation segment respects established brands and \n\nseeks value, convenience and extraordinary service. \n\nThat right combination of factors helps make \n\nAARP’s World Wide Web site one of The Hartford’s \n\n13 ", + "page_start": 14, + "page_end": 14, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "The Hartford is committed to providing value to AARP \n\nmembers in many ways. An example: The Hartford and \n\nAARP work with the MIT Age Lab to produce informa- \n\ntion—available in print and on both partners’ Web \n\nsites—advising AARP members about Alzheimer’s dis- \n\nease and other forms of dementia as they affect driving \n\nability. The information guides caregivers struggling \n\nwith difficult decisions about family members’ safety \n\nbehind the wheel. The resource—a customer solution \n\nlike no other—helps enhance the superior value The \n\nHartford provides to AARP members. \n\nAlthough it’s the most comprehensive, the AARP \n\nrelationship isn’t The Hartford’s only affinity program. \n\nThe company also has affinity arrangements with \n\nUSAA and other companies. Regardless of the pro- \n\ngram’s size, the affinity partners share the right quali- \n\nties: strong name-brand recognition, first-class \n\nmarketing and a broad and loyal customer base. \n\nIn other words, they share some of The Hartford’s \n\ncore attributes. ", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "**Corporate Headquarters**\nThe Hartford Financial \nServices Group, Inc. \n690 Asylum Avenue \nHartford, Connecticut 06115 \n860-547-5000 \n\n**Internet Address**\nhttp://www.thehartford.com \n\n**Annual Meeting**\nShareholders are cordially invited to attend The Hartford’s \nAnnual Meeting of Shareholders, which will be held on \nThursday, April 18, 2002 at 9:00 a.m. in the Wallace Stevens \nTheater at The Hartford Financial Services Group, Inc.’s \nhome office at 690 Asylum Avenue, Hartford, Connecticut. \nShareholders of record as of February 28, 2002 are entitled \nto notice of, and to vote at, the Annual Meeting. \n\n**Form 10-K and Other Information**\nShareholders may receive, without charge, a copy of \nThe Hartford’s Form 10-K (without exhibits) filed with the \nSecurities and Exchange Commission for the year ended \nDecember 31, 2001 by contacting 1-888-FACT-HIG. Forms \n10-Q, press releases, and other shareholder communications \nare also available through this toll-free number. \n\n**Transfer Agent/Shareholder Records**\nFor information or assistance regarding stock records, \ndividend checks or stock certificates, please contact \nThe Hartford’s transfer agent: \n\nThe Bank of New York \nShareholder Relations Department–11E \nP.O. Box 11258 \nChurch Street Station \nNew York, NY 10286 \n800-254-2823 ", + "page_start": 37, + "page_end": 37, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "**Investor Relations**\nThe Hartford Financial \nServices Group, Inc. \nHartford Plaza, HO-1-01 \nHartford, Connecticut 06115 \nAttn: Investor Relations \n860-547-2537 \n\n**Media Inquiries**\nThe Hartford Financial \nServices Group, Inc. \nMedia Relations \nHartford Plaza, T-12-56 \nHartford, CT 06115 \n860-547-5200 \n\n**Common Stock and Dividend Information**\nThe Hartford’s common stock is traded on the New York \nStock Exchange (NYSE) under the trading symbol “HIG.” \nThe following table presents the high and low closing prices \nfor the common stock of The Hartford on the NYSE for \nthe periods indicated, and the quarterly dividends declared \nper share. ", + "page_start": 37, + "page_end": 37, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "(cid:3) K**wadwo Dankyi-Ampadu, service**\n**representative, personal lines,**\n**takes customer phone calls in**\n**The Hartford’s Southington, Conn.,**\n**customer call center. It’s one of**\n**three AARP call centers throughout**\n**the United States.**", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
A Marsh, Inc. is a major distributor of The Hartford ' s group benefits plans for mid - sized basinessMarsh ' s employee benefits practice. The team includes, left to risht, Senjor Vice Presidents* In 2001, The Hartford introduced a new category of commercial cererase called GyberflexC *Cameron Harris, president of Cameron M. Harris & Company, second from right.
a key growth area for The HartfordKerry King, Robert Lustberg, Maria Meshdesigned to protect small andCyberFlex ’ s benefits to Todd W.
atemptic and parameters without parameters ative, third from right, and RevinEric Jacobson. Szott, who isnurse - basiness risks such as e - maiiCharlotte property developer
Szott, group sales representative,legally blind, also works withviruses and Web site businessand a 13 - year customer of
far right, work in partnershipThe Hartford ' s Team Ability, ainterruption. Deirdre Barbee,The Hartford. Product innova -
with senior executives fromgroup of company - sponsoredThe Hartford ' s middle markettions such as CyberFlex allow
athletes with disabilities.manager in Charlotte, N. C., MikeThe Hartford to provide risk -Lesniak, Charlotte regional vice
management solutions for customatics, basis, basis, basis, non - solutions
", + "page_start": 17, + "page_end": 17, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "**N**ew technology tools made The Hartford Experience— \n\ncustomer solutions, ease of doing business and \n\nextraordinary service—more real than ever for our cus- \n\ntomers in 2001. \n\nIt was a year that saw the debut of life operations’ \n\nHartford Investor Web portal, expanded Web portals for \n\ngroup benefits administrators, and enhancements to \n\ntechnology for The Hartford’s property-casualty agents \n\nand customers. \n\nHartford Investor is both a versatile personal \n\nassistant and an aid in wholesaling, especially for the \n\nindependent financial planner channel. Broker-dealers \n\nand financial advisors can use it to research The \n\nHartford’s full complement of individual life and invest- \n\nment products, update their books of business in \n\nseconds, track daily fund performance, run financial- \n\nplanning models, receive online product training, \n\nproduce customized presentations and even submit \n\nbusiness electronically. ", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "more incentive to look to The Hartford for the right \n\nproducts to offer their clients. \n\nThe Hartford’s Group Benefits Division’s (GBD) \n\nProducer View Web portal enables group benefits bro- \n\nkers to manage their books of business and track com- \n\nmissions and premium payments online. It’s also a \n\nresource for product brochures and other marketing \n\nmaterial. GBD’s Employer View portal meets benefits \n\nmanagers’ increasing demands for self-service. In 2001 \n\nGBD added online billing capability to the portal, which \n\nalso features access to forms and status reports on pre- \n\nmium payments and claims, among other functions. \n\nThe property-casualty operation’s Electronic \n\nBusiness Center (EBC) has transformed the way agents \n\ndo business. They can obtain quotes almost instantly, \n\ncheck billing and loss information, track claims pay- \n\nments and perform a host of other daily tasks. Because \n\nit’s their virtual back office, agents have more time to \n\ndo what’s right for them: build their business. The EBC \n\nis proving especially valuable in the high-growth small- \n\nbusiness market, where service is as important as price. ", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "All this translates into increased shareholder value. Since 1995, our market cap has \n\nincreased from $5.7 billion to $15.4 billion—an 18 percent compound annual growth rate. \n\nOur share price has increased nearly 160 percent since The Hartford became a public com- \n\npany. During the same period, the S&P 500 increased 89 percent, and the Dow Jones \n\nIndustrial Average 97 percent. \n\nIt’s no surprise that our management team is highly regarded within the financial \n\nservices industry and on Wall Street. We’ve built a strong leadership team, complemented \n\nby more than 27,000 dedicated employees who are nurtured and energized by a culture of \n\nsuccess. Consequently, we had a smooth leadership transition over the past year. Tom Marra \n\nsucceeded Lon Smith as president of our life operations and joined our board of directors. \n\nLon retired after a 33-year career with The Hartford, and we owe him a tremendous amount \n\nof gratitude for building a strong and successful operation. \n\nDuring 2001 we also welcomed two new members to our board of directors. Edward J. \n\nKelly III, president and CEO of Mercantile Bankshares Corp., joined us in May, and we welcomed ", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_HIG_2001.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HIG_2001.pdf", + "query": "How many licensed intermediaries did Hartford group have in 2001 ?", + "target_page": 23, + "target_passage": "More than 153,000 licensed intermediaries", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "In short, the portal allows The Hartford to bring \n\nproducts and functions from a variety of sources into \n\none convenient online environment. \n\nHartford Investor has two strategic objectives: \n\nOne, deepen current intermediaries’ loyalty to The \n\nHartford by extending The Hartford Experience right to \n\ntheir desktops. Two, expand the network of intermedi- \n\naries by giving them the technological support they \n\nneed to grow their businesses. \n\nMore than 153,000 licensed intermediaries—from \n\nsolo advisors to members of large financial institu- \n\ntions—are appointed to sell The Hartford’s products. \n\nYet fewer than 60,000 actively write business for the \n\ncompany. The untapped potential is vast, especially \n\namong independents, the fastest-growing distribution \n\nchannel and the only one in which The Hartford doesn’t \n\nhold the largest market share. \n\nThat’s bound to change. With Hartford Investor \n\navailable on their desktops, intermediaries will have far ", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "**N**ew technology tools made The Hartford Experience— \n\ncustomer solutions, ease of doing business and \n\nextraordinary service—more real than ever for our cus- \n\ntomers in 2001. \n\nIt was a year that saw the debut of life operations’ \n\nHartford Investor Web portal, expanded Web portals for \n\ngroup benefits administrators, and enhancements to \n\ntechnology for The Hartford’s property-casualty agents \n\nand customers. \n\nHartford Investor is both a versatile personal \n\nassistant and an aid in wholesaling, especially for the \n\nindependent financial planner channel. Broker-dealers \n\nand financial advisors can use it to research The \n\nHartford’s full complement of individual life and invest- \n\nment products, update their books of business in \n\nseconds, track daily fund performance, run financial- \n\nplanning models, receive online product training, \n\nproduce customized presentations and even submit \n\nbusiness electronically. ", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "(cid:5) T**he Hartford’s acquisition of Fortis**\n**Financial Group in 2001 enhanced**\n**the company’s market share and**\n**distribution advantage. Most impor-**\n**tantly, the acquisition brought into**\n**The Hartford’s family powerful sales**\n**professionals like Allen Chinoy of**\n**Darien, Ill., left, the nation’s fifth-**\n**leading producer of The Hartford’s**\n**variable universal life insurance.**\n**Chinoy is a vocal supporter of**\n**Hartford Investor, which makes it**\n**easier for him to show customers**\n**such as Dr. Dilip Patel how his**\n**portfolio is performing.**", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "**Corporate Headquarters**\nThe Hartford Financial \nServices Group, Inc. \n690 Asylum Avenue \nHartford, Connecticut 06115 \n860-547-5000 \n\n**Internet Address**\nhttp://www.thehartford.com \n\n**Annual Meeting**\nShareholders are cordially invited to attend The Hartford’s \nAnnual Meeting of Shareholders, which will be held on \nThursday, April 18, 2002 at 9:00 a.m. in the Wallace Stevens \nTheater at The Hartford Financial Services Group, Inc.’s \nhome office at 690 Asylum Avenue, Hartford, Connecticut. \nShareholders of record as of February 28, 2002 are entitled \nto notice of, and to vote at, the Annual Meeting. \n\n**Form 10-K and Other Information**\nShareholders may receive, without charge, a copy of \nThe Hartford’s Form 10-K (without exhibits) filed with the \nSecurities and Exchange Commission for the year ended \nDecember 31, 2001 by contacting 1-888-FACT-HIG. Forms \n10-Q, press releases, and other shareholder communications \nare also available through this toll-free number. \n\n**Transfer Agent/Shareholder Records**\nFor information or assistance regarding stock records, \ndividend checks or stock certificates, please contact \nThe Hartford’s transfer agent: \n\nThe Bank of New York \nShareholder Relations Department–11E \nP.O. Box 11258 \nChurch Street Station \nNew York, NY 10286 \n800-254-2823 ", + "page_start": 37, + "page_end": 37, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "most dynamic sources of business growth. In 2001 the \n\ncompany’s link to AARP’s Web site accounted for much \n\nof the $55 million worth of auto business The Hartford \n\ngenerated over the Internet. \n\nBecause The Hartford quotes and issues this busi- \n\nness online (and added online billing in 2001), acquisi- \n\ntion and processing costs are 15 to 20 percent lower \n\nthan those of traditional direct-marketing or face-to- \n\nface sales. Because of this and other factors, the \n\nexpense ratio for AARP business is 30 percent below \n\nthat of the industry in general. And the customer \n\nrenewal rate is 96 percent, versus the industry’s 88 per- \n\n\n \n \n \n \n [html]profitable auto business The Hartford writes.\n
The relationship also has The Hartford thinkingahead toward new business and an even stronger rela -tionship with AARP members. The Hartford can cross -
\n\nmarket auto insurance to homeowner’s customers and \n\nhomeowner’s insurance to auto customers, which \n\npresents a tremendous growth opportunity. In addition, ", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "The ability to deliver that kind of performance \n\ncan be traced to our money managers—Wellington \n\nManagement Co., American Funds, Franklin Templeton \n\nInvestments, MFS Investment Management, AIM \n\nFunds Management, Inc., Putnam Investment \n\nManagement and The Hartford’s own Hartford \n\nInvestment Management Co. \n\nAll of The Hartford’s money managers have years \n\nof experience and are among the most respected firms \n\nin the industry. Their experience and expertise were \n\nespecially important during the market volatility we \n\nsaw in 2001. They always stay focused on long-term \n\nperformance, which is the true measuring stick of The \n\nHartford’s value to its customers. \n\nBesides outstanding products and excellent man- \n\nagement, great service is a critical component in deliv- \n\nering the right solutions to our customers. In 2001, \n\nThe Hartford won an unprecedented sixth consecutive \n\nDALBAR Annuity Service Award, as well as the ", + "page_start": 18, + "page_end": 18, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "Intermediary Service Award and the first-ever Life \n\nInsurance Service Award. The triple win reflected the \n\noverall excellence of The Hartford’s service, a natural \n\ncomplement to the company’s quality products. DAL- \n\nBAR also recognized The Hartford’s mutual funds as the \n\nindustry leader in several categories, including invest- \n\nment management. \n\nIn managing its product portfolio, The Hartford fol- \n\nlows its own advice: think ahead and diversify. The com- \n\npany’s earnings base derives from a variety of \n\nbusinesses. Diversification is a key element in managing \n\nrisk and ensuring profitability—a time-tested philosophy \n\nthat held especially true in 2001, as the company’s other \n\nbusinesses evolved to anticipate changing market \n\ndemands and to offer protection from new risks. \n\n\n \n \n \n \n [html]\n
The property - casualty Business Insurance group, for example, extended its coverage to inslude commonrisks associated with e - commerce. Hartford Financial
Products ’ ( HFP ) coverage continued to meet emergingrisks in an extremely volatile business environment.
", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "All this translates into increased shareholder value. Since 1995, our market cap has \n\nincreased from $5.7 billion to $15.4 billion—an 18 percent compound annual growth rate. \n\nOur share price has increased nearly 160 percent since The Hartford became a public com- \n\npany. During the same period, the S&P 500 increased 89 percent, and the Dow Jones \n\nIndustrial Average 97 percent. \n\nIt’s no surprise that our management team is highly regarded within the financial \n\nservices industry and on Wall Street. We’ve built a strong leadership team, complemented \n\nby more than 27,000 dedicated employees who are nurtured and energized by a culture of \n\nsuccess. Consequently, we had a smooth leadership transition over the past year. Tom Marra \n\nsucceeded Lon Smith as president of our life operations and joined our board of directors. \n\nLon retired after a 33-year career with The Hartford, and we owe him a tremendous amount \n\nof gratitude for building a strong and successful operation. \n\nDuring 2001 we also welcomed two new members to our board of directors. Edward J. \n\nKelly III, president and CEO of Mercantile Bankshares Corp., joined us in May, and we welcomed ", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "agency writes three times as much business with \n\nThe Hartford, in both personal and commercial lines, as \n\nit writes with any other insurer. \n\nMutually beneficial partnerships with successful \n\nbusinesses of all sizes are the foundation of The \n\nHartford’s business model. \n\nPerhaps no relationship represents shared values \n\nand shared success better than the one with AARP, \n\nwhich signed a new eight-year contract with The \n\nHartford that began Jan. 1, 2002. The AARP insurance \n\nprogram with The Hartford is a model of affinity mar- \n\nketing and distribution savvy. AARP’s membership— \n\nthose age 50 and over—is the fastest-growing segment \n\nof the U.S. population. Computer use among this group \n\nis growing by an estimated 20 percent per year, and the \n\npopulation segment respects established brands and \n\nseeks value, convenience and extraordinary service. \n\nThat right combination of factors helps make \n\nAARP’s World Wide Web site one of The Hartford’s \n\n13 ", + "page_start": 14, + "page_end": 14, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "[1] 2001 includes $440 of losses ($1.85 per basic and $1.82 per diluted share) related to the September 11 \nterrorist attack (“September 11”) and a $130 tax benefit ($0.55 per basic and $0.54 per diluted share) at \nHartford Life, Inc. (“HLI”). \n\n[2] Operating income represents after-tax operational results excluding, as applicable, net realized capital gains or \nlosses, extraordinary items, the cumulative effect of accounting changes and certain other items. \n\n[3] 2001 includes a $91 reduction in premiums from reinsurance cessions related to September 11. ", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_HIG_2001.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HIG_2001.pdf", + "query": "When did the annual sherholder meeting of Hartford happen in 2002 ?", + "target_page": 38, + "target_passage": "Shareholders are cordially invited to attend The Hartford’s Annual Meeting of Shareholders, which will be held on Thursday, April 18, 2002 ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Corporate Headquarters**\nThe Hartford Financial \nServices Group, Inc. \n690 Asylum Avenue \nHartford, Connecticut 06115 \n860-547-5000 \n\n**Internet Address**\nhttp://www.thehartford.com \n\n**Annual Meeting**\nShareholders are cordially invited to attend The Hartford’s \nAnnual Meeting of Shareholders, which will be held on \nThursday, April 18, 2002 at 9:00 a.m. in the Wallace Stevens \nTheater at The Hartford Financial Services Group, Inc.’s \nhome office at 690 Asylum Avenue, Hartford, Connecticut. \nShareholders of record as of February 28, 2002 are entitled \nto notice of, and to vote at, the Annual Meeting. \n\n**Form 10-K and Other Information**\nShareholders may receive, without charge, a copy of \nThe Hartford’s Form 10-K (without exhibits) filed with the \nSecurities and Exchange Commission for the year ended \nDecember 31, 2001 by contacting 1-888-FACT-HIG. Forms \n10-Q, press releases, and other shareholder communications \nare also available through this toll-free number. \n\n**Transfer Agent/Shareholder Records**\nFor information or assistance regarding stock records, \ndividend checks or stock certificates, please contact \nThe Hartford’s transfer agent: \n\nThe Bank of New York \nShareholder Relations Department–11E \nP.O. Box 11258 \nChurch Street Station \nNew York, NY 10286 \n800-254-2823 ", + "page_start": 37, + "page_end": 37, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "**2002 (132)**\nPaula Abla \nNicole Adams \nJenny Adkins \nRoger Aldrich \nJimmy Alexander \nBrian Babb \nCharlie Bagley \nBob Baker \nLynard Barrera \nCindy Barrios \nShane Barron \nDennis Bass \nJames Beavers \nRandy Bergen ", + "page_start": 31, + "page_end": 31, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**The Hartford Chairman, President and CEO Ramani Ayer speaking at the opening of New York employees’ new**\n**permanent offices in early November. Despite the destruction of their offices at 7 World Trade Center on Sept. 11,**\n**The Hartford’s New York employees had their businesses back in operation by Sept. 17. Employees moved into their**\n**new permanent offices less than 60 days after the attack.**", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "**Soon after the Sept. 11 attack,**\n**The Hartford Chairman, President**\n**and CEO Ramani Ayer, left fore-**\n**ground, joined other industry**\n**CEOs in meeting with President**\n**Bush at the White House. During**\n**the meeting, the executives**\n**assured the president of industry**\n**support as the nation recovers.**", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "Shawn Marsh \nAndrew McCalmont \nMitch McNeill \nRichard Mieser \nSteve Mills \nSidney Mitchell \nClaudia Molina de Wolford \nNathan Morrison \nTodd Murphy \nCindy Murray \nJeff Newby \nRick Nunley \nJohn Ortiz \nDavid Parker \nRobert Pennel \nRyan Phillips \nSharon Pool \nBob Portman \nEric Powell \nMike L. Reddick \nRonald Reidle \nMartin Robertson II \nA.D. Robison \nRandy Rodrigue \nVern Roe Jr. \nDanny Schmidt \nKary Schneberger \nStacy Settles \nDewayne Shaw \nMichael Sherwood \nWill Shisler \nGreg Skiles \nChad Smith \nRobin Smith \nMaria Strain \nJosh Swift \nChris Townsend \nMichelle Townsend \nRyan Turner \nRodney Vaeth \nFred Vasquez \nRuben Vega Jr. \nAl Warner \nJames Warner \nMichael Weese \nHazel Welch \nLeslie Wertz \nEddie Whitehead \nJohn Wilken \nGary Willeford \nMark Willson \nJerry Wilson \nRobert A. Wilson \nRoy Wilson \n\n**2003 (211)**\nRonald Aaron \nPat Abla \nCorky Baker \nStaci Barentine-Bogle \nCharlie Bateman \nMike Bechtel \nJohn Biggs \nTammi Bradford ", + "page_start": 31, + "page_end": 31, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "\nArthur Andersen LLP \n\nChicago, Illinois \n\nFebruary 1, 2002 ", + "page_start": 58, + "page_end": 58, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**Investor Relations**\nThe Hartford Financial \nServices Group, Inc. \nHartford Plaza, HO-1-01 \nHartford, Connecticut 06115 \nAttn: Investor Relations \n860-547-2537 \n\n**Media Inquiries**\nThe Hartford Financial \nServices Group, Inc. \nMedia Relations \nHartford Plaza, T-12-56 \nHartford, CT 06115 \n860-547-5200 \n\n**Common Stock and Dividend Information**\nThe Hartford’s common stock is traded on the New York \nStock Exchange (NYSE) under the trading symbol “HIG.” \nThe following table presents the high and low closing prices \nfor the common stock of The Hartford on the NYSE for \nthe periods indicated, and the quarterly dividends declared \nper share. ", + "page_start": 37, + "page_end": 37, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "**T**he worst of 2001 brought out the best in The \n\nHartford’s people. \n\nAs the world watched the horrors of Sept. 11, \n\nsome 330 of our New York employees fled their offices \n\nin 7 World Trade Center. Though many were caught in \n\nthe debris and dust from the nearby Twin Towers, all \n\nescaped safely. \n\nBy the time the 47-story 7 World Trade Center \n\nbuilding collapsed at about 5:20 p.m., The Hartford had \n\nalready arranged for temporary space in several of the \n\ncompany’s other offices. Employees and suppliers \n\nimmediately began working around the clock to get \n\nthe business up and running again. Despite the \n\ndestruction, back-up systems kept distributors’ and \n\ncustomers’ data secure. \n\nA hundred miles from Ground Zero, home office \n\nemployees in Hartford, Conn., began shuttling equip- \n\nment and supplies to our temporary offices. Some ", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "YEAR ENDED DECEMBER 31, \n2003 2002 2001 \n\n914 $ 1,081 $ 1,520 \n\n32 (44) 188 \n\n946 1,037 1,708 \n\n912 327 74 \n\n21 39 21 \n\n933 366 95 \n\n$ 1,879 $ 1,403 $ 1,803 ", + "page_start": 17, + "page_end": 17, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Year Ended December 31 ( In thousands )200420032002
Current — federal.........................................................................................................................................................................................$200.419$ 68.760
$ 50.352Deferred — federal........................................................................................................................................................................................( 9.155 )40.142
111.981Provision for federal income taxes................191.264108.902
162.333Current — state...........................................................................................................................................................................................2.8515.167
6.169Deferred — state..........................................................................................................................................................................................11.420( 682 )
( 51 )Provision for state income taxes...................14.2714.485
6.118Current — foreign.........................................................................................................................................................................................424
Deferred — foreign........................................................................................................................................................................................
Provision for foreign income taxes................424
S205.959
", + "page_start": 68, + "page_end": 68, + "source_file": "NYSE_MGM_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed11.pdf", + "query": "Regarding climate change, to what corresponds the \"average length of flood events ?", + "target_page": 11, + "target_passage": "The average length of flood events (number of days in which the cumulative daily rainfall excess is positive, compared to the 95th percentile of the baseline", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**13**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n–3 \n3 \n0 \nchange in length of average flood event (days) \n–2 –1 1 2 \n. \n. \n. \n. \n. \n. \n GFDL-ESM2M \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \nMIROC-ESM-CHEM \n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. ", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed11.pdf" + }, + { + "text": "**Figure 6.**Simulated changes in the average length of flood events (number of days in which the cumulative daily rainfall excess \nis positive, compared with the 95th percentile in 1981–2010, at 2°C global warming, for individual HadGEM3 simulations driven \nby SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble mean. The labels above each panel identify \nthe driving CMIP5 model (or ensemble mean). ", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed11.pdf" + }, + { + "text": "areas are projected to see an increase in flood event lengths of 4 days or more, particularly India \nand Bangladesh, for which such increases are projected in all ensemble members to some extent. \nIncreases of 2–4 days are also projected in parts of Brazil by all ensemble members, although \nthe magnitude and location within the country varied between members. Similar increases are \nprojected in the region of the Horn of Africa and southern Arabian Peninsula in several members. \nThe HCVI calculated for 2°C global warming showed very large geographical variability \n(figure 7) which relates largely to differences in socio-economic factors [22]. Differences in the \nclimate change simulated in different ensemble members leads to some variation in the HCVI at ", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed11.pdf" + }, + { + "text": "The higher-resolution HadGEM3 simulations project consistent increases in temperature-related \nextremes, with larger changes at 2°C compared to 1.5°C and local changes being larger than the \nglobal annual mean. There is a higher degree of spatial variation in our projections compared \nwith CMIP5-based studies. \n\nIn the model projections examined here, changes relating to the water cycle are complex, both \nin their geographical pattern and in the variation between different models. The length of flooding \nevents generally increases across world in all models, but maximum rainfall can either increase or \ndecrease depending on locations. Global patterns of increase and decrease show some consistency \nbetween the different GWLs, but also some local differences. Worldwide, most impacts broadly \ntend to increase with global warming in most areas. For global mean changes, even when the sign \nof change is uncertain, individual realizations generally show reduced impact at 1.5°C compared \nwith 2°C. However, this does not always hold even at the scale of major global river basins. \n\nVulnerability to food insecurity increases more at 2°C global warming than 1.5°C in \napproximately three-quarters of countries assessed. The vulnerability increase can arise from \nincreases in either flooding or drought. Reduced drought leads to decreased vulnerability in a \nlimited number of cases. ", + "page_start": 24, + "page_end": 24, + "source_file": "pubmed11.pdf" + }, + { + "text": "and 75%, especially in the Iberian Peninsula. Southern Africa also sees a decrease in low flows \nwhere changes in mean flows were small. Changes in high run-off show similar patterns and \nmagnitudes to those in mean run-off. \n\nThe simulated changes in both mean and low run-off flows show substantial differences \namong the six simulations (figures 10 and 11). In most basins examined here, the range of \noutcomes include both increases and decreases in mean and low flows for any particular basin, \nbut generally with the largest proportion simulating increases in both mean and low flows. In a \nfew cases, notably the Lena in northeast Asia and Ganges in southeast Asia, the ensemble agreed \nentirely or almost entirely on increased flows. Even here, the range of outcomes is large, with the \nprojected flow increases in the Ganges for 2°C global warming ranging from approximately 30% \nto more than 110%. \n\nExceptions to the general picture of consensus on increasing flows are seen in the Amazon, \nOrange, Danube and Guadiana basins where the range of projected extends more towards \ndecreased mean flows. Mean flows in the Amazon are projected to decline by up to 25% for 2°C \nglobal warming. For low flows, the ensemble of projections entirely gives decreased flows at 2°C \nglobal warming for these basins. ", + "page_start": 14, + "page_end": 14, + "source_file": "pubmed11.pdf" + }, + { + "text": "**23**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n–20 –15 –10 –5 \n0 \n% \n5 10 15 20 \n. \n. \n. \n. \n. \n. \nGFDL-ESM2M HadGEM2-ES \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n\n**Figure 20.**Difference between 2°C and 1.5°C global warming in percentage changes in mean (top) run-off in JULES simulations \ndriven by the ensemble of HadGEM3 simulations. Note that the use of percentage changes emphasizes changes in regions where \nthe baseline streamflow is small. \n\n. \n. \n. ", + "page_start": 22, + "page_end": 22, + "source_file": "pubmed11.pdf" + }, + { + "text": "**15**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n–75 –50 –10 –1 \n0 \n% \n1 10 50 75 \n. \n. \n. \n. \n. \n. \nGFDL-ESM2M HadGEM2-ES \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n\n**Figure 9.**Changes in run-off for mean flows simulated by the JULES ecosystem–hydrology model under six climate simulations \nat 2°C global warming. (a) Ensemble mean and (b) percentage of models agreeing on increased flow. \n\n. \n. ", + "page_start": 14, + "page_end": 14, + "source_file": "pubmed11.pdf" + }, + { + "text": "**Figure 10.**Distributions of changes in run-off for mean flows simulated by the JULES ecosystem–hydrology model under the \nensemble of six climate projections at 1.5°C (blue) and 2°C (orange) global warming. Boxes show the 25th and 75th percentile \nchanges, whiskers show the range, circles show the four projections that do not define the ends of the range, and crosses \nshow the ensemble means. Numbers in square brackets show the ensemble-mean flow in the baseline, in millimetres of rain \nequivalent. ", + "page_start": 15, + "page_end": 15, + "source_file": "pubmed11.pdf" + }, + { + "text": "2°C, although the geographical variation is still dominated by the non-climatic factors (figure 7). \nTherefore, the ensemble-mean change is a reasonable guide to the results. \n\nThe ensemble mean is higher in nearly all assessed countries relative to the baseline (figure 8). \nThe greatest increase was in Oman, followed by India, Bangladesh and Saudi Arabia, then Brazil \nand a number of its neighbouring countries. Smaller increases in HCVI were seen across Africa. \nSoutheastern Africa showed larger increases than Central Africa. The HCVI decreased in three \ncountries: Mali, Burkino Faso and Sudan. \n\nThe ensemble members showed broadly consistent changes in HCVI at 2°C global warming, \nwith increases in most assessed countries and generally similar sets of countries experiencing the \nlargest and smallest changes. Southeastern Africa consistently showed larger increases in HCVI \nthan Central Africa, due to increased length of drought events projected in all ensemble members \n(not shown). The length of flood events was not projected to increase in this region. The Sahel \nregion consistently showed one or more countries with a small decrease in the HCVI, although \nthe precise country or countries varied between ensemble members. The decrease in HCVI here \nwas due to projected decreases in length of drought, with length of flood events projected to \nchange little. ", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed11.pdf" + }, + { + "text": "**Figure 11.**Distributions of changes in run-off for low flows (flows for lowest 10% of time) simulated by the JULES ecosystem– \nhydrology model under the ensemble of six climate projections at 1.5°C (blue) and 2°C (orange) global warming. Boxes show \nthe 25th and 75th percentile changes, whiskers show the range, circles show the four projections that do not define the ends of \nthe range, and crosses show the ensemble means. Numbers in square brackets show the ensemble-mean flow in the baseline, \nin millimetres of rain equivalent. ", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed11.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed11.pdf", + "query": "What is the projected situation of India regarding HCVI (Hunger and Climate Vulnerability Index)?", + "target_page": 12, + "target_passage": "India is projected to see increased HCVI by all ensemble members, due to a consistent increase in length of flood events projected in all members, outweighing the beneficial impact of decreased length of drought which is again projected in all members", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "To assess implications of climate change for vulnerability to food insecurity, we used an \nadaptation of the Hunger and Climate Vulnerability Index (HCVI) [22]. The HCVI was developed \nby the United Nations World Food Programme to provide a country-level assessment of \nvulnerability to food insecurity as a result of climate-related events. We used a new iteration of the \nHCVI which makes use of gridded climate model projections to understand the impact of climate \nchange on vulnerability to food insecurity, and the benefits that adaptation can bring via scenarios \nof adaptation investment [23]. This iteration of the HCVI only considers in-country production \nof food and does not account for food trade. For this reason, the HCVI is only calculated for \n122 developing and least-developed countries (defined here as countries not in the OECD or EU \nwhich can be resolved by the scale of the climate model; i.e. larger than 500 km2). \n\nThe index provides quantification at the national level across the globe of the scale and \ndirection of impact of climate change on food insecurity. As such, it aims to provide the following: \n(i) information to help policy-makers understand the level of challenge to global food security that \nclimate change presents; (ii) information on the geography of the impacts and help to evaluate the \nrelative benefits of mitigation and adaptation responses. ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed11.pdf" + }, + { + "text": "The index is not intended to be a detailed planning tool, but aims to help planners evaluate the \nnature of the top-level threat to food insecurity that climate change presents, thereby supporting \nprioritization of effort. \n\nThe HCVI consists of three equally weighted components: exposure to climate-related hazards, \nsensitivity of national agricultural production to climate-related hazards, and adaptive capacity— \na measure of a country’s ability to cope with climate-related food shocks. The sensitivity and \nadaptive capacity components are based on data from the World Bank, World Resources Institute, ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed11.pdf" + }, + { + "text": "Four countries show ensemble-mean HCVI values at 2°C global warming that are higher \nthan any seen in the baseline climate; these are Oman, Bangladesh, Mauritania and Yemen. \nThe implication of such HCVI values is that climate change at 2°C is projected to cause levels \nof vulnerability to food insecurity that are greater than any seen in the present day. For \nindividual ensemble members, the number of countries with ‘unprecedented’ HCVI values at \n2°C varies from three to seven. Conversely, many countries in the baseline climate have levels \nof vulnerability to food insecurity that are greater than those expected in other countries under \n2°C global warming. This suggests that other factors are already posing greater risk for food \ninsecurity than 2°C climate change is expected to cause in other countries, so the increased risk \nfrom climate change should not overshadow the need to reduce vulnerability to food insecurity \narising from non-climatic factors. There is scope to reduce vulnerability to food insecurity by \naddressing various socio-economic issues in such counties. \n\nincreased run-off over \napproximately half of the land surface (figure 9) and the majority of the major river basins \nassessed (figure 10), but with large regional uncertainties including the possibility of decreased \nflows in many basins. The ensemble-mean change in mean streamflow shows an increase of \nbetween 5 and 25% over most of the Northern Hemisphere land surface, with some regions seeing \nan increase of over 50% at 2°C global warming. Notable exceptions to this are western Europe and \nsouthcentral USA, which see less than a 5% change in run-off, and the already very dry region of \nthe Sahara Desert where the existing very small run-off become even smaller. \n\nThe JULES simulations show a general tendency towards ", + "page_start": 13, + "page_end": 13, + "source_file": "pubmed11.pdf" + }, + { + "text": "this comparison of the number of ‘unprecedented’ HCVI values at 1.5°C and 2°C should be \ntreated with caution. Nevertheless, the finding that some countries see HCVI values higher at \neither or both 1.5°C and 2°C compared to the baseline may indicate that climate change has the \npotential to lead to unprecedented levels of vulnerability to food insecurity in some countries. \nMore robustly, it can be concluded that by this metric, overall worldwide vulnerability to food \ninsecurity generally increases with global warming, and for approximately three-quarters of \ncountries assessed, this increase is larger at 2°C than 1.5°C. \n\nIn the ensemble mean, changes in mean, low and high flows are generally larger at 2°C global \nwarming compared to 1.5°C (figure 20). This is often the case for both increases and decreases \nin flows—increasing the level of global warming magnifies the pattern of river flow changes, \nalthough not in all cases. \n\nThe range of projected mean run-off changes is larger for 2°C than 1.5°C in many basins, \nbut this was not always the case, with many basins showing similar or smaller ranges at \n2°C compared with 1.5°. Moreover, the ranges overlap substantially, so in terms of the set of ", + "page_start": 18, + "page_end": 18, + "source_file": "pubmed11.pdf" + }, + { + "text": "r \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n–0.2 \n. \n. \n. \n. \n**Figure 18.**Hunger and Climate Vulnerability Index at 1.5°C global warming (ensemble mean). \n. \n. \n. ", + "page_start": 21, + "page_end": 21, + "source_file": "pubmed11.pdf" + }, + { + "text": "As noted above, four countries saw ensemble-mean HCVI values at 2°C above any seen \nin the baseline, and this number increased to seven at 1.5°C. The same four countries with \n‘unprecedented’ HCVI values at 2°C also saw ‘unprecedented’ values at 1.5°C; these were Oman, \nBangladesh, Mauritania and Yemen. These were joined by Myanmar, India and Cambodia as \nhaving ‘unprecedented’ values at 1.5°C. The role of internal climate variability in the HCVI \nresults needs to be assessed, as does the effect of potential nonlinear interactions between the \nflood and drought metric. Until the reasons behind these country-specific results are understood, ", + "page_start": 17, + "page_end": 17, + "source_file": "pubmed11.pdf" + }, + { + "text": "**Figure 7.**Hunger and Climate Vulnerability Index calculated for simulated climate states at 2°C global warming for five \nindividual HadGEM3 simulations driven by SSTs and SICs from different members of the CMIP5 ensemble, and the ensemble \nmean. ", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed11.pdf" + }, + { + "text": "India is projected to see increased HCVI by all ensemble members, due to a consistent increase \nin length of flood events projected in all members, outweighing the beneficial impact of decreased \nlength of drought which is again projected in all members. \n\nBrazil is projected to see increased HCVI, but for reasons which vary between ensemble \nmembers. Although the location of projected longer flood events varies across the country in \ndifferent members, the aggregation of the HCVI to the country level renders this geographical \nvariability irrelevant for such a large country because only the median value across the country \nis used in the HCVI. Some ensemble members project longer drought for Brazil, which again \ncontributed to increased HCVI. ", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed11.pdf" + }, + { + "text": "We examine the implications of our new climate projections by applying some commonly \nused indices of climate extremes, and a further index quantifying relative vulnerability to food \ninsecurity which combines climate extremes indices with information on a range of factors \nrepresenting sensitivity and adaptability of food systems to climate hazards. We also use the \nclimate projections to drive a global land surface model to simulate changes in run-off as \nan indicator of freshwater availability. We assess whether regional extremes are projected to \nincrease or decrease at 2°C global warming, and whether the consequent impact on drought and \nvulnerability to food insecurity become greater or smaller. We also assess whether these changes \nare reduced by limiting global warming to 1.5°C. We explore some of the uncertainties in these \nprojections, and, in particular, examine whether the use of ensemble-mean projections is a useful \nsimple guide to impacts projections or whether this can lead to a misleading impression for some \nimpacts. Regarding vulnerability to food insecurity, we consider the impacts of global warming \nat 1.5°C and 2°C alongside socio-economic influences that affect the sensitivity to climate change. \nWe also consider our climate-change impacts results in comparison with other studies using older, \nlower-resolution climate projections. ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed11.pdf" + }, + { + "text": "UN Food and Agriculture Organization, UN Development Programme and UN Population \nFund [22]. The exposure component comprised proxies for the average length of flood and \ndrought events calculated with daily precipitation data [23] (table 2). These proxies were chosen \nabove other possible metrics as they were required to replace self-reported instances of flood \nand drought events used in the original HCVI, which correlate with undernutrition data at the \ncountry-level [23]. The proxies were therefore masked to only include data where a significant \nproportion of people live and grow crops before aggregating to country level and combining to \ncomprise a measure of exposure [23]; nevertheless, it is recognized that precipitation data alone \nmay not always be adequate for representing flood and drought events, so the current method is \nregarded as preliminary. \n\nThe impacts of projected climate change, therefore, act through changes in these quantities. In \nthe current version of the HCVI, climate-change impacts on other quantities such as crop yield \nare not considered. Socio-economic factors affecting sensitivity and adaptive capacity are fixed at \npresent-day conditions. \n\nThe ensemble-mean baseline HCVI calculated with the high-resolution bias-corrected \nHadGEM3 ensemble is shown in figure 1. The spatial pattern is compatible with HCVI values \ncalculated using reanalysis data at the CMIP5 grid-scale resolution [23]; the most vulnerable \nregions are sub-Saharan Africa and South Asia. This higher-resolution climate data enables \ninclusion of additional countries which were not resolved in the lower-resolution CMIP5 data. ", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed11.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed11.pdf", + "query": "Regarding climate change simulation, what is JULES ?", + "target_page": 7, + "target_passage": "Impacts on freshwater were assessed with a version of the JULES land surface model [24,25], a coupled ecosystem–hydrology–surface exchange model which simulates land-atmosphere fluxes of water, energy and carbon in an internally consistent way", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Impacts on freshwater were assessed with a version of the JULES land surface model [24,25], a \ncoupled ecosystem–hydrology–surface exchange model which simulates land-atmosphere fluxes \nof water, energy and carbon in an internally consistent way, typically applied at global scales. \nVariants of JULES form the land surface scheme of Met Office Hadley Centre Earth System \nModels [26,27] and have been used to assess impacts of climate change on global terrestrial \necosystems and hydrology [28–30] within such models. JULES can also be used outside of the \nEarth System Model (ESM), driven by meteorological outputs of other ESMs to assess impacts of \na wider range of climate projections [6,8]. Here we use a new, higher-resolution configuration of \nJULES on a global grid of 0.5° resolution [31]. \n\nIt has been noted that hydrological impacts models driven by climate-change projections \nfrom climate models tend to give more severe drying than simulated in the climate models \nthemselves [32–34]. This is largely attributed to the inclusion of plant stomatal closure in \nresponse to elevated CO2 in the climate model land surface schemes, which generally reduces \nevapotranspiration relative to climate projections without this process and hence further increases \nrun-off/streamflow or ameliorates decreases [34]. This process is often omitted from standard \nhydrological models. Plant physiological responses to CO2 are included in the JULES model, so \nour projections of changes in run-off here do account for this process. ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed11.pdf" + }, + { + "text": "We used each HadGEM3 simulation to drive JULES to simulate changes in run-off due to \nthe effects of climate change and CO2 rise on precipitation, evaporation and transpiration. We \nanalysed 30 year periods centred around the year of crossing GWLs of 1.5°C and 2°C relative to \npre-industrial. We examined changes in both mean flows and low flows (defined as the flows for \nthe lowest 10% of time). \n\n(e) Correcting biases in climate model output and implications for defining levels of global \n\nwarming ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed11.pdf" + }, + { + "text": "**Figure 10.**Distributions of changes in run-off for mean flows simulated by the JULES ecosystem–hydrology model under the \nensemble of six climate projections at 1.5°C (blue) and 2°C (orange) global warming. Boxes show the 25th and 75th percentile \nchanges, whiskers show the range, circles show the four projections that do not define the ends of the range, and crosses \nshow the ensemble means. Numbers in square brackets show the ensemble-mean flow in the baseline, in millimetres of rain \nequivalent. ", + "page_start": 15, + "page_end": 15, + "source_file": "pubmed11.pdf" + }, + { + "text": "**Figure 11.**Distributions of changes in run-off for low flows (flows for lowest 10% of time) simulated by the JULES ecosystem– \nhydrology model under the ensemble of six climate projections at 1.5°C (blue) and 2°C (orange) global warming. Boxes show \nthe 25th and 75th percentile changes, whiskers show the range, circles show the four projections that do not define the ends of \nthe range, and crosses show the ensemble means. Numbers in square brackets show the ensemble-mean flow in the baseline, \nin millimetres of rain equivalent. ", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed11.pdf" + }, + { + "text": "**15**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n–75 –50 –10 –1 \n0 \n% \n1 10 50 75 \n. \n. \n. \n. \n. \n. \nGFDL-ESM2M HadGEM2-ES \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n\n**Figure 9.**Changes in run-off for mean flows simulated by the JULES ecosystem–hydrology model under six climate simulations \nat 2°C global warming. (a) Ensemble mean and (b) percentage of models agreeing on increased flow. \n\n. \n. ", + "page_start": 14, + "page_end": 14, + "source_file": "pubmed11.pdf" + }, + { + "text": "The ClimPACT extreme weather indices, HCVI and JULES run-off simulations were all performed \nusing outputs from the higher-resolution HadGEM3 projections described in §2a. However, there \nwere some differences in how these data were applied, with different approaches to the treatment \nof systematic biases in the climate model output. For the ClimPACT analysis, it was considered \nimportant to assess changes in the raw climate model output, because this directly represents \nthe behaviour of the model itself. The main focus was on the changes relative to the present- \nday baseline climate, defined as 1981–2010, with absolute values in either the baseline or the \nGWLs of 1.5°C and 2°C being only of secondary interest. For the HCVI and JULES run-off \nanalyses, however, it was considered important to correct for systematic biases in the climate \nmodel output, because these can lead to unrealistic representations of the key quantities in the \npresent-day simulation [35]. A bias-correction methodology was, therefore, applied for these two \nparts of the analysis, whereby the model output was adjusted to make it consistent with an \nobserved climatology [36]. We used a multi-segment statistical bias-correction methodology for \nprecipitation [37], and a modification of this for other variables [37]. ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed11.pdf" + }, + { + "text": "A large number of previous studies have assessed potential impacts of future climate change \nusing the 5th Coupled Model Intercomparison Project (CMIP5) ensemble or subsets of this [7], \nand some have framed this in terms of impacts at global warming of 1.5°C and/or 2°C [8,9]. We \nalso base our study on a subset of CMIP5 projections, but use a new, higher-resolution atmosphere \nmodel to provide greater spatial detail and improved representation of atmospheric processes. \n\n2. Methods and models \n(a) Global climate simulations at 1.5°C and 2°C global warming \n\nThere are a number of ways in which 1.5°C or 2°C global warming can be defined—one could \nbe the long-term climate state following a stabilization of warming at that level, another could \nbe the state over a shorter period around the time of first reaching that level. Here we choose the \nsecond definition, which is what is seen first and hence needs to be adapted to. There are also \na number of methods with which such changes can be assessed [10]. We take the opportunity \nof availability of a new set of higher-resolutions transient climate and impacts simulations, and \nuse a time-sampling methodology [10] to assess global-scale impacts at these resolutions for the \nfirst time. ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed11.pdf" + }, + { + "text": "**23**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n–20 –15 –10 –5 \n0 \n% \n5 10 15 20 \n. \n. \n. \n. \n. \n. \nGFDL-ESM2M HadGEM2-ES \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n\n**Figure 20.**Difference between 2°C and 1.5°C global warming in percentage changes in mean (top) run-off in JULES simulations \ndriven by the ensemble of HadGEM3 simulations. Note that the use of percentage changes emphasizes changes in regions where \nthe baseline streamflow is small. \n\n. \n. \n. ", + "page_start": 22, + "page_end": 22, + "source_file": "pubmed11.pdf" + }, + { + "text": "We ran the model using only its atmosphere and land components, with time-varying sea- \nsurface temperatures (SSTs) and sea-ice concentrations (SICs) prescribed as input quantities. This \napproach was taken for two reasons: (i) to provide a rapid first analysis of the implications \nof the higher resolution for projections of climate extremes and impacts—an atmosphere- \nonly simulation requires considerably less computing time than a coupled ocean–atmosphere \ngeneral circulation model (GCM); (ii) to allow us to explore, to some degree, uncertainties in \nregional climate changes by using SSTs and SICs from different climate models. To explore these \nuncertainties in the regional impacts of climate change, we carried out six HadGEM3 atmospheric \nsimulations driven by time-varying SSTs and SICs from a subset of projections from the CMIP5 \nwith the RCP8.5 scenario. The assumption here is that SSTs and SICs provide a substantial \ninfluence on regional patterns of climate change over land, so using a range of SST and SIC \npatterns in a single atmosphere model goes some way towards representing the range of regional \nclimate changes that would arise in a set of different coupled ocean–atmosphere GCMs. This \napproach will not capture the full range of uncertainty affecting regional climate changes over \nland, because it still relies on one atmosphere model and one land surface scheme, so responses \nto radiative forcing that depend mainly on atmospheric process or land-atmosphere interactions \nwill still be constrained by the behaviour of that single model. Nevertheless, we consider that \nour experimental design avoids the reliance on one single realization of climate and hence allows \nsome of the uncertainties in regional climate-change impacts to be illustrated and explored. ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed11.pdf" + }, + { + "text": "The high-resolution simulations were performed using the HadGEM3A Global Atmosphere \n(GA) 3.0 model [12–14] at a resolution of N216 (0.556° of latitude by 0.833° of longitude with \ngridboxes of approx. 60 km length in mid-latitudes). This is the atmospheric component of \nthe HadGEM3-GC2 coupled climate model [15,16], which is part of the HadGEM3 family of \nclimate models [12]. This represents the third generation of HadGEM configurations, leading \non from the HadGEM2 family of climate model configurations [13] which was used for CMIP5. \nKey improvements over the previous model, HadGEM2, include increased vertical levels in the \natmosphere (85 compared to 38) and substantial changes to the model dynamics (ENDGame) [17]. \nThis version of the HadGEM3 model lies in the transition from CMIP5 to CMIP6 versions. The Met \nOffice is currently operationally running the coupled HadGEM3-GC2 model at N216 resolution \nfor seasonal and decadal forecasting and clear benefits are emerging from this use at higher \nresolution [18,19]. ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed11.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed10.pdf", + "query": "Which of #climatechange and #globalwarming is the most used ?", + "target_page": 5, + "target_passage": "A total of 6,662,478 tweets were retained, of which 5,774,747 contained #climatechange, and 887,731 contained #globalwarming", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "Association networks surrounding #climatechange and #globalwarming showed different \nproperties. The climate change discourse included 38,821 hashtags, whereas the global warming \ndiscourse only contained 8788 hashtags. Table 1 displays the 50 most significant hashtags in the \ntwo discourses based on centrality. As some hashtags were used in the form of an abbreviation or \nphrase, explanations are provided in the table. Two networks shared 32 out of the 50 most significant \nwords. Hashtags “canada”, “cdnpoli”, “sdgs”, “biodiversity”, “education”, “environmental”, “cop24”, \n“sustainable”, “auspol”, “food”, “agriculture”, “cleanenergy”, “renewableenergy”, “renewables”, \n“emissions”, “coal”, “fossilfuels”, and “cop21” only showed up on the top 50 list of the “climate change” \nnetwork. Hashtags “tcot”, “california”, “p2”, “nyc”, “snow”, “agw”, “summer”, “global”, “winter”, \n“india”, “planet”, “heatwave”, “hoax”, “nasa”, “algore”, “world”, “oil”, and “eco” were unique on the \ntop 50 list of the global warming network. The two lists only shared three out of the top five hashtags. \nIn the #climatechange network, “climateaction” was ranked third place and “sustainability” was \nranked fourth place, whereas they were ranked significantly lower, 17th and 22nd, respectxively, in the \n#globalwarming network. In the #globalwarming network, “earth” and “weather” were among the \ntop five nodes, whereas they were ranked 14th and 24th in the #climatechange network, respectively. ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed10.pdf" + }, + { + "text": "In this research, we were interested in tweets containing either #climatechange or #globalwarming, \nas these two hashtags exactly correspond to climate change and global warming, respectively, the two \ncompeting definitions of climate issues. We did not follow [79] to include #AGW (anthropogenic global \nwarming) as query hashtags in our research because we think that this refers to global warming in \na defined category so cannot be regarded in parallel with the two considered hashtags. We limited the \nscope of the search to English-language tweets generated between 1 January 2009 and 31 December \n2018. We only collected tweets containing either of the two hashtags in the body of the tweets rather \nthan those containing these hashtags in the retweeted or quoted text, as we think that retweeted text or \nquoted texts cannot directly represent the tweeter’s usage pattern of the two terminologies. \n\nTo collect these tweets, we used a Python-based crawler to send requests to the Twitter server to \nselect hashtags, language, start date, and end date as inputs. Once the first request was completed, \nthe server responded with a file in json format and the first 20 qualified tweets in a time-descending \norder. By parsing the json file, we obtained a string for the crawler to build the next request and obtain \nthe next 20 tweets. Thus, a loop was written to keep the crawler sending requests and the crawler \nwas automatically terminated when all the qualified tweets publicly available were collected. Our \ncrawler respected Twitter’s robot.txt and we did not collect, analyze or display any user information in \nour study. ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed10.pdf" + }, + { + "text": "Article \n**#Climatechange vs. #Globalwarming: Characterizing**\n**Two Competing Climate Discourses on Twitter with**\n**Semantic Network and Temporal Analyses**\n\n**Wen Shi 1, Haohuan Fu 1,2, Peinan Wang 3, Changfeng Chen 3 and Jie Xiong 4,***\n\n1 Ministry of Education Key Laboratory for Earth System Modeling, Department of Earth System Science, \n\nTsinghua University, Beijing 100084, China; shi-w18@mails.tsinghua.edu.cn (W.S.); \nhaohuan@tsinghua.edu.cn (H.F.) \n\n2 National Supercomputing Center in Wuxi, Wuxi 214000, China \n3 \n\nSchool of Journalism and Communication, Tsinghua University, Beijing 100084, China; \nwpn17@mails.tsinghua.edu.cn (P.W.); chencf@mail.tsinghua.edu.cn (C.C.) \nStrategy and Innovation Department, Rennes School of Business, 35065 Rennes, France \n\n4 \n** ***Correspondence: jie.xiong@rennes-sb.com; Tel.:+ 33-(0)-2-99-54-46-79 ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed10.pdf" + }, + { + "text": "Given our goal of exploring the difference between the two discourses, the 615,816 tweets \ncontaining both hashtags simultaneously were excluded to differentiate between the two datasets \nfollowing [67,80]. A total of 6,662,478 tweets were retained, of which 5,774,747 contained #climatechange, \nand 887,731 contained “#globalwarming”. The number of qualified tweets containing #climatechange \nand #globalwarming in each year is displayed in Figure 1a. ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed10.pdf" + }, + { + "text": "As the climate change and global warming discourses evolved over the past years, their relative \nstatuses in public discourse also changed. Although from 2009 to 2018, increasing numbers of people \nstarted to use Twitter, resulting in an overall rise in the number of tweets and hashtags, the ratio of \n#climatechange frequency and #globalwarming frequency still indicated the public’s change in frame \npreference. Figure 1a displays that in 2009, the number of tweets with #climatechange was 2.69 times \nthat of the tweets with #globalwarming, whereas the ratio significantly since 2013 and reached 13.02 \nin 2018. The climate change network showed a stronger ability to incorporate diverse hashtags into \ndiscussions, according to Figure 1b. In 2009, the hashtags that co-occurred with #climatechange were \n2.44 times those that co-occurred with #globalwarming, and the ratio climbed to 6.36 in 2018. \n\nThe rank–order correlation coefficient of nodes between the two networks maintained a stable \nlevel and showed a slight climbing trend starting 2009, as shown in Figure 6a, except for 2010 and \n2011, when the p-values were larger than 0.05 and no significant correlations were identified. The QAP \nanalysis showed that the associations between the two discourses were correlated in the 10-year period \n(the p-value for 2015 was 0.011; p-values for all the other years were less than 0.001). Figure 6b reveals \nthat the similarity of associations between the top 50 nodes in the two discourses fluctuated and did \nnot show a rising trend with the correlation of nodes’ rank order. ", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed10.pdf" + }, + { + "text": "The association networks of #climatechange and #globalwarming are shown in Figure 2. Nodes \nare labelled with the hashtags and the undirected edges are weighted to reflect the frequency of \nco-occurrence. The modularity analysis identified four clusters in the #climatechange network and \nfive in the #globalwarming network, where clusters are differentiated by color (resolution is 0.75 for \nclimate change and 0.85 for global warming). The theme, top hashtags, and the proportion of each \ncluster are also summarized and represented in the network depicted in Figure 2. \n\nThe largest cluster (green nodes) of both #climatechange and #globalwarming network refer \nto general facts about global climate issues, sharing words about the causes or effects concerning \nsustainability. The difference is that the largest cluster of #globalwarming (46% of the network) includes \nmore slogan words, such as “world”, “planet”, “global”, and “climatechangeisreal”, whereas the \nlargest cluster of #climatechange (40% of the network) tends to discuss some specific problems, such as \nagriculture, biodiversity, education, and politics. ", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed10.pdf" + }, + { + "text": "The status of the two discourses varied significantly in the more recent years in the study period. \nData from Google in prior study suggested that the search record for global warming was larger \nthan that of climate change in earlier times [13]. The authors found that in the battle to be the most \nrepresentative hashtag for global climate concern, #climatechange showed growing popularity and \nbecame an overwhelming trending topic compared with #globalwarming. Also, #climatechange \nshowed a stronger ability to incorporate diverse hashtags into its discourse in both relative and absolute \ndimensions. Comparatively, the popularity of the global warming discourse among social media \nusers did not increase apparently in terms of tweets volume and hashtag diversity, especially when \nconsidering the yearly increase in Twitter users. The reason for the observed shift in public discourse \ntoward climate change from global warming may be attributed to the high exposure of climate change \nin the media and scientific reports in recent years [13]. Previous studies noted that perceived scientific \nconsensus can increase acceptance of science [101]. Though global warming has been commonly used \nsince the 1980s to describe the world-wide temperature rise, climate change is preferred by scientists to \nrefer a range of complex changes of climate [102]. Pew found science-related accounts draw millions \nof followers on Facebook and volume of posts they released climbed in past years [103]. Climate \nscientists are found to be opinion makers on Twitter [104]. As social media has become an emerging \nplatform for science popularization, scientific community might contribute to the prevalence of climate \nchange discourse by talking about climate change facts and mitigating measures [75]. ", + "page_start": 14, + "page_end": 14, + "source_file": "pubmed10.pdf" + }, + { + "text": "**Figure 1.**The number of tweets containing #climatechange or #globalwarming, and their ratio from \n2009 to 2018 (**a**). The number of hashtags contained in the “climate change” or “global warming” \ndatasets, and their ratio from 2009 to 2018 (**b**). ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed10.pdf" + }, + { + "text": "**Abstract:**Distinct perceptions of the global climate is one of the factors preventing society from \nachieving consensus or taking collaborative actions on this issue. The public has not even reached \nan agreement on the naming of the global concern, showing preference for either “climate change” \nor “global warming”, and few previous studies have addressed these two competing discourses \nresulting from distinct climate concerns by differently linking numerous climate concepts. Based on \nthe 6,662,478 tweets containing #climatechange or #globalwarming generated between 1 January 2009 \nand 31 December 2018, we constructed the semantic networks of the two discourses and examined \ntheir evolution over the decade. The findings indicate that climate change demonstrated a more \nscientific perspective and showed an attempt to condense climate discussions rather than diffuse the \ntopic by frequently addressing sub-topics simultaneously. Global warming triggered more political \nresponses and showed a greater connection with phenomena. Temporal analysis suggests that \ntraditional political discussions were gradually fading in both discourses but more recently started to \nrevive in the form of discourse alliance in the climate change discourse. The associations between \nglobal warming and weather abnormalitiessuddenly strengthened around 2012. Climate change is \nbecoming more dominant than global warming in public discussions. Although two discourses have \nshown more similarities in the rank order of important climate concepts, apparent disagreements \ncontinue about how these concepts are associated. These findings lay the groundwork for researchers \nand communicators to narrow the discrepancy between diverse climate perceptions. ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed10.pdf" + }, + { + "text": "**Table 2.**Hashtags that remained on the top 50 list for the climate change or the global warming \ndiscourse from 2009 to 2018. \n\n\n \n \n \n \n [html]\n
UniqueShared
# climatechangechina, solar, water, food, economy, coal, sustainabilityco2, news, carbon, green, climate,
# globalwarmingpollution, earthus, energy, science, environment
\n\nFigures 3 and 4 show the overall evolution of critical hashtags’ associations in the 10-year period, \nwhere the nodes in the 10 graphs are located in the same position but the strength of associations varies \nacross longitudinal time. Vector graphics with the label of nodes are provided in the Supplementary \nMaterials. Four themes were identified in each discourse according to the nodes’ associations. To more \nexplicitly demonstrate the relative importance of each cluster in each year, we calculated the sum of \nthe degree centrality of all the nodes belonging to each cluster and their change in centrality over the \n10 years, as shown in Figure 5. ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed10.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed10.pdf", + "query": "Is the #climateaction hashtag more bound the #globalwarming of #climatechange ?", + "target_page": 7, + "target_passage": "In the #climatechange network, “climateaction” was ranked third place and “sustainability” was ranked fourth place, whereas they were ranked significantly lower, 17th and 22nd, respectxively, in the #globalwarming network", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Association networks surrounding #climatechange and #globalwarming showed different \nproperties. The climate change discourse included 38,821 hashtags, whereas the global warming \ndiscourse only contained 8788 hashtags. Table 1 displays the 50 most significant hashtags in the \ntwo discourses based on centrality. As some hashtags were used in the form of an abbreviation or \nphrase, explanations are provided in the table. Two networks shared 32 out of the 50 most significant \nwords. Hashtags “canada”, “cdnpoli”, “sdgs”, “biodiversity”, “education”, “environmental”, “cop24”, \n“sustainable”, “auspol”, “food”, “agriculture”, “cleanenergy”, “renewableenergy”, “renewables”, \n“emissions”, “coal”, “fossilfuels”, and “cop21” only showed up on the top 50 list of the “climate change” \nnetwork. Hashtags “tcot”, “california”, “p2”, “nyc”, “snow”, “agw”, “summer”, “global”, “winter”, \n“india”, ��planet”, “heatwave”, “hoax”, “nasa”, “algore”, “world”, “oil”, and “eco” were unique on the \ntop 50 list of the global warming network. The two lists only shared three out of the top five hashtags. \nIn the #climatechange network, “climateaction” was ranked third place and “sustainability” was \nranked fourth place, whereas they were ranked significantly lower, 17th and 22nd, respectxively, in the \n#globalwarming network. In the #globalwarming network, “earth” and “weather” were among the \ntop five nodes, whereas they were ranked 14th and 24th in the #climatechange network, respectively. ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed10.pdf" + }, + { + "text": "Given our goal of exploring the difference between the two discourses, the 615,816 tweets \ncontaining both hashtags simultaneously were excluded to differentiate between the two datasets \nfollowing [67,80]. A total of 6,662,478 tweets were retained, of which 5,774,747 contained #climatechange, \nand 887,731 contained “#globalwarming”. The number of qualified tweets containing #climatechange \nand #globalwarming in each year is displayed in Figure 1a. ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed10.pdf" + }, + { + "text": "The status of the two discourses varied significantly in the more recent years in the study period. \nData from Google in prior study suggested that the search record for global warming was larger \nthan that of climate change in earlier times [13]. The authors found that in the battle to be the most \nrepresentative hashtag for global climate concern, #climatechange showed growing popularity and \nbecame an overwhelming trending topic compared with #globalwarming. Also, #climatechange \nshowed a stronger ability to incorporate diverse hashtags into its discourse in both relative and absolute \ndimensions. Comparatively, the popularity of the global warming discourse among social media \nusers did not increase apparently in terms of tweets volume and hashtag diversity, especially when \nconsidering the yearly increase in Twitter users. The reason for the observed shift in public discourse \ntoward climate change from global warming may be attributed to the high exposure of climate change \nin the media and scientific reports in recent years [13]. Previous studies noted that perceived scientific \nconsensus can increase acceptance of science [101]. Though global warming has been commonly used \nsince the 1980s to describe the world-wide temperature rise, climate change is preferred by scientists to \nrefer a range of complex changes of climate [102]. Pew found science-related accounts draw millions \nof followers on Facebook and volume of posts they released climbed in past years [103]. Climate \nscientists are found to be opinion makers on Twitter [104]. As social media has become an emerging \nplatform for science popularization, scientific community might contribute to the prevalence of climate \nchange discourse by talking about climate change facts and mitigating measures [75]. ", + "page_start": 14, + "page_end": 14, + "source_file": "pubmed10.pdf" + }, + { + "text": "In this research, we were interested in tweets containing either #climatechange or #globalwarming, \nas these two hashtags exactly correspond to climate change and global warming, respectively, the two \ncompeting definitions of climate issues. We did not follow [79] to include #AGW (anthropogenic global \nwarming) as query hashtags in our research because we think that this refers to global warming in \na defined category so cannot be regarded in parallel with the two considered hashtags. We limited the \nscope of the search to English-language tweets generated between 1 January 2009 and 31 December \n2018. We only collected tweets containing either of the two hashtags in the body of the tweets rather \nthan those containing these hashtags in the retweeted or quoted text, as we think that retweeted text or \nquoted texts cannot directly represent the tweeter’s usage pattern of the two terminologies. \n\nTo collect these tweets, we used a Python-based crawler to send requests to the Twitter server to \nselect hashtags, language, start date, and end date as inputs. Once the first request was completed, \nthe server responded with a file in json format and the first 20 qualified tweets in a time-descending \norder. By parsing the json file, we obtained a string for the crawler to build the next request and obtain \nthe next 20 tweets. Thus, a loop was written to keep the crawler sending requests and the crawler \nwas automatically terminated when all the qualified tweets publicly available were collected. Our \ncrawler respected Twitter’s robot.txt and we did not collect, analyze or display any user information in \nour study. ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed10.pdf" + }, + { + "text": "Figure 3 depicts the associations of hashtags in the climate change discourse for each year \nfrom 2009 to 2018. The scientific hashtags cluster (in green) was the most important theme in the \nclimate change discourse, especially more recently. However, some scientific hashtags, such as “ghg” \n(greenhouse gas), “co2”, and “forests”, were not identified in the scientific cluster but in the global \nactions cluster (in yellow) because these hashtags were frequently used in the global action context and \nidentified with a closer semantic association to global action by Gephi. In addition to these hashtags, \nthe global action cluster included a series of international activities, such as “ipcc” (Intergovernmental \nPanel on Climate Change), “unfccc” (United Nations Framework Convention on Climate Change), \nand “cop” (Conferences of the Parties) for almost every year. The blue cluster includes to political \nhashtags, such as “uniteblue”, “sgp”, “p2”, and “tcot”. In 2017 and 2018, the associations with political \nhashtags disappeared among the top 50 hashtags. The small red cluster had a mixed theme, combining \n“technology”, “innovation”, “education”, “africa”, “healthcare”, and “politics”. The centrality sum of \nthe nodes in the red cluster remained rather low throughout the 10-year period but obviously increased \nin the last two years of the period according to Figure 5a. ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed10.pdf" + }, + { + "text": "As the climate change and global warming discourses evolved over the past years, their relative \nstatuses in public discourse also changed. Although from 2009 to 2018, increasing numbers of people \nstarted to use Twitter, resulting in an overall rise in the number of tweets and hashtags, the ratio of \n#climatechange frequency and #globalwarming frequency still indicated the public’s change in frame \npreference. Figure 1a displays that in 2009, the number of tweets with #climatechange was 2.69 times \nthat of the tweets with #globalwarming, whereas the ratio significantly since 2013 and reached 13.02 \nin 2018. The climate change network showed a stronger ability to incorporate diverse hashtags into \ndiscussions, according to Figure 1b. In 2009, the hashtags that co-occurred with #climatechange were \n2.44 times those that co-occurred with #globalwarming, and the ratio climbed to 6.36 in 2018. \n\nThe rank–order correlation coefficient of nodes between the two networks maintained a stable \nlevel and showed a slight climbing trend starting 2009, as shown in Figure 6a, except for 2010 and \n2011, when the p-values were larger than 0.05 and no significant correlations were identified. The QAP \nanalysis showed that the associations between the two discourses were correlated in the 10-year period \n(the p-value for 2015 was 0.011; p-values for all the other years were less than 0.001). Figure 6b reveals \nthat the similarity of associations between the top 50 nodes in the two discourses fluctuated and did \nnot show a rising trend with the correlation of nodes’ rank order. ", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed10.pdf" + }, + { + "text": "5.1.3. Discourse Structure \n\nIn the discourse surrounding #climatechange, “environment”, “energy”, and “global action” \nrepresented the themes of the three largest clusters in the network. However, three popularly recurring \nhashtags, “#environment”, “#energy”, and “#climateaction”, did not belong to any of the three clusters \nabove, but formed another small tight cluster together, sitting in the most central part of the semantic \nnetwork, as shown in Figure 2b. As each of the three hashtags can almost represent one sub-theme of \nthe climate change topic and these three hashtags were tightly bundled might indicate an attempt by \n#climatechange users to address all three communities together [91], consolidating climate change as \na topic rather than a loosely organized topic. Previous communication studies also confirmed hashtags’ \nfunction of serving as a hybrid forum [68], where heterogeneous individuals coordinate to solve ", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed10.pdf" + }, + { + "text": "Large amounts of user-generated data on social media, which have been valued in computer science, \ncommunication, and environmental studies [5,9,15–18], have enabled the acquistion of the social media \nrepresentation of the two discourses in a decade. In this study, by analyzing hashtag co-occurrence \npatterns in 6,662,478 tweets containing “climate change” and “global warming” between 1 January 2009 \nand 31 December 2018, two semantic networks of public climate discourse were constructed to identify \nthe critical concepts and links surrounding the two terminologies. We conducted temporal analysis to \nobserve the evolution of the two discourses and to measure whether the discrepancy between the two \nhas widened or narrowed within the 10-year period. \n\nTo be specific, we formulated three research questions (RQs) to be explored in this study: \n\nRQ1: What is the difference in how the two the discourses are associated with important climate \nconcepts in people’s minds? \nRQ2: How did the two competing climate discourses evolve from 2009 to 2018? \nRQ3: Did the two competing discourses converge or diverge in this decade? ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed10.pdf" + }, + { + "text": "The association networks of #climatechange and #globalwarming are shown in Figure 2. Nodes \nare labelled with the hashtags and the undirected edges are weighted to reflect the frequency of \nco-occurrence. The modularity analysis identified four clusters in the #climatechange network and \nfive in the #globalwarming network, where clusters are differentiated by color (resolution is 0.75 for \nclimate change and 0.85 for global warming). The theme, top hashtags, and the proportion of each \ncluster are also summarized and represented in the network depicted in Figure 2. \n\nThe largest cluster (green nodes) of both #climatechange and #globalwarming network refer \nto general facts about global climate issues, sharing words about the causes or effects concerning \nsustainability. The difference is that the largest cluster of #globalwarming (46% of the network) includes \nmore slogan words, such as “world”, “planet”, “global”, and “climatechangeisreal”, whereas the \nlargest cluster of #climatechange (40% of the network) tends to discuss some specific problems, such as \nagriculture, biodiversity, education, and politics. ", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed10.pdf" + }, + { + "text": "then the associations suddenly strengthened in 2012 when numerous hashtags about phenomena were \nincluded in the discourse. Notably, the red node in the top right-hand corner named “2012” refers \nto the Maya prediction that the year 2012 would be the end of the world and that the world would \nbe destroyed by extreme natural events, and was linked to other climate hashtags for the first time \nin the graph exactly in 2012. The blue nodes included the political hashtags, such as “maga”, “ows”, \n“p2”, “tcot”, and “obama”. The involvement of political hashtags in the global warming discourse was \nsignificantly higher than that in the climate change discourse according to the comparison between \nFigure 5a,b. From 2009 to 2018, the number of associations with political hashtags (blue nodes) faded, \nas shown in Figure 4, and its importance in the semantic network gradually decreased, as shown in \nFigure 5, except for variation in 2014. The yellow nodes describe the hesitation about climate facts \nand actions, where words describing global efforts, such as “ipcc”, “cop15”, and “un”, and words \nquestioning global warming, such as “hoax” and “fraud”, were both included. The associations \nbetween the yellow nodes were most salient in 2010 and 2011 but were less dominant in the following \nyears. The green nodes occupied 50.7% of all the nodes representing talk about the scientific hashtags of \nclimate issue, including words such as “ecology”, “ocean”, and “cleanenergy”. Associations between \nscientific hashtags (green nodes) exploded and the centrality sum of this cluster also showed an obvious \nrising trend in dominating the theme of the global warming discourse, according to Figure 5. ", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed10.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed10.pdf", + "query": "What are two main reasons for one's low climate concern ?", + "target_page": 13, + "target_passage": "As invisible causes and disbelief in actions have long been regarded as two key reasons for low climate concern", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Even when climate change and global warming shared concern about similar topics such as the \ncause of the climate issue, global warming tended to focus on carbon emission phenomena, whereas \nclimate change preferred a more in-depth perspective, highlighting the importance of global action \nto mitigate the climate issue in its second-largest cluster, with energy structure as the contributor to \ncarbon emissions in its third largest cluster. As invisible causes and disbelief in actions have long \nbeen regarded as two key reasons for low climate concern [90], the two terminologies’ differences \nin connotations suggest that introducing these absent sub-topics into global warming discourse or \nhighlighting climate change for its inherent connotations may help communicators raise public concern \nabout climate. \n\n5.1.2. Political Connotations \n\nStudies noted that frame preference between climate change and global warming reflects \nindividuals’ ideological spectrum, where climate change and global warming were favored by \nthe liberals and conservatives, respectively [10]. The cluster analysis of the semantic network in the \ncurrent study demonstrated that global warming triggered far more political responses than climate \nchange. The second largest cluster of global warming was politics-based, where hashtag “tcot”, favored \nby right-leaning users and “p2”, favored by left-leaning users, were both ranked in the list of top nodes \nof the global warming discourse, but neither was included in the list of top nodes of the climate change \ndiscourse. Considering that earlier findings suggested that global warming was more likely to be used \nby conservatives to question the reality of climate issue [11] and climate change is more commonly \nadopted when discussing action against the climate change issue [5], global warming had a stronger \npolitical connotation in public discussion. ", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed10.pdf" + }, + { + "text": "complex changes in the state of the climate [7], which may be caused by natural process, external forces, \nor human interventions [8]. By randomly assigning respondents to climate change or global warming \nquestionnaires, scholars confirmed that the different connotations contained in the two definitions are \nlikely to evoke distinct interpretations of the causes and impacts of the global climate issue [9], which \nmay inhibit collaboration and joint efforts to mitigate the global challenge. \n\nPublic preference between climate change and global warming is even more apparent when \nconsidering the ideology spectrum [10]. Some scholars concluded that conservatives, who are \nless concerned with environmental issues, tended to use global warming as a narrative strategy \nbecause global warming has a more direct connection with temperature rise, making it easier to find \ncontradictory cues such as freezing weather or heavy snowstorms to deny global climate change \nfacts [11]. The associations between global warming and human activities may contribute to more \ncontroversies as well [12], connecting global warming more with the “hoax” frame [5] and evoking \ngreater negative sentiment [13]. \n\nAlthough these existing studies have often attempted to identify the differences between these two \nterminologies, only a particular few perspectives, such as sentiment, ideological preference, or cause \nand effect, were examined in each study [3,9,13]. However, the associate network model introduced by \npsychologists suggests that human recognition and memory have a network-shaped architecture [14], \nwhere individual understanding of particular objects is connected with numerous other objects in \nthe mind. According to the associate network model, individual understanding of the global climate \nconcern is a network composed of numerous inter-connected concepts, in which climate change and \nglobal warming. As the two terminologies concern the primary mechanism of the global climate issue, \nthe preference between the two understandings may represent two distinct climate discourses by \ndifferently organizing numerous climate concepts. Examining the differences between two discourses \nwith an associative perspective may provide communicators with unique insights into narrowing the \ncognitive discrepancy. The temporal dimension was lacking in existing studies, necessitating the study \nof how concepts associated with each other have evolved with time. ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed10.pdf" + }, + { + "text": "**2. Background**\n\n2.1. Climate Change, Global Warming, and Frames \n\nExisting studies have noted that the subtle difference between climate change and global warming \nevokes different public cognitive responses, where global warming“indicates heat-related impacts, \nhuman causes, increased UV light penetration, ozone depletion, and the greenhouse effect, whereas \nclimate change is more associated with a wide range of influences on climate, including drought and \nagriculture [9]. An N-gram analysis suggested that global warming showed a closer connection with \nice, snow, and sea, whereas climate change was always connected with scientific investigations, such as ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed10.pdf" + }, + { + "text": "issues and re-constructing them differently. By comparing the persistent words used related to the two \ndiscourses in the 10-year period in Table 2, we think that global warming showed a relative preference \ntoward general descriptions or slogans, such as “earth” and “pollution”, whereas “climate change” \nwas more associated to specific issues like “solar”, “coal”, “china”, and “food”. \n\nStudies have suggested that the public shows a preference for scientific publications with general \nkeywords compared with those with complicated scientific jargon [47], lacking a deep understanding of \nthe complicated issue [46] and the necessity for mitigation of the climate issue [47]. These conclusions \nseem to suit global warming more than climate change according to the current study, which is \nprobably because climate change receives more publicity and recognition than global warming in the \nscientific community. In the association network shown in Figure 2, global warming was found to be \nmore connected with temperature abnormalities. This finding is in accordance with studies reporting \nthat short-term temperature anomalies [87] can increase the public’s belief about global warming by \nincreasing the understanding of this abstract issue [88], although scientists mostly make judgments \nbased on long-term weather statistics [89]. However, none of the four words, “snow”, “summer”, \n“winter”, or “heatwave” in the temperature theme of global warming were ranked in the top 50 nodes \nlist of the climate change network. ", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed10.pdf" + }, + { + "text": "**1. Introduction**\n\nThe public’s distinct understanding of the cause and effect of the global climate issue is an obstacle \nto joint mitigation actions. In addition to a diversity of views co-existing in the public discourse [1,2], \nprevious studies noticed that the public had even failed to reach an agreement on whether “climate \nchange” or “global warming” is the most appropriate definition of the global climate concern [3–5]. \nAccording to the definition provided by [6], global warming describes global climate issues as \na continuous increase in the average temperature of Earth’s surface due to anthropogenic emissions \nof greenhouse gases, whereas climate change includes not only temperature rise but also a range of \n\nInt. J. Environ. Res. Public Health**2020**, 17, 1062; doi:10.3390/ijerph17031062 www.mdpi.com/journal/ijerph ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed10.pdf" + }, + { + "text": "Different frames concerning the global climate concern are popular among the public, politicians, \nenvironmentalists, and the media [1,28,29]. Big data analyses have indicated that when interpreting \nclimate events, individuals’ preference for frameworks was influenced by demographics [5] and \nsocial-political background [2]. Different choices of frameworks can evoke different psychological \nprocesses [30], promote or inhibit engagement intentions [31], or gain approval on various levels [32]. \nStudies have noted that the frameworks of climate change and global warming may result from \ndifferent political indications. The American Republican-leaning states show more preference for \nglobal warming than climate change compared with Democratic-leaning states, and global warming is \nmore connected with “hoax” in questioning the reality of the global climate issue [5]. Conservatives \nare more likely to link heat-related phenomena to global warming, whereas liberals associate these \nfacts equally with both frames [27]. An earlier survey conducted by [4] argued that wording choice \nmight not influence the whole population similarly. For the whole sample and politically independent \nindividuals, the two terminologies were equally serious, but climate change seemed more serious \ncompared with global warming among the Republicans, and the Democrats held the opposite opinion. ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed10.pdf" + }, + { + "text": "The signal of decreased flows was stronger for low flows than mean flows, and indeed in the \nNiger, the range of mean flow changes extended more towards increases whereas the range of \nlow flow changes extended more towards decreases. \n\n(b) Impacts at 1.5°C global warming compared to 2°C \n\nFor almost all quantities and simulations examined here, global-scale changes in extremes and \nrun-off at 1.5°C global warming (table 6) are smaller than those compared to 2°C (table 5; \nfigures 12 and 13). The exceptions to these are mean and low run-off which each show one \ninstance of a smaller change at 2°C than 1.5°C, but still with a majority of simulations showing \nlarger changes at 2°C (figure 13). For temperature-related indices, the ranges of change at the two \nGWLs do not overlap—the change at 2°C in all members is larger than the change at 1.5°C in ", + "page_start": 14, + "page_end": 14, + "source_file": "pubmed11.pdf" + }, + { + "text": "\n\nLOW PRESSURE- \n,- ", + "page_start": 81, + "page_end": 81, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n\nlow altitude, ", + "page_start": 183, + "page_end": 183, + "source_file": "00-80T-80.pdf" + }, + { + "text": "A detailed investigation of these factors is beyond the scope of this paper; nevertheless, this \nresult illustrates the important point that the nature and patterns of the climate forcing at a \nparticular level of global warming can play an important role in determining the patterns of \nregional impacts. \n\n**25**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n5. Conclusion \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. ", + "page_start": 24, + "page_end": 24, + "source_file": "pubmed11.pdf" + } + ] + }, + { + "references": { + "source_file": "infographic3.pdf", + "query": "How many scholarly articles are published every year ?", + "target_page": 1, + "target_passage": "over 3 million scholarly articles published per year", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "42,500 ACTIVE \nSCHOLARLY PEER- \nREVIEWED JOURNALS \nSource: The STM Report, October 2018 \n\nSponsored by ORCID \n**To learn more go to https://orcid.org** **Institutions must increasingly recognize and demonstrate**\n**the impact of all types of research contributions**", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "For example (unaudited): \n\n• Wikipedia and the other projects operated by the Foundation receive more than 19.4 billion pageviews \n\nper month, making them one of the most popular Web properties worldwide. Wikipedia is available in \nmore than 332 languages and contains more than 63 million articles contributed by a global volunteer \ncommunity. \n\n• For the year ended June 30, 2024, the educational content of the Foundation’s largest project, \nWikipedia, grew by approximately 1.9 million articles to approximately 63.4 million articles. \n\n• For the year ended June 30, 2024, volunteers added approximately 12.2 million images, movies, and \nsound files to the Foundation’s multimedia repository, making the total 106.7 million files. \n\n• Volunteers also contribute in several ways to the Foundation’s wiki software: volunteer software \n\ndevelopers add new functionality to the code base, and volunteer language specialists add to the code \nbase by translating the wiki interface into different languages. During the year ended June 30, 2024, \nthere were 47,773 commits merged, through the efforts of approximately 511 authors/contributors, of \nwhich 8,161 commits were through the efforts of approximately 244 volunteers. ", + "page_start": 17, + "page_end": 17, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**Patent**\n\n(xxxxxxx) \n5,000 \n\n4,000 \n\n3,000 \n\n2,000 \n\n1,000 \n\n0 \n**’99** **’00**\n\nO \nU \nR \n\nW \nO \nR \nK \n**Research Paper**\n\n120 \n100 \n80 \n60 \n40 \n20 \n0 \n**’00** **’01** **’02** **’03** **’04**\n\nThe number of research papers presented at JSME (The Japan Society of \nMechanical Engineers), JSAE (The Society of Automotive Engineers of Japan), SAE \n(The Society of Automotive Engineers), FISITA (The International Federation of \nAutomotive Engineering Societies) ", + "page_start": 46, + "page_end": 46, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "IGM Chicago (30 June 2017). \"Robots and Artificial Intelligence\" (http://www.igmchicago.org/sur \nveys/robots-and-artificial-intelligence).*igmchicago.org*. Archived (https://web.archive.org/we \nb/20190501114826/http://www.igmchicago.org/surveys/robots-and-artificial-intelligence) \nfrom the original on 1 May 2019. Retrieved 3 July 2019. \n\nIphofen, Ron; Kritikos, Mihalis (3 January 2019). \"Regulating artificial intelligence and robotics: \n\nethics by design in a digital society\".*Contemporary Social Science*.**16**(2): 170–184. \ndoi:10.1080/21582041.2018.1563803 (https://doi.org/10.1080%2F21582041.2018.156380 \n3). ISSN 2158-2041 (https://search.worldcat.org/issn/2158-2041). S2CID 59298502 (https:// \napi.semanticscholar.org/CorpusID:59298502). \n\nJordan, M. I.; Mitchell, T. M. (16 July 2015). \"Machine learning: Trends, perspectives, and ", + "page_start": 57, + "page_end": 57, + "source_file": "wikipedia3.pdf" + }, + { + "text": "The uses most relevant to this paper are those enabled by what HathiTrust refers to today as \nthe Research Center. The Center grew in part out of a research discipline called “digital \nhumanities,” which, among other things, seeks to use computational resources or other \ndigital technologies to analyze information and contribute to the study of literature, media, \nhistory, and other areas. For instance, imagine you want to understand how a given term \n(e.g., “war on drugs”) became used; one might seek to analyze when the term was first used \nand how often it was used over time by analyzing a vast quantity of sources, searching out \nthe term’s use. The insight here is that there is much to be learned not just from reading or \notherwise consuming specific material, but also from “non-consumptive research,” or \n\"research in which computational analysis is performed on one or more volumes (textual or \nimage objects)\" to derive other sorts of insights. AI training is a type of non-consumptive use. \n\nToday, the Center “[s]upports large-scale computational analysis of the works in the \nHathiTrust Digital Library to facilitate non-profit and educational research.” It includes over 18 \nmillion books in over 400 languages from the HathiTrust Digital Library collection. Roughly \n58% of the corpus is in copyright. HathiTrust notes that, while this corpus is large, it has \nlimitations in terms of its representation across subject matter, language, geography, and \nother dimensions. In terms of subject matter, the corpus is skewed towards humanities \n(64.9%) and social sciences (14.3%). In terms of language, 51% of the books are in English, ", + "page_start": 14, + "page_end": 14, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "McGarry, Ken (1 December 2005). \"A survey of interestingness measures for knowledge \n\ndiscovery\".*The Knowledge Engineering Review*.**20**(1): 39–61. \ndoi:10.1017/S0269888905000408 (https://doi.org/10.1017%2FS0269888905000408). \nS2CID 14987656 (https://api.semanticscholar.org/CorpusID:14987656). ", + "page_start": 60, + "page_end": 60, + "source_file": "wikipedia3.pdf" + }, + { + "text": "trained to) directly publish themselves online, in ways that would allow everybody, not just \n\nGroupon, to present the deals to customers in ways more profitable for merchants? The point is, \n\nhow many merchants, merchant associations and majors (whose budgets always and immediately \n\n*26/34*\n\n*Copyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)*", + "page_start": 25, + "page_end": 25, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "Newell, Allen; Simon, H. A. (1976). \"Computer Science as Empirical Inquiry: Symbols and \n\nSearch\" (https://doi.org/10.1145%2F360018.360022).*Communications of the ACM*.**19**(3): \n113–126. doi:10.1145/360018.360022 (https://doi.org/10.1145%2F360018.360022). \n\nNicas, Jack (7 February 2018). \"How YouTube Drives People to the Internet's Darkest Corners\" \n(https://www.wsj.com/articles/how-youtube-drives-viewers-to-the-internets-darkest-corners-1 \n518020478).*The Wall Street Journal*. ISSN 0099-9660 (https://search.worldcat.org/issn/009 \n9-9660). Archived (https://web.archive.org/web/20241005171230/https://www.wsj.com/articl \nes/how-youtube-drives-viewers-to-the-internets-darkest-corners-1518020478) from the \noriginal on 5 October 2024. Retrieved 16 June 2018. \n\nNilsson, Nils (1983). \"Artificial Intelligence Prepares for 2001\" (https://ai.stanford.edu/~nilsson/O ", + "page_start": 61, + "page_end": 61, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Norton & Company. ISBN 978-0-3938-6833-3. OCLC 1233266753 (https://search.worldcat.o \nrg/oclc/1233266753). \n\nCiresan, D.; Meier, U.; Schmidhuber, J. (2012). \"Multi-column deep neural networks for image \nclassification\".*2012 IEEE Conference on Computer Vision and Pattern Recognition*. \npp. 3642–3649. arXiv:1202.2745 (https://arxiv.org/abs/1202.2745). \ndoi:10.1109/cvpr.2012.6248110 (https://doi.org/10.1109%2Fcvpr.2012.6248110). ISBN 978- \n1-4673-1228-8. S2CID 2161592 (https://api.semanticscholar.org/CorpusID:2161592). \n\nClark, Jack (2015b). \"Why 2015 Was a Breakthrough Year in Artificial Intelligence\" (https://www. \nbloomberg.com/news/articles/2015-12-08/why-2015-was-a-breakthrough-year-in-artificial-int \nelligence).*Bloomberg.com*. Archived (https://web.archive.org/web/20161123053855/https:// \nwww.bloomberg.com/news/articles/2015-12-08/why-2015-was-a-breakthrough-year-in-artific \nial-intelligence) from the original on 23 November 2016. Retrieved 23 November 2016. ", + "page_start": 54, + "page_end": 54, + "source_file": "wikipedia3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Year ending December 31,[ m thousomels ]2001
S1.4792002
4.10820037.860
200 +8.7712005
7.5 ± 120061.01 +
2007 and thereafter16.162Total
S46.935
", + "page_start": 39, + "page_end": 39, + "source_file": "NASDAQ_EEFT_2000.pdf" + } + ] + }, + { + "references": { + "source_file": "infographic3.pdf", + "query": "For what reason a researcher's name is not a good tools to track back its works and affiliations ?", + "target_page": 1, + "target_passage": "Many people have the same name Names may change through marriage or other circumstances Individuals use different alphabets, abbreviations, or naming conventions People use different versions of their name during their career", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Names may**\n**change through**\n**marriage or other**\n**circumstances**\n\n**Connects individuals and**\n**their professional**\n**contributions across**\n**disciplines,**\n**organizations, and time**\nMany people have \nthe same name People use different versions of \ntheir name during their career \n\n\"Having ORCID iDs for most of our researchers has helped in providing \nauthoritative accounts in our various databases, ensuring accuracy in \nreviewer identities, and helping editors find reviewers and check expertise.\" **Individuals use different alphabets,**\n**abbreviations, or naming conventions**\n**Helps research institutions, funders,**\n**publishers, and other organizations**\n**better track and support research work** **—Brooks Hanson, Executive Vice President, Science, American Geophysical Union**\n\n**Researchers are mobile!**\n\nFor example, \n**30% OF THE SCIENTISTS WHO GOT**\n**THEIR PhD IN THE UNITED**\n**KINGDOM NOW LIVE ELSEWHERE**\n**How Organizations and**\n**Researchers Benefit**\n\n**How ORCID Works**\n\n**It's a registry of unique persistent**\n**identifiers for researchers**\nSource: Science Magazine \n\n**RESEARCHERS**\nImprove recognition and \ndiscoverability of their \nresearch \n\n**It's a hub that connects researchers with their**\n**professional activities and contributions**\nResearch institutions and organizations therefore find it hard to \n\n**It's a global community that enables**\n**researchers to share their data with other**\n**individuals, organizations, and systems**\n**Benchmark their organization**\n**against others**", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "**An IDC Infographic, sponsored by ORCID | November 2018**\n\n**The Value of Using Unique Identifiers for Researchers**\n\n**Evidence of Institutional Value**\n**What’s in a Name?**\n**Most names are not unique**\n**Tackling Information Overload**\nExamples of time/staff savings achieved by implementing ORCID from around the world \n\nORCID is a non-profit organization, which provides a fully open and interoperable \nidentifier to reliably connect researchers with their research contributions. The \nORCID iD is a 16-digit identifier that researchers can register for and use for free. \n\n**UK:**0.2 – 0.4 FTEs per institution1 \n**Portugal:**100,000 researcher hours per year2 \n**Australia:**15-30 minutes per grant application3 \n\n**Enables recognition of**\n**all types of research**\n**contributions and**\n**innovation**\n**1. Jisc/ARMA Institutional ORCID Implementation and Cost Benefit Analysis Report 2015**\n**2. Cátia Laranjeira, FCT - Fundação para a Ciência e a Tecnologia 2017**\n**3. Australian Research Council governance meeting, September 2018**", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "As a part of careful data collection practices, researchers must \nadopt frameworks such as [13, 52, 86] to describe the uses for which \ntheir models are suited and benchmark evaluations for a variety of \nconditions. This involves providing thorough documentation on the \ndata used in model building, including the motivations underlying \ndata selection and collection processes. This documentation should \nreflect and indicate researchers’ goals, values, and motivations in \nassembling data and creating a given model. It should also make \nnote of potential users and stakeholders, particularly those that \nstand to be negatively impacted by model errors or misuse. We note \nthat just because a model might have many different applications \ndoesn’t mean that its developers don’t need to consider stakeholders. \nAn exploration of stakeholders for likely use cases can still be \ninformative around potential risks, even when there is no way to \nguarantee that all use cases can be explored. \n\nWe also advocate for a re-alignment of research goals: Where \nmuch effort has been allocated to making models (and their training \ndata) bigger and to achieving ever higher scores on leaderboards \noften featuring artificial tasks, we believe there is more to be gained \nby focusing on understanding how machines are achieving the \ntasks in question and how they will form part of socio-technical \nsystems. To that end, LM development may benefit from guided \nevaluation exercises such as pre-mortems [68]. Frequently used in \nbusiness settings before the deployment of new products or projects, \npre-mortem analyses center hypothetical failures and ask team \nmembers to reverse engineer previously unanticipated causes.25 \nCritically, pre-mortem analyses prompt team members to consider \nnot only a range of potential known and unknown project risks, but \nalso alternatives to current project plans. In this way, researchers \ncan consider the risks and limitations of their LMs in a guided \nway while also considering fixes to current designs or alternative ", + "page_start": 8, + "page_end": 8, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "**INSTITUTIONS**\n\nSave time and reduce errors \nwith automated \ninformation-sharing and \ncross-system interoperability \n\nSpend more time doing \nresearch, less time managing it \n\n**Identify, track, and report on**\n**researchers’ affiliations and**\n**contributions (publications, peer**\n**reviews, grants, and more)**\nManage your organization \nname and your researchers' \nconnections with it \n\nControl and manage a trusted \nand easily shareable record of \ntheir research activities and \naffiliations – for free \n**Why Connect with ORCID?**\n**Hundreds of members and systems use ORCID globally** Maintain links with your \nresearchers - past, \npresent, and future \n\n**Institutions Face a Rising**\n**Tide of Research**\n**5.5 MILLION+**\n**live ORCID iDs registered since its 2012 launch**\n\n**OVER 3 MILLION**\n**Three Ways to Get Involved**\n**scholarly articles published per year**\nSource: The STM Report, October 2018 \n\n**1. Encourage and support your researchers in getting, sharing, and**\n**using their ORCID iD**\n**2. Invest in integrating ORCID into your systems**\n**3. Connect data to and from your researchers’ ORCID records to**\n**support information use and reuse across organizations**", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "There are advantages and disadvantages to both options and there are options in between such as using \nboth user supplied names for IRIs and using rdfs:label for more intuitive names. The details can get \ncomplicated and there also isn’t universal agreement within the community as to which is generally \nbetter. For your first ontology and since you will be using SPARQL I chose to use user supplied entity \nnames because it is the simpler option and is especially better for SPARQL queries as you will see in the ", + "page_start": 60, + "page_end": 60, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "1. Most Open Data have nothing personal to begin with (examples: digital maps, budgets, air \n\npollution measurements....) \n\n2. The majority of data that are directly related to individuals (e.g. things like names and \n\naddress of people with specific diseases, or who were victims of some crime) have no reason \n\nto be published,**nor there is any actual demand for them by Open Data advocates**\n\n3. Exceptions that limit privacy for specific cases and categories of people (e.g. candidates to \n\npublic offices, Government and Parliament members etc...) already exist in many countries \n\n4. Very often, in practice, Open Data struggles only happen about*when and how*to make \n\navailable in the most effective way for society information that was*already*recognized as \n\npublic.*What*to declare public, hence open, is indeed a serious issue (more on this in the next \n\nparagraph) but is a separate one. ", + "page_start": 22, + "page_end": 22, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": " ?customer ?relation ?relatedToCustomer.} \n\nThis would be much less intuitive than the user defined names. There are good reasons to use auto- \ngenerated names, especially for large ontologies that are implemented in multiple natural languages. \nHowever, for new users, especially those who plan to use SPARQL and SHACL, I think it is more \nintuitive to start with user supplied names and then progress to auto-generated names if and when the \nrequirements show a true need for them. This approach to developing software incrementally rather than \nto attempt to design the perfect system that can scale for all possible future requirements is known as the \nAgile approach to software development. In my experience Agile methods have proven themselves in \ncountless real-world projects to deliver better software on time and on budget than the alternative \nwaterfall approach. For more on Agile methods see: https://www.agilealliance.org/agile101/ \n\nThis just gives you a basic overview of some of the things that can be done with SPARQL. There is a lot \nmore and if you are interested you should check out DuCharme’s book or some of the many SPARQL \ntools and tutorials on the web. Some of these are in the bibliography. ", + "page_start": 71, + "page_end": 71, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": " See supra note 22*.*See also Jonathan Band,*Copyright Implications of the Relationship between*\n\n22 \n*Generative Artificial Intelligence and Text and Data Mining | Infojustice*. infojustice.org/archives/45509. In \naddition, for an in-depth look at the cross-border legal challenges involved see:*Wrapping up Our NEH-*\n*Funded Project to Help Text and Data Mining Researchers Navigate Cross-Border Legal and Ethical*\n*Issues*. 2 Oct. 2023, buildinglltdm.org/2023/10/02/wrapping-up-our-neh-funded-project-to-help-text-and- \ndata-mining-researchers-navigate-cross-border-legal-and-ethical-issues/. Accessed 20 Mar. 2024. ", + "page_start": 10, + "page_end": 10, + "source_file": "creative_common_ai.pdf" + }, + { + "text": " In this way, we do not use “commons” in the narrow sense of permissively licensed. What’s more, this \n4 \nresource could also be governed as more of a data “trust,” and, indeed, we discuss extensively the work \nof HathiTrust as a relevant project in this domain. However, our use of the word “commons” is not \nmeant to preclude this or other arrangements. \n\n There are, of course, a range of other types of texts that are not on the web and/or not digital at all - \n5 \ne.g., periodicals, journals, government documents. These are out of scope for this paper, but also worthy \nof further analysis. ", + "page_start": 2, + "page_end": 2, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "**4.3. Keep past and future separate**\nFor the same reason why it is important to always distinguishes between political and economical \n\nadvantages (or disadvantages) of Open Data, it is necessary to keep decisions about*future*data \n\n(those that will arrive in the future, due to new contracts, public services and so on) separate from \n\nthose about data that already exist. At the end of 2010, T. Steinberg wrote that the idea that \n\nGovernment should publish everything non-private it can**now**is \"rather dangerous\", and that it \n\nwould be much better to release nothing until someone actually asked for it, and at that point doing \n\nit right, that is with an open license and so on. The first reasons for Steinberg's concern is that \n\nasking for everything as soon as possible would*\"stress the system too much, by spreading thin the*\n\n*finite amount of good will, money and political capital\"*. The second is that many existing old data \n\nand data archival systems are, in practice, so uninteresting that it wouldn't make sense to spend \n\nresources in opening them. \n\nEven if these concerns were always true, it is important to realize that they apply (especially the \n\nsecond) to already existing data, not to future ones. The two classes of data have, or can have, very ", + "page_start": 27, + "page_end": 27, + "source_file": "Open_Data_Report.pdf" + } + ] + }, + { + "references": { + "source_file": "infographic3.pdf", + "query": "What is an ORCID iD ?", + "target_page": 1, + "target_passage": "ORCID iD is a 16-digit identifier that researchers can register for and use for free.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**An IDC Infographic, sponsored by ORCID | November 2018**\n\n**The Value of Using Unique Identifiers for Researchers**\n\n**Evidence of Institutional Value**\n**What’s in a Name?**\n**Most names are not unique**\n**Tackling Information Overload**\nExamples of time/staff savings achieved by implementing ORCID from around the world \n\nORCID is a non-profit organization, which provides a fully open and interoperable \nidentifier to reliably connect researchers with their research contributions. The \nORCID iD is a 16-digit identifier that researchers can register for and use for free. \n\n**UK:**0.2 – 0.4 FTEs per institution1 \n**Portugal:**100,000 researcher hours per year2 \n**Australia:**15-30 minutes per grant application3 \n\n**Enables recognition of**\n**all types of research**\n**contributions and**\n**innovation**\n**1. Jisc/ARMA Institutional ORCID Implementation and Cost Benefit Analysis Report 2015**\n**2. Cátia Laranjeira, FCT - Fundação para a Ciência e a Tecnologia 2017**\n**3. Australian Research Council governance meeting, September 2018**", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "**3.7 ORCID iDs created**\n**every minute**\n\n**193 different languages**\n**included in ORCID records**\n\n**73.6% of records have**\n**granted update permissions**\n\n**1.97 record updates**\n**made per second**", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "**Connections to ORCID records**\n6M \n5M \n4M \n3M \n2M \n1M \n\n2012 2013 2014 2015 2016 2017 2018 \n\n■**Live ORCID iDs**\n■**w/at least 1 education** ■**w/at least 1 employee**\n■**w/at least 1 work**\nSource: Orcid.org/statistics as of November 2018 ", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "**INSTITUTIONS**\n\nSave time and reduce errors \nwith automated \ninformation-sharing and \ncross-system interoperability \n\nSpend more time doing \nresearch, less time managing it \n\n**Identify, track, and report on**\n**researchers’ affiliations and**\n**contributions (publications, peer**\n**reviews, grants, and more)**\nManage your organization \nname and your researchers' \nconnections with it \n\nControl and manage a trusted \nand easily shareable record of \ntheir research activities and \naffiliations – for free \n**Why Connect with ORCID?**\n**Hundreds of members and systems use ORCID globally** Maintain links with your \nresearchers - past, \npresent, and future \n\n**Institutions Face a Rising**\n**Tide of Research**\n**5.5 MILLION+**\n**live ORCID iDs registered since its 2012 launch**\n\n**OVER 3 MILLION**\n**Three Ways to Get Involved**\n**scholarly articles published per year**\nSource: The STM Report, October 2018 \n\n**1. Encourage and support your researchers in getting, sharing, and**\n**using their ORCID iD**\n**2. Invest in integrating ORCID into your systems**\n**3. Connect data to and from your researchers’ ORCID records to**\n**support information use and reuse across organizations**", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "\n\nF”&%iD ", + "page_start": 339, + "page_end": 339, + "source_file": "00-80T-80.pdf" + }, + { + "text": "**Names may**\n**change through**\n**marriage or other**\n**circumstances**\n\n**Connects individuals and**\n**their professional**\n**contributions across**\n**disciplines,**\n**organizations, and time**\nMany people have \nthe same name People use different versions of \ntheir name during their career \n\n\"Having ORCID iDs for most of our researchers has helped in providing \nauthoritative accounts in our various databases, ensuring accuracy in \nreviewer identities, and helping editors find reviewers and check expertise.\" **Individuals use different alphabets,**\n**abbreviations, or naming conventions**\n**Helps research institutions, funders,**\n**publishers, and other organizations**\n**better track and support research work** **—Brooks Hanson, Executive Vice President, Science, American Geophysical Union**\n\n**Researchers are mobile!**\n\nFor example, \n**30% OF THE SCIENTISTS WHO GOT**\n**THEIR PhD IN THE UNITED**\n**KINGDOM NOW LIVE ELSEWHERE**\n**How Organizations and**\n**Researchers Benefit**\n\n**How ORCID Works**\n\n**It's a registry of unique persistent**\n**identifiers for researchers**\nSource: Science Magazine \n\n**RESEARCHERS**\nImprove recognition and \ndiscoverability of their \nresearch \n\n**It's a hub that connects researchers with their**\n**professional activities and contributions**\nResearch institutions and organizations therefore find it hard to \n\n**It's a global community that enables**\n**researchers to share their data with other**\n**individuals, organizations, and systems**\n**Benchmark their organization**\n**against others**", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + }, + { + "text": "Figure 7-22 Custom volume creation – General pane \n\nThis pane gives the following options: \n\n(cid:2) Format volume: Controls whether the volume is formatted before being made available; \ndefaults to Enabled. \n\n(cid:2) Cache mode: Controls volume caching; defaults to Enabled. Other available options are \nRead-only and Disabled. \n\n(cid:2) OpenVMS UDID: Each OpenVMS Fibre Channel-attached volume requires a user-defined \nidentifier or unit device identifier (UDID). A UDID is a nonnegative integer that is used in \nthe creation of the OpenVMS device name. ", + "page_start": 290, + "page_end": 290, + "source_file": "sg247938.pdf" + }, + { + "text": "**Application Group Identifier and the Application Group ID**\nThe Application Group Identifier and the Application Group ID (AGID) are unique identifiers \nthat are used by Content Manager OnDemand to identify the application group in system \ntables. \n\n**Migrate Data from Cache**\nThe Migrate Data from Cache value determines when documents and resources are migrated \nto archive storage. A storage set that is associated with a Tivoli Storage Manager client node \nmust be selected to enable migration to archive storage. \n\nThe following values are valid: \n\n(cid:2) No: Data is never migrated from cache. This option is unavailable when a storage set that \nis associated with a Tivoli Storage Manager client node is selected for the application \ngroup. \n\n(cid:2) When data is loaded: Data is migrated to archive storage when the data is loaded into the \napplication group. \n\n(cid:2) Next cache migration: Data is migrated to archive storage the next time that**ARSMAINT**is \nrun with the**-m**option. The**-m**option indicates that data and resources are copied from \ncache to archive storage. \n\n(cid:2) After__days in cache: This value specifies the number of days that data remains in cache \nstorage. After the prescribed number of days in cache storage are reached, the data is \ncopied to archive storage the next time that**ARSMAINT**is run with the**-m**option for data \nmigration. ", + "page_start": 127, + "page_end": 127, + "source_file": "sg246915.pdf" + }, + { + "text": "*Figure 14-6 Adding a recipient list*\n\n**14.2.3 Adding a report ID**\n\nThe next step is to define the reports to ODF. The report ID identifies the application group \nand application to which the report belongs. Figure 14-7 shows the window where you add \nthe report ID. ", + "page_start": 345, + "page_end": 345, + "source_file": "sg246915.pdf" + }, + { + "text": "**Event ID**\nAn event ID is a value that is used to identify a unique error condition that was detected by the \nStorwize V7000. An event ID is used internally in the cluster to identify the error. \n\n**Excluded condition**\nThe excluded condition is a status condition. It describes an MDisk that the IBM Storwize \nV7000 decided is no longer sufficiently reliable to be managed by the cluster. The user must \nissue a command to include the MDisk in the cluster-managed storage. \n\n**Extent**\nAn extent is a fixed-size unit of data that is used to manage the mapping of data between \nMDisks and volumes. The size of the extent can range 16 MB - 8 GB. \n\n**External storage**\nExternal storage refers to MDisks that are SCSI logical units that are presented by storage \nsystems that are attached to and managed by the clustered system. \n\n**Failback**\nFailback is the restoration of an appliance to its initial configuration after the detection and \nrepair of a failed network or component. \n\n**Failover**\nFailover is an automatic operation that switches to a redundant or standby system or node in \na software, hardware, or network interruption. See also Failback. ", + "page_start": 797, + "page_end": 797, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2669.pdf", + "query": "What type of instability causes rims in ruptured polystyrene thin films to decay into small drops ?", + "target_page": 3, + "target_passage": " The rims may further decay into lines of small drops due to a Rayleigh-type instability", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "The patterns formed in dewetting processes have attracted strong interest since Reiter analysed the \n\nprocess quantitatively in the early nineties. In these experiments, that proved to be a paradigm in \n\nour understanding of dewetting, a uniform thin film of polystyrene (tens of nanometers thick) is \n\ndeposited on a flat silicon oxide substrate is brought above the glass transition temperature. The \n\nfilm ruptures in several places, forming holes which subsequently grow, competing for space. As a \n\nresult, a random polygonal network of liquid rims emerges. The rims may further decay into lines \n\nof small drops due to a Rayleigh-type instability [1–3]. The related problems of retracting contact \n\nlines on partially wetting substrates and the opening of single holes in rather thick films have also \n\nbeen studied [4, 5]. \n\nSubsequent work has mainly focused on many different aspects of the dewetting process for simple \n\nnon-volatile liquids and polymers (for reviews see Refs. [6–8]). All stages of the dewetting of a \n\nfilm are studied: the initial film rupture via nucleation or a surface instability (called spinodal \n\ndewetting) [1, 9–13], the growth process of individual holes [14–16], the evolution of the resulting ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2669.pdf" + }, + { + "text": "[1] G. Reiter, “Dewetting of thin polymer films,” Phys. Rev. Lett. 68, 75–78 (1992). \n\n[2] G. Reiter, “Mobility of polymers in films thinner than their unperturbed size,” Europhys. Lett. 23, \n\n579–584 (1993). \n\n[3] A. Sharma and G. Reiter, “Instability of thin polymer films on coated substrates: Rupture, dewetting \n\nand drop formation,” J. Colloid Interface Sci. 178, 383–399 (1996). \n\n[4] P.-G. de Gennes, “Wetting: Statics and dynamics,” Rev. Mod. Phys. 57, 827–863 (1985). ", + "page_start": 24, + "page_end": 24, + "source_file": "1001.2669.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
S. H. Lee, P. 1. Yoo, S. J. Ksvon, and H. H. Lee, “ Solvent - driven dewetting and rim instability,” I.Chem. Phys. 121.4346 – 4351 ( 2004 ).
[ 52 ] L. Xia, T. F. Shi, P. K. Duta, and L. An, ‘ Rim instability by solvent - induced deverting ’. I. Chem. Phys. IZ?, 144704 ( 2007 ).[ 53 ] L. Xia, T. F. Shi, and L. 1 Aax, “ The devetiing dynamics of the polymer thin film by solvent ameale ung ”, I Chens. Phys. I29 ( 44904 ( 2008 ).
[ 54 ] M. Elbaum and S. G. Lipson, “ How does a thin weted lifn dry up ” Phys. Rev. Lett. 72.562 – 3565 ( 1994 ).[ 55 ] N. Samidered, S. G. Lipson, and D. S. Tannhauser, “ Pattern formation in drying water filtes.” Phys. Rev. E. SP, 2906 – 2913 ( 1998 ).
[ 56 ] A. Padmakar, K. Kargupta, and A. Sharma, “ Instability and devetting of exaporating thin water films on partially and completely wertable substrates.” I. Chem. Phys. I188.1735 – 1744 ( 1999 ).[ 57 ] A, V, Lysohin, A, Golovin, and L, M. Pismen, “ Fingering instability of thin evaponating liquid thims,” Phys. Rev, E6K, ( 221602 - 2002 ).
[ 58 ] L. M. Pismen, “ Spinodal devetting in a volatile liquid film,” Phys. Rev. E78.021601 ( 2004 ).[ 59 ] C. Pouland, O. Benichoa, and A. M. Carabat, “ Freely receifing evaporating droplets,” Langmuir B. 8825 – 8834 ( 2003 ).
( 60 ) Y. Gotkis, I. Ivasov, N. Murisic, and L. Kondic, “ Dynamic structure formation at the fronts of volatile faquid drops,” Phys. Rer. Lett. 97.186101 ( 2006 ).( 61 ) E. Paniliae Vasijour and P. Moriary, “ Meniscus - mediated organization of colloidal nanoparticles.” J. Phys. Chem. C IH, 16255 – 16268 ( 207 ).
( 2 ) C : Gigastic K. Dabosk - Veress, and J. R. Docher, “ Changes in the norphology of self - usembled polystyreme microphere monolayers produced by ameading.” I Colloid Interface Sci, 240.14 – 155 ( 2001 ).( 63 ) A. Onn, S. H. Davis, and S. G. Bankoff, “ Long - scale evolution of thin liquid films,” Rev. Mod. Phys. 69 ( 931 – 980 ( 1997 ).
[ 64 ] U. Thiele, “ Thin film evolution equations from ( exporating ) deveting liquid layers to epitaxial growth,” 1 Phys.- Cond. Mat ( 2010 ), ( at press ).
", + "page_start": 28, + "page_end": 28, + "source_file": "1001.2669.pdf" + }, + { + "text": "particles may at times play a rather more significant role. When the diffusion of the particles is \n\nslow, the evaporative dewetting fronts become transversely unstable and may result in strongly \n\nramified patterns. This instability is caused by the nanoparticles. The lower their mobility, the \n\nstronger the fingering effect, i.e., there are more fingers in (c) than in (d) because in the latter the \n\nmobility is larger. \n\nThe front instability is intriguing as it results in strongly branched structures. As the dewetting \n\nfront moves, new branches are continuously created and existing branches merge at the moving \n\ncontact line. However, the mean finger number in the streamwise direction of the resulting ramified \n\npattern is a constant. This behaviour is in contrast to the front instabilities found for dewetting ", + "page_start": 9, + "page_end": 9, + "source_file": "1001.2669.pdf" + }, + { + "text": "[97] U. Thiele, M. G. Velarde, K. Neuffer, and Y. Pomeau, “Film rupture in the diffuse interface model \n\ncoupled to hydrodynamics,” Phys. Rev. E 64, 031602 (2001). \n\n[98] J. Heier, J. Groenewold, F. A. Castro, F. Nueesch, and R. Hany, “Enlarged bilayer interfaces from \n\nliquid-liquid dewetting for photovoltaic applications,” P Soc Photo-Opt Instrum Eng 6999, J9991– \n\nJ9991 (2008). \n\n[99] M. D. Haw, M. Gillie, and W. C. K. Poon, “Effects of phase behavior on the drying of colloidal \n\nsuspensions,” Langmuir 18, 1626–1633 (2002). \n\n[100] L. V. Govor, J. Parisi, G. H. Bauer, and G. Reiter, “Instability and droplet formation in evaporating \n\nthin films of a binary solution,” Phys. Rev. E 71, 051603 (2005). ", + "page_start": 31, + "page_end": 31, + "source_file": "1001.2669.pdf" + }, + { + "text": "ence of the phase behaviour on the drying of droplets of a suspension of hard-sphere colloidal \n\nparticles and non-adsorbing polymer [99], of the instabilities and the formation of drops in evap- \n\norating thin films of binary solutions [100] that may lead to treelike patterns [101], of effects of \n\na secondary phase separation on evaporation-induced pattern formation in polymer films [102], \n\nand of the influence of an imposed flow on decomposition and deposition processes in a sliding \n\nridge of evaporating solution of a binary polymer mixture [103] and of the influence of rather ", + "page_start": 23, + "page_end": 23, + "source_file": "1001.2669.pdf" + }, + { + "text": "the moving contact line has also been reported [50]. Droplet patterns may as well be created em- \n\nploying solvent-induced dewetting of glassy polymer layers below the glass transition temperature \n\n[51–53]. \n\nNote that the dewetting of pure volatile liquids has also been studied experimentally [54] and \n\ntheoretically [55–58]. In this case, different contact line instabilities have been observed for evap- \n\norating liquid drops [59, 60]. \n\nIn the present article we review and preview the experiments and in particular the various mod- \n\nelling approaches for dewetting suspensions of (nano-)particles in volatile partially wetting sol- \n\nvents. After reviewing the basic experimental results in Section II, we discuss in Section III sev- \n\neral theoretical approaches. In particular, we present a kinetic Monte Carlo model in Section III A, \n\na dynamic density functional theory in Section III B, and a thin film evolution equation in Sec- \n\ntion III C. Finally, we conclude in Section IV by discussing advantages and shortcomings of the \n\nindividual approaches and future challenges to all of them. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2669.pdf" + }, + { + "text": "small holes. The competition for space results in a fine-meshed polygonal network of nanoparticle \n\ndeposits. The concentration of particles is much higher at the network nodes – an effect that can \n\nnot been seen within the KMC model. As the particles attract the liquid there remains some liquid \n\non the substrate where the nanoparticles are. \n\nFig. 5 gives snapshots of the evolution of a fingering instability for a retracting dewetting front. \n\nAt early times the straight front shows a rather short-wave instability, about 16 wiggles can be \n\nseen. However, they are only a transient: the finger pattern coarsens rapidly till only about 7 \n\nfingers remain. The fingering then becomes stationary, i.e., just as in the KMC, the mean finger \n\nnumber remains constant, although new branches are continuously created and old branches join \n\neach other. In general, the results on fingering agree well with results obtained using the KMC \n\nmodel [41]. From this we conclude that jamming of discrete particles is not a necessary factor \n\nfor causing the instability, since the fingering is seen here in a continuum model with a diffusion ", + "page_start": 17, + "page_end": 17, + "source_file": "1001.2669.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
[ 7 ] R. Seemann, S. Herminghans, C. Nets, S. Schlagowski, D. Podzimek, R. Kourad, H. Mantz, and K. Iacobs, “ Dysamics and structure formation in thin polymer melt films,” 1. Phys.- Condex. Matter[ 8 ] U. Thiele, “ Structure formation in thin kiquid films,” in S. Kalfudasis and U. Thiele, editors, “ Thin films of Soft Matter,” pages 25 – 93, Springer, Wien ( 2007 ).
[ 9 ] R. Xie. A. Karim, J. F. Ibuglas, C. C. C. C. Hun, and R. A. Weiss, “ Spinodal deverting of thin polymer films.” Phys. Rev. Lett. 8l, 1251 – 1254 ( 198 ).[ 10 ] R. Seenam, S. Herninghass, and K. facobs, “ Deveting patterns and nolecular forces : A mconcilizin, iniot,” Phys, Rev, Lett. 86.5534 – 5537 – 2001.
[ 11 ] U. Thirde. M. G. Velande, and K. Neufee, “ Deverting : Film rupture by nucleation in the spinodal regime,” Phys. Rev. Let. ( 016104 ( 2001 ).[ 12 ] M. Resitborn and K. Neuflex, “ Sarface patterns of laterally extended thin liquid tilms in three dimensions,” Phys. Rev. Lett. 8 ”, 046101 ( 2011 ).
[ 13 ] 1 Becker, G. Grin, R. Seeman, H. Maniz, K. Jacobs, K. Mexke, and R. Blossey, “ Complex deveting scenarios captured by this - tim models.” Nat. Mater 2.59 – 63 ( 2003 ).[ 14 ] C Redon, F. Brochard - Wurt, and F. Rondelez, “ Tronamics of deveting ” Phys. Rev. Lett. 66.715 – 718 ( 1991 ).
[ 15 ] R. Seeman, S. Herminghaus, and K. Jacobs, “ Shape of a liquid front upon develop.” Phys. Rev. Let. 8 ”, 196101 ( 2011 ).[ 10 ] R. Fetzer, K. Jaobs, A. Minch. B. Wagner, and T. P. Witebik, ‘ New slip regimes and the shape of deveting thin liquid films.’ Phys. Rev. Lett. MS, 127801 ( 2305 ).
[ 17 ] F. Brochan - Wyart and C. Redon, “ Dynamics of liquid rim instabilities,” Langmin K, 2124 – 233 ( 1992 ).[ 18 ] G, Reiter and A. Sharma, “ Auto - optimization of deweting rates by rin instabilities in slipping polymer films ” Phys. Rev. Lett. 8 ”, 166103 ( 2001 ).
[ 19 ] A. Minch and B. Wagner, ‘ Contact - line instability of dewetting thin films ’, ‘ Physica DB9.178 – 198 c2005 ).
", + "page_start": 25, + "page_end": 25, + "source_file": "1001.2669.pdf" + }, + { + "text": "[5] F. Brochard-Wyart and J. Daillant, “Drying of solids wetted by thin liquid films,” Can. J. Phys. 68, \n\n1084–1088 (1989). \n\n[6] P. M¨uller-Buschbaum, “Dewetting and pattern formation in thin polymer films as investigated in real ", + "page_start": 25, + "page_end": 25, + "source_file": "1001.2669.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2669.pdf", + "query": "Concerning the dewetting of nanoparticle solutions, how does the concentration of nanoparticle affect the main finger's width ?", + "target_page": 12, + "target_passage": "A quantitative analysis shows that the mean number of fingers depends only very weakly on the av- erage concentration of the nanoparticles ; only the mean finger width increases with increasing concentration", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "circular throughout the dewetting and evaporation process. In this case one should interprete the \n\ncoordinate x as the distance from the centre of the circular film. \n\nWe start with a film of height h0 of finite length sitting on a precursor film and assume that the film \n\ncontains nanoparticles at constant concentration φ0. The chosen parameter values ensure that the \n\nfilm of thickness h0 is linearly stable. As we do not incorporate noise, no nucleation of additional \n\nholes can occur (even with noise the probability would be extremely low). Without evaporation the \n\nfilm dewets ‘classically’ by a retraction of the initially step-like front. After a short time, surface \n\ntension smoothes the profile of the receding front and a capillary rim forms that collects all the ", + "page_start": 19, + "page_end": 19, + "source_file": "1001.2669.pdf" + }, + { + "text": "FIG. 7: (Colour online) A sequence of profiles during a dewetting process with competing evaporation and \n\nconvection that leads to the dried-in ring structure of nanoparticles displayed in Fig. 6(b). Profiles are at (a) \n\nbefore pinning (t = 0.08T ), (b) at self-pinning (t = 0.13T ), and (c) after depinning (t = 0.29T ), where \n\nT = 3 × 1010τ with τ = η0γH/κ2 (T is of order of 1s). The film thickness profiles h are the bold solid \n\nlines, the nanoparticle concentrations φ are the dotted lines and the nanoparticle layer height hp = hφ are \n\nthe dashed lines. The remaining parameters and scalings are as in Fig. 6(b). ", + "page_start": 21, + "page_end": 21, + "source_file": "1001.2669.pdf" + }, + { + "text": "only results in the small heap of material visible at the left hand side of Fig. 6(a). The decrease \n\nin hp on the right side of Fig. 6(a) arises due to the diffusion of particles to the right of the initial \n\nfront position; (ii) for very low evaporation rates, the film dynamics is dominated by convective \n\ndewetting as this process acts on a much shorter time scale than evaporation. As a result, all the \n\nliquid is collected into a drop before evaporation slowly removes the remaining solvent. Under \n\nthese conditions most of the nanoparticles are deposited in a single heap (see Fig. 6(c)). Depending \n\non the diffusivity, the heap might be highest at the centre or show a depression there; (iii) at \n\nintermediate evaporation rates, one may observe the deposition of a nanoparticle ring around a \n\nregion with a nanoparticle film of much lower height. At the centre deposition might increase \n\nagain (see Fig. 6(b)). \n\nThe most intriguing feature is the ring formation that has been observed experimentally for sus- \n\npensions of very different particle sizes ranging from nanometers [32, 36, 46, 47] to hundreds of ", + "page_start": 20, + "page_end": 20, + "source_file": "1001.2669.pdf" + }, + { + "text": "FIG. 6: Profiles of the final dried-in nanoparticle layer for the dewetting of a suspension of nanoparticles \n\nin a volatile solvent that partially wets the substrate for (a) high (Ω = 10−3), (b) medium (Ω = 2 × 10−6) \n\nand (c) low (Ω = 0.78 × 10−8) evaporation rates, for the case when χ = H/l0 = 1.09, the lateral length \nscale is (cid:96) = (cid:112)γ/κH with κ = (Sp/l0) exp(d0/l0)H being an energy scale related to wettability and the \nvertical length scale is H = (cid:112)2SLW /κd0. The remaining dimensionless parameters are the evaporation \nnumber Ω = Qeη0(cid:96)2/H 3, the diffusion number Γ = D(0)η0/Hκ = 10−4 and the dimensionless chemical \n\npotential M = Hµ/κ = −0.0035. The system size is L = 19500(cid:96). Film thickness and hp in the plots are ", + "page_start": 19, + "page_end": 19, + "source_file": "1001.2669.pdf" + }, + { + "text": "is similar to the size of the nanoparticles. At a certain distance from the macroscopic front, the \n\nultrathin film starts to evolve a locally isotropic pattern of holes. The holes themselves grow in an \n\nunstable manner resulting in an array of isotropically branched structures as shown, e.g., above in \n\nFig. 1. This indicates that at least some of the patterns described in the literature may have arisen \n\nfrom processes in similar ultrathin ‘postcursor’ films. \n\nThe existence of the ultrathin ‘postcursor’ film is an experimental finding that can be drawn on \n\nwhen choosing a theoretical approach to account for the pattern formation (see below). Note how- \n\never, that at the moment there exists no explanation for its existence. A possible hypothesis is \n\nthat the substrate strongly attracts the nanoparticles. As a result they form a dense suspension \n\nlayer having a thickness roughly equal to the diameter of the nanoparticles. The observed meso- \n\nscopic dewetting front then actually correspond to an autophobic dewetting of a low concentration \n\nsuspension from the higher concentration suspension on the surface of the substrate. ", + "page_start": 6, + "page_end": 6, + "source_file": "1001.2669.pdf" + }, + { + "text": "particles may at times play a rather more significant role. When the diffusion of the particles is \n\nslow, the evaporative dewetting fronts become transversely unstable and may result in strongly \n\nramified patterns. This instability is caused by the nanoparticles. The lower their mobility, the \n\nstronger the fingering effect, i.e., there are more fingers in (c) than in (d) because in the latter the \n\nmobility is larger. \n\nThe front instability is intriguing as it results in strongly branched structures. As the dewetting \n\nfront moves, new branches are continuously created and existing branches merge at the moving \n\ncontact line. However, the mean finger number in the streamwise direction of the resulting ramified \n\npattern is a constant. This behaviour is in contrast to the front instabilities found for dewetting ", + "page_start": 9, + "page_end": 9, + "source_file": "1001.2669.pdf" + }, + { + "text": "ever, the theory is less suited to a description of the dewetting dynamics of the ultrathin postcursor \n\nfilm. \n\nThe dewetting of the ultrathin film of highly concentrated suspension may be described by a dis- \n\ncrete stochastic model such as, for instance, a kinetic Monte Carlo (KMC) model based solely on \n\nevaporation/condensation dynamics of the solvent and diffusion of the solute [35, 39, 41]. The va- \n\nlidity of this strong assumption regarding the relevant transport processes can be confirmed from \n\nan estimate based on Eq. (1): The pressure p = δF/δh drives convection and evaporation. The \n\nconvective mobility is proportional to h3, i.e., it is large for thick films but decreases strongly with \n\nreduced film thickness. The evaporative mobility, however, is a constant, implying that evapora- \n\ntion will dominate below a certain (cross-over) thickness. For the parameter values of Ref. [57] \n\nand a small contact angle (≈ 0.01), the cross-over thickness is in the range of 1-5 nanometers. \n\nThis estimate justifies the neglect of convective transport in a description of the postcursor film ", + "page_start": 7, + "page_end": 7, + "source_file": "1001.2669.pdf" + }, + { + "text": "for µ < −2 the film will dewet via a nucleation or spinodal-like process. If the nanoparticles are \n\npresent, they form dried-in structures when all the liquid evaporates. The final structures do not \n\nnormally change any further – at least on short time scales. However, if the liquid wets the particles \n\n(i.e. is attracted to the particles), over long times there might be a coarsening of the structures, \n\nfacilitated by the adsorbed liquid. The dried-in patterns depend on the particular pathway taken by \n\nthe evaporative dewetting process. They range from labyrinthine to polygonal network structures \n\nor holes in a dense particle layer. Some typical patterns are displayed in Fig. 2, for cases when \n\nthe average surface coverage of the nanoparticles ρav \n\nn = 0.2. Panels (a) and (b) result from a \nspinodal-like and nucleation and growth process, respectively. At first sight they look very similar \n\nto the patterns seen for the pure solvent and one might argue that the particles solely act as passive \n\ntracers and preserve the transient volatile dewetting structures of the solvent. This was suggested \n\nin Refs. [26–28] for dewetting collagen solutions. However, panels (c) and (d) indicate that the ", + "page_start": 9, + "page_end": 9, + "source_file": "1001.2669.pdf" + }, + { + "text": "This theory allows us to study the time evolution of the evaporating film of nanoparticle suspension \n\nwithout some of the restrictions of the kinetic Monte Carlo model. Here, however, we illustrate its \n\napplication in similar parameter regimes as used above for the KMC. We focus on two examples: \n\n(i) the spinodal dewetting of a initially flat film of nanoparticle suspension characterised by con- \n\nstant ρl and ρn (Fig. 4); and (ii) the retraction of a dewetting front that is unstable with respect to \n\na fingering instability (Fig. 5). \n\nFig. 4 presents two pairs of snapshots from a purely evaporative dewetting process deep inside the \n\nparameter region of the phase diagram where spinodal dewetting occurs. For small times the film \n\nbecomes unstable showing a typical spinodal labyrinthine pattern with a typical wavelength. The \n\nnanoparticles concentrate where the remaining liquid is situated. However, they are ‘slow’ in their \n\nreaction: when ρl already takes values in the range 0.08 – 0.83, the nanoparticle concentration \n\nhas only deviated by about 25% from its initial value. The film thins strongly forming many ", + "page_start": 16, + "page_end": 16, + "source_file": "1001.2669.pdf" + }, + { + "text": "FIG. 1: (Colour online) Images of strongly ramified dewetting structures obtained using Atomic Force \n\nMicroscopy in the case of (a) an aqueous collagen solution on graphite (courtesy of U. Thiele, M. Mertig \n\nand W. Pompe; see also Ref. [42]. Image size: 5µm×5µm); (b) poly(acrylic acid) in water spin-coated onto \n\na polystyrene substrate (reprinted with permission of John Wiley & Sons, Inc. from Ref. [23]; copyright \n\nJohn Wiley & Sons, Inc. 2002; Image size: 2.5µm×2.5µm); and in both (c) and (d), a solution of gold \n\nnanoparticles in toluene, spin-coated onto native oxide terminated silicon substrates (scale bars given in \n\npanels). In all the images the lighter areas correspond to the deposited solute and the dark areas to the \n\nempty substrate. ", + "page_start": 4, + "page_end": 4, + "source_file": "1001.2669.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2669.pdf", + "query": "Which of ultrathin film or mesoscale hydrodynamics are best explained by kinetic Monte Carlo models ? ", + "target_page": 18, + "target_passage": "lthough both the kinetic Monte Carlo model and the dynamical density functional theory are able to describe well the processes in the ultrathin film, they can not be employed to describe mesoscale hydrodynamics", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "The previous two sections focused on two approaches to describe the experimentally observed \n\npatterning dynamics in the ultrathin postcursor film left behind by a mesoscopic receding dewet- \n\nting front. Although both the kinetic Monte Carlo model and the dynamical density functional \n\ntheory are able to describe well the processes in the ultrathin film, they can not be employed to \n\ndescribe mesoscale hydrodynamics. A relatively simple model for the latter can be derived in the \n\nframework of a long-wave or lubrication equation [8, 63]. We will illustrate here the approach \n\nby considering an isothermal situation where the nanoparticles are not surface active, i.e., they do \n\nnot act as surfactants. For a model incorporating the effects of latent heat generation and surface- \n\n\n \n \n \n \n [html]\n
active particies residing in bermal and solutar Maragonistresies, seeker, [ My ]. A lescripton of spreading particle solutions incorporating a structural disjoining pressure has also been considered[ 89 ]. For related work on particle - laden film flow on an incline see Refs. [ 90.91 ].
One starts from the Stokes equations, together with continuity, no - slip boundary conditions at the
\n\n18 ", + "page_start": 17, + "page_end": 17, + "source_file": "1001.2669.pdf" + }, + { + "text": "We have discussed recent work on pattern formation processes in films and drops of evaporating \n\nsuspensions/solutions of polymers and particles. After reviewing experiments on suspensions of \n\nthiol-coated gold nanoparticles in toluene we have focused on the modelling of the transport and \n\nphase change processes involved. A theoretical approach to the modelling of the hydrodynamics \n\non the mesoscale has been described as well as more microscopic models for the dynamics in the \n\nobserved nanoscopic ‘postcursor’ film. In particular, we have introduced (i) a microscopic kinetic \n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film \n\nmodel. \n\nThe kinetic Monte Carlo model and the dynamical density functional theory can both be used to \n\ninvestigate and understand the formation of polygonal networks, spinodal and branched structures \n\nresulting from the dewetting of an ultrathin ‘postcursor’ film that remains behind the mesoscopic \n\ndewetting front. They are, however, not capable of describing the dynamical processes in a meso- ", + "page_start": 22, + "page_end": 22, + "source_file": "1001.2669.pdf" + }, + { + "text": "and may explain why one has such good agreement between the experimentally observed patterns \n\nand the patterns obtained from a purely two-dimensional (single layer) kinetic Monte Carlo model \n\n[35]. We introduce the KMC model below in Section III A. \n\nIn several respects, however, the kinetic Monte Carlo model is rather simplistic, limiting its po- \n\ntential applications. For instance, the thermodynamic chemical potential as well as any wetting \n\ninteraction of the solvent with the substrate are collected in a single parameter – an effective chem- \n\nical potential. This implies that any influence of a disjoining pressure is ‘smeared out’ over the \n\nwhole system and that no distinction between the short- and the long-range parts of the disjoining \n\npressure is possible. It is furthermore based on the assumption that evaporation/condensation is ", + "page_start": 7, + "page_end": 7, + "source_file": "1001.2669.pdf" + }, + { + "text": "The limitations of the kinetic Monte Carlo model introduced in the previous Section are related \n\nto its character as a two-dimensional lattice gas with only three states: gas, liquid or particle. \n\nThis implies that (i) no liquid can be transported to a site on the surface already filled with liquid, \n\ni.e., diffusion of the liquid can not be incorporated in a sensible way and (ii) one is not able to \n\ndistinguish between the influence of the short- and the long-range parts of the interactions with the \n\nsubstrate, as all such interactions are absorbed into the effective chemical potential. \n\nHowever, using dynamical density functional theory (DDFT) [78–83] one can develop a model \n\nfor the processes in the ultrathin postcursor film without these limitations, although here we limit \n\nourselves to developing the theory at the level of the KMC and solely discuss how to extend it to \n\nincorporate the influence of the liquid diffusion over the surface. Such a DDFT model describes \n\nthe coupled dynamics of the density fields of the liquid ρl and the nanoparticles ρn. The densities \n\nρl and ρn are defined as the probabilities of finding a given lattice site on the surface to be occupied ", + "page_start": 13, + "page_end": 13, + "source_file": "1001.2669.pdf" + }, + { + "text": "The kinetic Monte Carlo model for two-dimensional dewetting nanofluids [33] was first proposed \n\nin Ref. [35] and extended to include next-nearest neighbour interactions in [37]. The two key \n\nassumptions used are: (i) the relevant processes can be mapped on to a two-dimensional lattice \n\ngas model, thereby neglecting continuous changes in the thickness of the evaporating film, and (ii) \n\nall relevant dynamics results from diffusing nanoparticles and evaporating/condensing solvent. \n\nThe model builds on an Ising-type model for the liquid-gas phase transition. The surface is divided \n\nup into a regular array of lattice sites whose size is dictated by the nanoparticles. One then con- \n\nsiders each lattice site to be occupied either by a nanoparticle, liquid or vapour. This effectively \n\nmaps the system onto a two-dimensional two-component lattice gas having two fields n and l. The \n\nresulting three possible states of a cell are: liquid (l = 1, n = 0), nanoparticle (l = 0, n = 1), \n\nand vapour (l = 0, n = 0, i.e., cell empty). The energy of an overall configuration is given by the ", + "page_start": 8, + "page_end": 8, + "source_file": "1001.2669.pdf" + }, + { + "text": "ever, the theory is less suited to a description of the dewetting dynamics of the ultrathin postcursor \n\nfilm. \n\nThe dewetting of the ultrathin film of highly concentrated suspension may be described by a dis- \n\ncrete stochastic model such as, for instance, a kinetic Monte Carlo (KMC) model based solely on \n\nevaporation/condensation dynamics of the solvent and diffusion of the solute [35, 39, 41]. The va- \n\nlidity of this strong assumption regarding the relevant transport processes can be confirmed from \n\nan estimate based on Eq. (1): The pressure p = δF/δh drives convection and evaporation. The \n\nconvective mobility is proportional to h3, i.e., it is large for thick films but decreases strongly with \n\nreduced film thickness. The evaporative mobility, however, is a constant, implying that evapora- \n\ntion will dominate below a certain (cross-over) thickness. For the parameter values of Ref. [57] \n\nand a small contact angle (≈ 0.01), the cross-over thickness is in the range of 1-5 nanometers. \n\nThis estimate justifies the neglect of convective transport in a description of the postcursor film ", + "page_start": 7, + "page_end": 7, + "source_file": "1001.2669.pdf" + }, + { + "text": "short- and long-range interactions of solvent and/or solute with the substrate. We have, however, \n\nrestricted the examples given here to situations that can also be described using the KMC model. \n\nA further exploration will be presented elsewhere. \n\nFinally, we have discussed a simple thin film model for the hydrodynamics on the mesoscale. It \n\nresults from a long-wave approximation and consists of coupled evolution equations for the film \n\nthickness profile and the mean particle concentration. It has been used to discuss the self-pinning \n\nof receding contact lines that is related to the formation of rings of dried-in particles (coffee- \n\nstain effect) that frequently occurs when films or drops of solutions or suspensions dewet by the \n\ncombined effects of convection and evaporation. \n\nOne of the primary goals of researchers in this field, is the search for simple-to-use techniques \n\nthat allow one to produce hierarchically structured functional layers for a wide range of applica- \n\ntions such as, e.g., organic solar cells [98]. This means that the experiments advance very rapidly \n\ntowards increasingly complex systems. For example, there have been investigations of the influ- ", + "page_start": 23, + "page_end": 23, + "source_file": "1001.2669.pdf" + }, + { + "text": "Abstract \n\nWe review recent experiments on dewetting thin films of evaporating colloidal nanoparticle suspensions \n\n(nanofluids) and discuss several theoretical approaches to describe the ongoing processes including coupled \n\ntransport and phase changes. These approaches range from microscopic discrete stochastic theories to \n\nmesoscopic continuous deterministic descriptions. In particular, we focus on (i) a microscopic kinetic \n\nMonte Carlo model, (ii) a dynamical density functional theory and (iii) a hydrodynamic thin film model. \n\nModels (i) and (ii) are employed to discuss the formation of polygonal networks, spinodal and branched \n\nstructures resulting from the dewetting of an ultrathin ‘postcursor film’ that remains behind a mesoscopic \n\ndewetting front. We highlight, in particular, the presence of a transverse instability in the evaporative \n\ndewetting front which results in highly branched fingering structures. The subtle interplay of decomposition \n\nin the film and contact line motion is discussed. \n\nFinally, we discuss a simple thin film model (iii) of the hydrodynamics on the mesoscale. We employ \n\ncoupled evolution equations for the film thickness profile and mean particle concentration. The model is ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2669.pdf" + }, + { + "text": "time scales for evaporation and diffusion. A large mobility M indicates fast diffusion as compared \n\nto evaporation. A trial move is accepted with the probability pacc = min[1, exp(−∆E/kT )] where \n\nk is the Boltzmann constant, T the temperature and ∆E is the change in energy resulting from the \n\npotential move. Note that particles are only allowed to move into wet areas of the substrate, i.e., \n\nonto cells with l = 1. This models zero diffusivity of the particles on a dry substrate. The replaced \n\nliquid fills the site left by the nanoparticle. \n\nWithout nanoparticles, the behaviour of the model is well known as it reduces to the classical \n\ntwo-dimensional Ising model [74]. For kT < kTc ≈ 0.567 liquid and vapour coexist when µ = \n\nµcoex = −2. For µ > −2 [µ < −2] eventually the liquid [vapour] dominates. A straight liquid- \n\ngas interface will recede [advance] for µ < −2 [µ > −2], i.e. one finds evaporative dewetting \n\n[wetting] fronts. If one starts, however, with a substrate covered homogeneously by the liquid, ", + "page_start": 9, + "page_end": 9, + "source_file": "1001.2669.pdf" + }, + { + "text": "where γ is the liquid-gas surface tension and f (h) is a local free energy term that describes the \n\nwettability of the surface. Since µ corresponds to a chemical potential, the term µh may either bias \n\nthe system towards the liquid or towards the gas state. The variation of F w.r.t. h gives the pressure. \n\nIt contains the curvature (Laplace) pressure −γ∆h and the disjoining pressure Π(h) = −∂hf (h). \n\nMany different forms for the latter are in use (see, e.g., Refs. [4, 8, 63, 70–73]). \n\nFor the present system a thin film description using Eq. (1) is not appropriate because the nanopar- \n\nticles are not taken into account. However, under certain conditions one can augment equation (1) \n\nfor the evolution of the film thickness by coupling it to an equation for the evolution of the mean \n\nparticle concentration. The resulting model is able to describe the behaviour of an evaporating so- \n\nlution on the meso- and macroscale. Such an approach is briefly discussed below in Section III C. \n\nWe should expect such a model to describe the mesoscopic dewetting front discussed above. How- ", + "page_start": 7, + "page_end": 7, + "source_file": "1001.2669.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed9.pdf", + "query": "What is AgMERRA ?", + "target_page": 2, + "target_passage": " historical daily weather data (1986–2005) are from the AgMERRA dataset. AgMERRA is a post-processing of the NASA Modern-Era Retrospective Analysis for Research and Applications (MERRA) data. The dataset is proved to be suitable for agricultural modelling and features consistent, daily time-series data", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Materials and methods**\n**Data processing.**\nIn this study, historical daily weather data (1986–2005) are from the AgMERRA dataset. \nAgMERRA is a post-processing of the NASA Modern-Era Retrospective Analysis for Research and Applications \n(MERRA) data. The dataset is proved to be suitable for agricultural modelling and features consistent, daily \ntime-series data45. \n\nFor future (2020–2099), the original climate scenario data (Table 1) were extracted from output archives of \nfive ESMs (including GFDL-ESM2M, HadGEM2-ES, IPSL-CM5A-LR, MIROC-ESM-CHEM and NorESM1-M) \nunder four RCPs (RCP2.6, RCP4.5, RCP6.0, RCP8.5) retrieved from the CMIP website. The climate scenario data \nwas interpolated into 0.5° × 0.5° horizontal resolution and bias-corrected with respect to historical observations \nto remove systematic errors46. The data of maize-planting regions are from the gridded global dataset in 2000 \nby combining two data products47,48. ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed9.pdf" + }, + { + "text": "NNoorrtthh AAmmeerriiccaa \n\nN O R T H A M E R I C A \n\n", + "page_start": 30, + "page_end": 30, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Anatolia EBA \nAustria_Klosterneuburg_Roman \nBaiuvarii_EMED \nBritain.lronRoman \nCentraIEurope.lronRoman(l) \nCentraIEurope.lronRoman(lI) \nCentraIEurope.IronRoman(lII) \nCordedWare_EBA \nCroatia.lronRoman_oNorthEurope \nDenmark_BA \nDenmark_EVA \nDenmark_IA \nEngland_Saxon_highCNE \nEngland_Saxon_lowCNE \nEngland_Saxon_midCNE \nEngland.Roman.Gladiator.Scandinavia \nHungary_EM(I) \nHungary_EM(II) \nHungarySlovakia.lronRoman \nAll SNPs \nIrelandOrkney_BA \nItaly.lmperial(l) \nltaly.lmperial(lI) \nltaly.lronRepublic \nTwigstats 1,000 \nKyrgyzstan_TianShanHun \nLithuania.lronRoman \nLongobard_EMED(I) \nLongobard_EMED(II) \nMontenegro_EM \nNetherlands_Friesland_Saxon \nPoland_BA \nFaroes \nPoland_Middle_Ages(I) \nPoland_Middle_Ages(II) ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed3.pdf" + }, + { + "text": "In February 2000 Mermaid received approval in principle from the Western Australian Minister \n\nfor the Environment for the development of a supply and engineering base at Dampier (Dampier \n\nBase). Since that time a detailed environmental management system has been produced for final \n\napproval and as a guide to daily environmental management and compliance. Refinements to \n\nthe design have proceeded, together with the preparation of bid packages and negotiations with \n\nBanks for project finance. ", + "page_start": 10, + "page_end": 10, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "DERRICE-ANN DILLON \n\n**Executive Director - Corporate - Appointed 12 August 1998**\n\nDerrice Dillon has considerable experience in management, \n\nadministration and finance acquired over the last 22 years and has \n\nheld a number of senior positions in Australia and overseas. From the \n\nearly 1990’s Derrice developed a strong knowledge of the oil and gas \n\nindustry from her previous position as a director and head of \n\nadministration of Slimdrill Pty Ltd. She was responsible for the design \n\nand implementation of all accounting and administration systems, including complex \n\ndatabases to track information for the construction and manufacture of the Slimdrill oil \n\ndrilling rigs. She was also responsible for all legal matters and the production of promotional \n\nand marketing material for worldwide distribution. ", + "page_start": 30, + "page_end": 30, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "The offshore waters and islands adjacent to Dampier, host in excess of 50% of all D A M P I E R B A S E \n\nexploration and development budgets of Australia’s offshore oil and gas industry. The Burrup \n\nPeninsular where the Base is located is the intended site of major new oil, gas, petrochemical and \n\nindustrial mineral processing plants. The Port of Dampier is Australia’s largest Port as measured by \n\ntonnage, but as identified in the 1997 WA Department of Commerce and Trade report, there \n\nremains an urgent need for additional marine support infrastructure. Mermaid is now well advanced \n\nin our plan to satisfy those needs and onshore work was announced to start on the 9th October 2000. ", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Again, -I ondmd950 is the new Content Manager OnDemand instance. \n\nThe**arssyscr**program creates the application groups, applications, and folders that are \nrequired by the system logging facility. \n\n**Note:**The**arsdb**and**arssyscr**commands are in /opt/IBM/ondemand/V9.5/bin for AIX, \nHP-UX, and Sun Solaris, and in /opt/ibm/ondemand/V9.5/bin for Linux. ", + "page_start": 51, + "page_end": 51, + "source_file": "sg246915.pdf" + }, + { + "text": "AJA and MJR gratefully acknowledge RCUK and EPSRC, respectively, for financial support. We \n\nacknowledge support by the European Union via the FP6 and FP7 Marie Curie schemes [Grants \n\nMRTN-CT-2004005728 (PATTERNS) and PITN-GA-2008-214919 (MULTIFLOW)]. ", + "page_start": 24, + "page_end": 24, + "source_file": "1001.2669.pdf" + }, + { + "text": "Scandinavia \n\n", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed3.pdf" + }, + { + "text": "\nSentra CA (USA) ", + "page_start": 48, + "page_end": 48, + "source_file": "OTC_NSANY_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed9.pdf", + "query": "In 2018, what was the global proportion of maize grown in the US ?", + "target_page": 5, + "target_passage": "According to statistics in 2018, the gross maize yield in the top 5 countries is almost 80% of the total maize yield of the whole world. The United States accounts for more than 32%", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "First maize yields across the world during the historical period 1986–2005 were simulated at the 0.5° × 0.5° \ngrid scale with two main production systems, including Spring maize and Summer maize. Historical national \nmaize production is aggregated from simulated gridded yield and weighted by grid cell maize areas in 2000 from \nthe gridded global dataset by combining two data products47. Second, genetic parameters of specific cultivars of \nmaize from previous works were adopted for the initial parameters; model parameters related to crop genotype \ncharacteristics were calibrated and tuned following the method in Xiong et al.52, in which the simulated yields \nfrom 1986–2005 were comparable to the statistical data. Third, maize yields across the world were simulated \nunder global warming by 1.5 °C and 2.0 °C. Finally, global and national maize yields were aggregated from grid- \nded values; changes in national and global yields under global warming by 1.5 °C and 2.0 °C were calculated, \ncomparing maize yield average for 1986–2005. ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed9.pdf" + }, + { + "text": " 39. Glotter, M. & Elliott, J. Simulating US agriculture in a modern Dust Bowl drought. Nat. Plants**3**, 16193 (2016). \n 40. Challinor, A. J., Koehler, A. K., Ramirez-Villegas, J., Whitfield, S. & Das, B. Current warming will reduce yields unless maize \nbreeding and seed systems adapt immediately. Nat. Clim. Change**6**, 954–958 (2016). \n 41. Cammarano, D. et al. Using historical climate observations to understand future climate change crop yield impacts in the South- \neastern US. Clim. Change**134**, 311–326 (2016). \n\n 42. Etten, J. V. et al. Crop variety management for climate adaptation supported by citizen science. PNAS**116**(10), 4194–4199 (2019). \n 43. Urban, D. W., Sheffield, J. & Lobell, D. B. The impacts of future climate and carbon dioxide changes on the average and variability \nof US maize yields under two emission scenarios. Environ. Res. Lett.**10**, 045003 (2015). \n\n 44. IPCC. Summary for policymakers. In Global Warming of 1.5°C. An IPCC Special Report on the Impacts of Global Warming of 1.5°C \nAbove Pre-industrial Levels and Related Global Greenhouse Gas Emission Pathways, in the Context of Strengthening the Global \nResponse to the Threat of Climate Change, Sustainable Development, and Efforts to Eradicate Poverty 32 (World Meteorological \nOrganization, 2018). \n 45. Ruane, A. C., Goldberg, R. & Chryssanthacopoulos, J. Climate forcing datasets for agricultural modeling: Merged products for \ngap-filling and historical climate series estimation. Agr. For. Meteorol.**200**, 233–248 (2015). \n 46. Hempel, S., Frieler, K., Warszawski, L., Schewe, J. & Piontek, F. A trendpreserving bias correction-the ISI-MIP approach. Earth \nSyst. Dyn.**4**, 219–236 (2013). \n 47. Monfreda, C., Ramankutty, N. & Foley, J. A. Farming the planet: 2. Geographic distribution of crop areas, yields, physiological ", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed9.pdf" + }, + { + "text": "**Yield change of maize in main countries.**There are huge differences in impacts on maize yield under \nclimate change, which would influence the food crisis in different regions. There are 159 countries in the whole \nworld which plant maize. The gross yield of maize the top 20 countries accounts for more than 90% of the total \nyield in the 159 countries. So, the changes in the top 20 countries under future scenarios would influence the \nfood security of the whole world (Fig. 5). From the results of simulated by CRESE-maize under global warming \nby 1.5 °C, there would be 75 countries facing with yield loss of maize; the mean yield loss rate would become \n33.5%. There would be 84 countries experiencing yield increases. Overall, the global maize yield would slightly \nincrease. Under global warming by 2.0 °C, there would be 82 countries facing with yield loss of maize, for which \nthe mean yield loss rate is approximate to that under global warming by 1.5 °C. There would be 77 countries \nexperiencing yield increase; however, the mean yield increase is apparently smaller than that under global warm- \ning by 1.5 °C. Generally, the global maize yield would decrease. The results show that the adverse effect of warm- \ning up 2.0 °C on global maize production is far greater than warming up 1.5 °C. It is important to take actions to \ndevelop forward-looking adaptation measures to cope with future climate change. ", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed9.pdf" + }, + { + "text": "**Conclusion.**According to the simulation results, the yield of maize under global warming by 2.0 °C would \ndecrease between 3.0 and 18.7% in the worldwide relative to 1986–2005; the maize yield would fluctuate between \n− 6.8 and 7.2% under global warming by 1.5 °C. From the spatial distribution, the gross maize yield in the top 5 \nhigh-yield countries (including the United States, China, Brazil, Argentina and Mexico) would decrease by 2% \nunder global warming by 1.5 °C and 11.4% under global warming by 2.0 °C. At the global level, the market price \nfor maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively, which would \nvary quite largely among different countries and regions. So, it is urgent for all countries to pay enough attention \nto the loss risk of maize yield and take actions of mitigation and adaptation to climate change. The time left for \nchanging our minds and actions is becoming less and less. ", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed9.pdf" + }, + { + "text": "security of the whole world would still be attacked violently. There are huge differences among the continents; \nSouth America, Asia and the Middle East are threatened seriously by yield loss seriously under global warming \nby 1.5 °C. The changes in maize yield in different regions would influence the maize price and food trades. So, \nit should be cautious to cope with the maize changes under global warming by 1.5 °C. ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed9.pdf" + }, + { + "text": "**Figure 7.**Price change on maize in main continents under global warming by 1.5 °C and 2.0 °C. \n\n", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed9.pdf" + }, + { + "text": "**The impact of 1.5 °C and 2.0 °C**\n**global warming on global maize**\n**production and trade**\n\n**OPEN**\n\n**Kuo Li1** ***, Jie Pan1, Wei Xiong2, Wei Xie3 & Tariq Ali3**", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed9.pdf" + }, + { + "text": "**Simulation of maize yield using DSSAT.**According to the data of global warming by 1.5 °C and 2.0 °C \nselected above, we simulated global maize yield changes compared with the average yield during 1986–2005 on \ngrid level using CERES-Maize, which is part of DSSAT version 4.649. ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed9.pdf" + }, + { + "text": "**Figure 6.**Yield loss rates on maize in 6 continents under global warming by 1.5 °C and 2.0 °C. \n\n**Market price of maize in main countries.**\nIn this study, we elaborate on the endogenous response of our \neconomic models. This response can be theoretically elaborated as: due to the effect of climate change on yield \nreduction (improvement), the supply curve moves leftward (rightward), reducing (increasing) production and \nraising (lowering) prices. In response, the consumers decrease (increase) their consumption of more expensive \n(cheaper) crops and shifting to other (increase the use of the same) crops. Producers, at the same time, respond \nby changing farm-level management practices and increasing (decreasing) the amount of acreage under these \ncrops. At a global scale, the reallocation of production and consumption through international trade further \nalters climate change impacts on global agriculture. This also alters the self-sufficiency ratios of each country/ \nregion due to climate change. ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed9.pdf" + }, + { + "text": "**Figure 5.**Yield loss rates on maize in top 20 countries under global warming by 1.5 °C and 2.0 °C. \n\nthat maize yield would decrease severely. For the whole world more mitigation and adaptation actions should \nbe taken from now on. Food security would be a significant challenge in this century. ", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed9.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed9.pdf", + "query": "What would be the price increase resulting from maize production changes due to 1.5°C and 2°C global temperature increase ?", + "target_page": 10, + "target_passage": "In response to production changes, the price of each commodity changes under both scenarios. At the global level, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "**Figure 7.**Price change on maize in main continents under global warming by 1.5 °C and 2.0 °C. \n\n", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed9.pdf" + }, + { + "text": "**The impact of 1.5 °C and 2.0 °C**\n**global warming on global maize**\n**production and trade**\n\n**OPEN**\n\n**Kuo Li1** ***, Jie Pan1, Wei Xiong2, Wei Xie3 & Tariq Ali3**", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed9.pdf" + }, + { + "text": "In response to production changes, the price of each commodity changes under both scenarios. At the global \nlevel, the market price for maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, \nrespectively, which would vary quite largely among different countries and regions under both climate change \nscenarios (Fig. 7). Particularly, the market price would increase by around 22% and 27% in Iran under 2.0 °C \nscenario and 1.5 °C scenario, respectively. Iran is also the region where the highest yield reduction is observed \ndue to climate change. Market prices for maize in India, Mexico, Russia, South Africa and the Rest of Africa \nwould decrease significantly under both scenarios, as their yields improve due to climate effects. Along with the \ndomestic production, the climate change will also induce changes in international trade of maize, resulting in \nchanging levels of self-sufficiency ratios (SSR) for each country/region. By SSR, we mean the ratio of domestically \nproduced commodity, to the sum of net imports and domestic production. In our scenario analysis, generally, \nthe countries that face positive effects on yields and/or are relatively less dependent on imports, are positively \n(less negatively) affected by climate change. For example, maize SSR for Ukraine, India, Russia and Mexico would \nimprove under both scenarios (Fig. 8). Whereas the self-sufficiency ratios of maize for Southeast Asia, Bangladesh \nand Iran will worsen under both scenarios. China’s SSR for maize stays almost similar to the level as the baseline. ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed9.pdf" + }, + { + "text": "**Conclusion.**According to the simulation results, the yield of maize under global warming by 2.0 °C would \ndecrease between 3.0 and 18.7% in the worldwide relative to 1986–2005; the maize yield would fluctuate between \n− 6.8 and 7.2% under global warming by 1.5 °C. From the spatial distribution, the gross maize yield in the top 5 \nhigh-yield countries (including the United States, China, Brazil, Argentina and Mexico) would decrease by 2% \nunder global warming by 1.5 °C and 11.4% under global warming by 2.0 °C. At the global level, the market price \nfor maize would increase by 0.7% and 3.4% under 1.5 °C scenario and 2.0 °C scenario, respectively, which would \nvary quite largely among different countries and regions. So, it is urgent for all countries to pay enough attention \nto the loss risk of maize yield and take actions of mitigation and adaptation to climate change. The time left for \nchanging our minds and actions is becoming less and less. ", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed9.pdf" + }, + { + "text": "security of the whole world would still be attacked violently. There are huge differences among the continents; \nSouth America, Asia and the Middle East are threatened seriously by yield loss seriously under global warming \nby 1.5 °C. The changes in maize yield in different regions would influence the maize price and food trades. So, \nit should be cautious to cope with the maize changes under global warming by 1.5 °C. ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed9.pdf" + }, + { + "text": "**Discussion and conclusion**\n**Discussion.**Our analysis highlights the effects of climate change on global- and regional-specific maize \nyields and the associated economic consequences in 1.5 °C and 2.0 °C -warming scenarios. We find that the \nreduction risk of maize yield under global warming by 2.0 °C is much more serious than that under global warm- \ning by 1.5 °C. On the one hand, the larger the temperature rise, the greater the evapotranspiration would be. \nAlthough the precipitation is also increasing, the evapotranspiration would become more intense. The limitation \nof water supply for maize growth leads to the decline of yield. On the other hand, relative to global warming by \n1.5 °C, maize production would be faced with more serious and frequent extreme climate events, such as drought \nand heat waves, which would increase the risk of corn yield reduction under global warming by 2.0 °C. In the ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed9.pdf" + }, + { + "text": "meantime, the huge differences in yield changes in different regions provide a small chance for the world, espe- \ncially under global warming by 1.5 °C. In the near future, if the global temperature can be effectively controlled \nunder 1.5 °C warming scenario, there would be an increase in the potential for maize yield in the worldwide. \nAll regions and countries should take actions to reduce the yield loss risk. For the yield-increasing regions, the \npotentials of climate resources should be fully utilized to guarantee maize yield under future scenarios; for the \nyield-reducing regions, the targeted adaptation actions should be taken in advance under global warming by \n1.5 °C and 2.0 °C. \n\nMeanwhile, the risk of price fluctuations caused by global corn trade due to future climate change should be \npaid more attention to, especially for developing and undeveloped countries. In the view of supply and demand, \nthe population would go up quickly in the next 30 years; the demand for maize would increase hugely; however, \nthe supply of maize would go down in the future, especially under global warming by 2.0 °C; it would intensify \nthe contradiction between supply and demand, which would threaten the food security and sustainable develop- \nment in the whole world. ", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed9.pdf" + }, + { + "text": "warming by 1.5 °C and 2.0 °C. So, there are apparent challenges and opportunities for maize production in the \nwhole world under climate change. We should grasp the opportunities and expand the yield increasing poten- \ntials; meanwhile, the threat of maize yield loss should be controlled and compressed to the minimum in the \nhigh-risk regions. ", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed9.pdf" + }, + { + "text": "Although, so far there are plenty of research on the impacts of global warming by 1.5 °C temperature, includ- \ning the impacts comparison of global warming by 1.5 °C versus 2.0 °C44. It is necessary to do more quantitative \nimpacts assessments of global warming by 1.5 °C and 2.0 °C on crops yield and market price to address research \ngaps and support the requirement of the scientific community and governments. In this paper, the future climate \nsituations were selected and analyzed which are the approximate scenarios with global warming by 1.5 °C and \n2.0 °C, based on the simulation results from 5 climate models recommended by ISI-MIP under 4 RCP scenarios. \nThen the per unit yield changes of maize all over the world under global warming by 1.5 °C and 2.0 °C were \nanalyzed and the spatial distributions of changes in maize yield were revealed relative to the baseline from \n1985 to 2006, applying crop model DSSAT (Decision Support System for Agrotechnology Transfer). Next, we \nexamine the effects of the resulting maize production shocks in different countries; the market price of maize is \nsimulated using GTAP to reveal the impacts of climate change on global crop trade. Finally, the future trend of \nmaize yield and market price in the main breadbasket is assessed and the adaptation suggestions are put forward \nfor maize cultivation. ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed9.pdf" + }, + { + "text": "**Figure 6.**Yield loss rates on maize in 6 continents under global warming by 1.5 °C and 2.0 °C. \n\n**Market price of maize in main countries.**\nIn this study, we elaborate on the endogenous response of our \neconomic models. This response can be theoretically elaborated as: due to the effect of climate change on yield \nreduction (improvement), the supply curve moves leftward (rightward), reducing (increasing) production and \nraising (lowering) prices. In response, the consumers decrease (increase) their consumption of more expensive \n(cheaper) crops and shifting to other (increase the use of the same) crops. Producers, at the same time, respond \nby changing farm-level management practices and increasing (decreasing) the amount of acreage under these \ncrops. At a global scale, the reallocation of production and consumption through international trade further \nalters climate change impacts on global agriculture. This also alters the self-sufficiency ratios of each country/ \nregion due to climate change. ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed9.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia1.pdf", + "query": "What is a formal fallacy ?", + "target_page": 8, + "target_passage": "For formal fallacies, the source of the error is found in the form of the argument", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Fallacies are usually divided into formal and \ninformal fallacies.[38] For formal fallacies, the \nsource of the error is found in the*form*of the \nargument. For example, denying the antecedent \nis one type of formal fallacy, as in \"if Othello is a \nbachelor, then he is male; Othello is not a \nbachelor; therefore Othello is not male\".[88] But \nmost fallacies fall into the category of informal \nfallacies, of which a great variety is discussed in \nthe academic literature. The source of their error \nis usually found in the*content*or the*context*of \nthe \nare \nsometimes categorized as fallacies of ambiguity, \nfallacies of presumption, or \nfallacies of \nthe \nrelevance. For \nambiguity and vagueness of natural language are \nresponsible for their flaw, as in \"feathers are light; what is light cannot be dark; therefore feathers cannot \nbe dark\".[90] Fallacies of presumption have a wrong or unjustified premise but may be valid otherwise.[91] \nIn the case of fallacies of relevance, the premises do not support the conclusion because they are not \nrelevant to it.[92] \n\nargument.[89] Informal fallacies ", + "page_start": 7, + "page_end": 7, + "source_file": "wikipedia1.pdf" + }, + { + "text": "**Informal**\n\nInformal logic is usually carried out in a less systematic way. It often focuses on more specific issues, like \ninvestigating a particular type of fallacy or studying a certain aspect of argumentation. Nonetheless, some \nframeworks of informal logic have also been presented that try to provide a systematic characterization of \nthe correctness of arguments.[141] ", + "page_start": 12, + "page_end": 12, + "source_file": "wikipedia1.pdf" + }, + { + "text": "**Fallacies**\n\nNot all arguments live up to the standards of correct reasoning. When they do not, they are usually \nreferred to as fallacies. Their central aspect is not that their conclusion is false but that there is some flaw \nwith the reasoning leading to this conclusion.[84] So the argument \"it is sunny today; therefore spiders \nhave eight legs\" is fallacious even though the conclusion is true. Some theorists, like John Stuart Mill, \ngive a more restrictive definition of fallacies by additionally requiring that they appear to be correct.[85] \nThis way, genuine fallacies can be distinguished from mere mistakes of reasoning due to carelessness. \nThis explains why people tend to commit fallacies: because they have an alluring element that seduces \npeople into committing and accepting them.[86] However, this reference to appearances is controversial \nbecause it belongs to the field of psychology, not logic, and because appearances may be different for \ndifferent people.[87] ", + "page_start": 7, + "page_end": 7, + "source_file": "wikipedia1.pdf" + }, + { + "text": "**Logic**\n\n**Logic**is the study of correct reasoning. It includes both formal and \ninformal logic. Formal logic is the study of deductively valid \ninferences or logical truths. It examines how conclusions follow \nfrom premises based on the structure of arguments alone, \nindependent of their topic and content. Informal logic is associated \nwith informal fallacies, critical thinking, and argumentation \ntheory. Informal logic examines arguments expressed in natural \nlanguage whereas formal logic uses formal language. When used \nas a countable noun, the term \"a logic\" refers to a specific logical \nformal system that articulates a proof system. Logic plays a \ncentral role in many fields, such as philosophy, mathematics, \ncomputer science, and linguistics. \n\nLogic studies valid forms of \ninference like*modus ponens*. \n\nLogic studies arguments, which consist of a set of premises that leads to a conclusion. An example is the \nargument from the premises \"it's Sunday\" and \"if it's Sunday then I don't have to work\" leading to the \nconclusion \"I don't have to work\".[1] Premises and conclusions express propositions or claims that can be \ntrue or false. An important feature of propositions is their internal structure. For example, complex \npropositions are made up of simpler propositions linked by logical vocabulary like \n(if...then). Simple propositions also have parts, like \"Sunday\" or \"work\" in the example. The truth of a \nproposition usually depends on the meanings of all of its parts. However, this is not the case for logically \ntrue propositions. They are true only because of their logical structure independent of the specific \nmeanings of the individual parts. \n\n (and) or ", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Another characterization identifies informal logic with the study of non-deductive arguments. In this way, \nit contrasts with deductive reasoning examined by formal logic.[35] Non-deductive arguments make their \nconclusion probable but do not ensure that it is true. An example is the inductive argument from the \nempirical observation that \"all ravens I have seen so far are black\" to the conclusion \"all ravens are \nblack\".[36] \n\nA further approach is to define informal logic as the study of informal fallacies.[37] Informal fallacies are \nincorrect arguments in which errors are present in the content and the context of the argument.[38] A false \ndilemma, for example, involves an error of content by excluding viable options. This is the case in the \nfallacy \"you are either with us or against us; you are not with us; therefore, you are against us\".[39] Some \ntheorists state that formal logic studies the general form of arguments while informal logic studies \nparticular instances of arguments. Another approach is to hold that formal logic only considers the role of ", + "page_start": 2, + "page_end": 2, + "source_file": "wikipedia1.pdf" + }, + { + "text": "logical constants for correct inferences while informal logic also takes the meaning of substantive \nconcepts into account. Further approaches focus on the discussion of logical topics with or without formal \ndevices and on the role of epistemology for the assessment of arguments.[40] ", + "page_start": 3, + "page_end": 3, + "source_file": "wikipedia1.pdf" + }, + { + "text": "The*pragmatic*or*dialogical approach*to informal logic sees arguments as speech acts and not merely as \na set of premises together with a conclusion.[142] As speech acts, they occur in a certain context, like a \ndialogue, which affects the standards of right and wrong arguments.[143] A prominent version by Douglas \nN. Walton understands a dialogue as a game between two players. The initial position of each player is \ncharacterized by the propositions to which they are committed and the conclusion they intend to prove. \nDialogues are games of persuasion: each player has the goal of convincing the opponent of their own \nconclusion.[144] This is achieved by making arguments: arguments are the moves of the game.[145] They \naffect to which propositions the players are committed. A winning move is a successful argument that \ntakes the opponent's commitments as premises and shows how one's own conclusion follows from them. \nThis is usually not possible straight away. For this reason, it is normally necessary to formulate a \nsequence of arguments as intermediary steps, each of which brings the opponent a little closer to one's \nintended conclusion. Besides these positive arguments leading one closer to victory, there are also \nnegative arguments preventing the opponent's victory by denying their conclusion.[144] Whether an \nargument is correct depends on whether it promotes the progress of the dialogue. Fallacies, on the other \nhand, are violations of the standards of proper argumentative rules.[146] These standards also depend on \nthe type of dialogue. For example, the standards governing the scientific discourse differ from the \nstandards in business negotiations.[147] ", + "page_start": 12, + "page_end": 12, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Formal logic is interested in deductively valid arguments, for which the truth of their premises ensures \nthe truth of their conclusion. This means that it is impossible for the premises to be true and the \nconclusion to be false.[11] For valid arguments, the logical structure of the premises and the conclusion \nfollows a pattern called a rule of inference.[12] For example, modus ponens is a rule of inference \naccording to which all arguments of the form \"(1)*p*, (2) if*p*then*q*, (3) therefore*q*\" are valid, independent \nof what the terms*p*and*q*stand for.[13] In this sense, formal logic can be defined as the science of valid \ninferences. An alternative definition sees logic as the study of logical truths.[14] A proposition is logically \ntrue if its truth depends only on the logical vocabulary used in it. This means that it is true in all possible \nworlds and under all interpretations of its non-logical terms, like the claim \"either it is raining, or it is \nnot\".[15] These two definitions of formal logic are not identical, but they are closely related. For example, \nif the inference from*p*to*q*is deductively valid then the claim \"if*p*then*q*\" is a logical truth.[16] ", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia1.pdf" + }, + { + "text": "**Arguments and inferences**\nLogic is commonly defined in terms of arguments or inferences as the study of their correctness.[59] An \n*argument*is a set of premises together with a conclusion.[60] An*inference*is the process of reasoning \nfrom these premises to the conclusion.[43] But these terms are often used interchangeably in logic. \nArguments are correct or incorrect depending on whether their premises support their conclusion. \nPremises and conclusions, on the other hand, are true or false depending on whether they are in accord \nwith reality. In formal logic, a sound argument is an argument that is both correct and has only true \npremises.[61] Sometimes a distinction is made between simple and complex arguments. A complex ", + "page_start": 4, + "page_end": 4, + "source_file": "wikipedia1.pdf" + }, + { + "text": "**Definitory and strategic rules**\n\nThe main focus of most logicians is to study the criteria according to which an argument is correct or \nincorrect. A fallacy is committed if these criteria are violated. In the case of formal logic, they are known \nas*rules of inference*.[93] They are definitory rules, which determine whether an inference is correct or \nwhich inferences are allowed. Definitory rules contrast with strategic rules. Strategic rules specify which \ninferential moves are necessary to reach a given conclusion based on a set of premises. This distinction \ndoes not just apply to logic but also to games. In chess, for example, the definitory rules dictate that \nbishops may only move diagonally. The strategic rules, on the other hand, describe how the allowed ", + "page_start": 7, + "page_end": 7, + "source_file": "wikipedia1.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia1.pdf", + "query": "In early Chinese philosophy, what were the major influences regarding the philosophy of logic ?", + "target_page": 18, + "target_passage": "In Chinese philosophy, the School of Names and Mohism were particularly influential", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "In Chinese philosophy, the School of Names and Mohism were particularly influential. The School of \nNames focused on the use of language and on paradoxes. For example, Gongsun Long proposed the \nwhite horse paradox, which defends the thesis that a white horse is not a horse. The school of Mohism \nalso acknowledged the importance of language for logic and tried to relate the ideas in these fields to the \nrealm of ethics.[197] \n\nIn India, the study of logic was primarily pursued by the schools of Nyaya, Buddhism, and Jainism. It \nwas not treated as a separate academic discipline and discussions of its topics usually happened in the \ncontext of epistemology and theories of dialogue or argumentation.[198] In Nyaya, inference is understood \nas a source of knowledge (pramāṇa). It follows the perception of an object and tries to arrive at \nconclusions, for example, about the cause of this object.[199] A similar emphasis on the relation to \nepistemology is also found in Buddhist and Jainist schools of logic, where inference is used to expand the \nknowledge gained through other sources.[200] Some of the later theories of Nyaya, belonging to the \nNavya-Nyāya school, resemble modern forms of logic, such as Gottlob Frege's distinction between sense \nand reference and his definition of number.[201] ", + "page_start": 17, + "page_end": 17, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Rautenberg, Wolfgang (1 July 2010).*A Concise Introduction to Mathematical Logic*. \nSpringer. p. 15. ISBN 978-1-4419-1221-3. \nRendsvig, Rasmus; Symons, John (2021). \"Epistemic Logic\" (https://plato.stanford.edu/entri \nes/logic-epistemic/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Retrieved 11 March 2023. \nRestall, Greg; Standefer, Shawn (2023).*Logical Methods*. MIT Press. p. 91. ISBN 978-0- \n262-54484-9. \nRichardson, Alan W. (1998).*Carnap's Construction of the World: The Aufbau and the*\n*Emergence of Logical Empiricism*. Cambridge University Press. p. 15. ISBN 978-0-521- \n43008-1. \nRini, Adriane (13 December 2010).*Aristotle's Modal Proofs: Prior Analytics A8-22 in*\n*Predicate Logic*. Springer Science & Business Media. p. 26. ISBN 978-94-007-0050-5. \nRitola, Juho (1 December 2008). \"Walton's Informal Logic: A Pragmatic Approach\" (https://d \noi.org/10.22329%2Fil.v28i4.2856).*Informal Logic*.**28**(4): 335. doi:10.22329/il.v28i4.2856 (h \nttps://doi.org/10.22329%2Fil.v28i4.2856). \nRocci, Andrea (8 March 2017).*Modality in Argumentation: A Semantic Investigation of the*\n*Role of Modalities in the Structure of Arguments with an Application to Italian Modal*\n*Expressions*. Springer. p. 26. ISBN 978-94-024-1063-1. \nRošker, Jana S. (May 2015). \"Classical Chinese Logic: Philosophy Compass\".*Philosophy*\n*Compass*.**10**(5): 301–309. doi:10.1111/phc3.12226 (https://doi.org/10.1111%2Fphc3.1222 \n6). \nRunco, Mark A.; Pritzker, Steven R. (1999).*Encyclopedia of Creativity*. Academic Press. \np. 155. ISBN 978-0-12-227075-8. \nRush, Penelope (2014). \"Introduction\".*The Metaphysics of Logic*(https://philpapers.org/rec/ \nRUSTMO-4). Cambridge University Press. pp. 1–10. ISBN 978-1-107-03964-3. Archived (htt \nps://web.archive.org/web/20211207184954/https://philpapers.org/rec/RUSTMO-4) from the \noriginal on 7 December 2021. Retrieved 8 January 2022. \nSadegh-Zadeh, Kazem (2015).*Handbook of Analytic Philosophy of Medicine*. Springer. \np. 983. ISBN 978-94-017-9579-1. \nSagüillo, José M. (2014). \"Hintikka on Information and Deduction\".*Teorema: Revista*\n*Internacional de Filosofía*.**33**(2): 75–88. ISSN 0210-1602 (https://search.worldcat.org/issn/ \n0210-1602). JSTOR 43047609 (https://www.jstor.org/stable/43047609). \nSarukkai, Sundar; Chakraborty, Mihir Kumar (2022).*Handbook of Logical Thought in India*. \nSpringer Nature. pp. 117–8. ISBN 978-81-322-2577-5. \nSchagrin, Morton L. \"Metalogic\" (https://www.britannica.com/topic/metalogic).*Encyclopædia*\n*Britannica*. Retrieved 23 September 2022. \nSchechter, Joshua. \"Epistemology of Logic – Bibliography\" (https://philpapers.org/browse/ep \nistemology-of-logic).*PhilPapers*. Retrieved 11 September 2022. \nSchlesinger, I. M.; Keren-Portnoy, Tamar; Parush, Tamar (1 January 2001).*The Structure of*\n*Arguments*. John Benjamins Publishing. p. 220. ISBN 978-90-272-2359-3. \nSchreiner, Wolfgang (2021).*Thinking Programs: Logical Modeling and Reasoning About*\n*Languages, Data, Computations, and Executions*. Springer Nature. p. 22. ISBN 978-3-030- \n80507-4. \nScott, John; Marshall, Gordon (2009). \"analytic induction\".*A Dictionary of Sociology*(https:// \nwww.oxfordreference.com/view/10.1093/oi/authority.20110803095410661). Oxford \nUniversity Press. ISBN 978-0-19-953300-8. Archived (https://web.archive.org/web/2022010 \n8173225/https://www.oxfordreference.com/view/10.1093/oi/authority.20110803095410661) \nfrom the original on 8 January 2022. Retrieved 8 January 2022. \nShapiro, Stewart; Kouri Kissel, Teresa (2022). \"Classical Logic\" (https://plato.stanford.edu/e \nntries/logic-classical/#Sema).*The Stanford Encyclopedia of Philosophy*. Metaphysics \nResearch Lab, Stanford University. Retrieved 19 July 2023. ", + "page_start": 34, + "page_end": 34, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Haack, Susan (1978). \"1. 'Philosophy of logics' \".*Philosophy of Logics*(https://philpapers.or \ng/rec/HAAPOL-2). London and New York: Cambridge University Press. pp. 1–10. ISBN 978- \n0-521-29329-7. Archived (https://web.archive.org/web/20211207200551/https://philpapers.o \nrg/rec/HAAPOL-2) from the original on 7 December 2021. Retrieved 29 December 2021. \nHaack, Susan (1996).*Deviant Logic, Fuzzy Logic: Beyond the Formalism*. University of \nChicago Press. ISBN 978-0-226-31133-3. \nHaaparanta, Leila (2009). \"1. Introduction\".*The Development of Modern Logic*. Oxford \nUniversity Press. pp. 4–6. ISBN 978-0-19-513731-6. \nHansen, Hans (2020). \"Fallacies\" (https://plato.stanford.edu/entries/fallacies/).*The Stanford*\n*Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. Archived (http \ns://web.archive.org/web/20210329182946/https://plato.stanford.edu/entries/fallacies/) from \nthe original on 29 March 2021. Retrieved 18 March 2021. \nHartmann, Stephan; Sprenger, Jan (2010). \"Bayesian Epistemology\".*The Routledge*\n*Companion to Epistemology*(https://philpapers.org/rec/BOVSIO). London: Routledge. \npp. 609–620. ISBN 978-0-415-96219-3. Archived (https://web.archive.org/web/2021051609 \n5047/https://philpapers.org/rec/BOVSIO) from the original on 16 May 2021. Retrieved \n4 January 2022. \nHasse, Dag Nikolaus (2008). \"Influence of Arabic and Islamic Philosophy on the Latin West\" \n(https://plato.stanford.edu/entries/arabic-islamic-influence/).*The Stanford Encyclopedia of*\n*Philosophy*. Metaphysics Research Lab, Stanford University. Retrieved 19 July 2023. \nHawthorne, James (2021). \"Inductive Logic\" (https://plato.stanford.edu/entries/logic-inductiv \ne/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford \nUniversity. Archived (https://web.archive.org/web/20220121081805/https://plato.stanford.ed \nu/entries/logic-inductive/) from the original on 21 January 2022. Retrieved 6 January 2022. \nHintikka, Jaakko J. (2019). \"Philosophy of logic\" (https://www.britannica.com/topic/philosoph \ny-of-logic).*Encyclopædia Britannica*. Archived (https://web.archive.org/web/2015042810173 \n2/http://www.britannica.com/EBchecked/topic/346240/philosophy-of-logic) from the original \non 28 April 2015. Retrieved 21 November 2021. \nHintikka, Jaakko J. (2023). \"Logical systems\" (https://www.britannica.com/topic/logic/Logical \n-systems).*Encyclopædia Britannica*. Archived (https://web.archive.org/web/2021120718465 \n6/https://www.britannica.com/topic/logic/Logical-systems) from the original on 7 December \n2021. Retrieved 4 December 2021. \nHintikka, Jaakko (1970). \"Information, Deduction, and the A Priori\".*Noûs*.**4**(2): 135–152. \ndoi:10.2307/2214318 (https://doi.org/10.2307%2F2214318). ISSN 0029-4624 (https://searc \nh.worldcat.org/issn/0029-4624). JSTOR 2214318 (https://www.jstor.org/stable/2214318). \nHintikka, Jaakko; Sandu, Gabriel (2006). \"What is Logic?\". In Jacquette, D. (ed.). \n*Philosophy of Logic*(https://philpapers.org/rec/JAAWIL). North Holland. pp. 13–39. \nISBN 978-0-444-51541-4. Archived (https://web.archive.org/web/20211207235525/https://ph \nilpapers.org/rec/JAAWIL) from the original on 7 December 2021. Retrieved 29 December \n2021. \nHintikka, Jaakko J.; Spade, Paul Vincent. \"History of logic\" (https://www.britannica.com/topi \nc/history-of-logic).*Encyclopædia Britannica*. Retrieved 23 September 2022. \nHonderich, Ted (2005).*The Oxford Companion to Philosophy*(https://philpapers.org/rec/HO \nNTOC-2). Oxford University Press. ISBN 978-0-19-926479-7. Archived (https://web.archive. \norg/web/20210129082636/https://philpapers.org/rec/HONTOC-2) from the original on 29 \nJanuary 2021. Retrieved 2 January 2022. \nHurley, Patrick J. (2015). \"4. Categorical Syllogisms\".*Logic: The Essentials*. Wadsworth. \npp. 189–237. ISBN 978-1-305-59041-0. \nIEP Staff. \"Deductive and Inductive Arguments\" (https://iep.utm.edu/ded-ind/). Archived (http \ns://web.archive.org/web/20100528032124/https://iep.utm.edu/ded-ind/) from the original on \n28 May 2010. Retrieved 6 January 2022. ", + "page_start": 29, + "page_end": 29, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Marenbon, John (2021). \"Anicius Manlius Severinus Boethius\" (https://plato.stanford.edu/ent \nries/boethius/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. \nMcKeon, Matthew. \"Logical Consequence\" (https://iep.utm.edu/logcon/).*Internet*\n*Encyclopedia of Philosophy*. Archived (https://web.archive.org/web/20211112071437/https:// \niep.utm.edu/logcon/) from the original on 12 November 2021. Retrieved 20 November 2021. \nMichaelson, Eliot; Reimer, Marga (2019). \"Reference\" (https://plato.stanford.edu/entries/refe \nrence/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford \nUniversity. Archived (https://web.archive.org/web/20211207184705/https://plato.stanford.ed \nu/entries/reference/) from the original on 7 December 2021. Retrieved 4 December 2021. \nMills, Ethan (2018).*Three Pillars of Skepticism in Classical India: Nagarjuna, Jayarasi, and*\n*Sri Harsa*. Rowman & Littlefield. p. 121. ISBN 978-1-4985-5570-8. \"... for Nyāya all \ninference is ultimately rooted in perception ... Naiyāyikas typically accept four means of \nknowledge: perception, inference, comparison, and testimony.\" \nMonk, J. Donald (1976). \"Introduction\" (https://link.springer.com/chapter/10.1007/978-1-468 \n4-9452-5_1).*Mathematical Logic*. Springer. pp. 1–9. doi:10.1007/978-1-4684-9452-5_1 (http \ns://doi.org/10.1007%2F978-1-4684-9452-5_1). ISBN 978-1-4684-9452-5. Archived (https://w \neb.archive.org/web/20220109131251/https://link.springer.com/chapter/10.1007/978-1-4684- \n9452-5_1) from the original on 9 January 2022. Retrieved 9 January 2022. \nMoore, Kevin; Cromby, John (8 August 2016).*How Best to 'Go On'? Prospects for a*\n*'Modern Synthesis' in the Sciences of Mind*. Frontiers Media SA. p. 60. ISBN 978-2-88919- \n906-8. \nMoore, Terence; Carling, Christine (1982).*Understanding Language: Towards a Post-*\n*Chomskyan Linguistics*. Springer. p. 53. ISBN 978-1-349-16895-8. \nMoschovakis, Joan (2022). \"Intuitionistic Logic\" (https://plato.stanford.edu/entries/logic-intuiti \nonistic/).*The Stanford Encyclopedia of Philosophy: Introduction*. Metaphysics Research \nLab, Stanford University. Retrieved 11 March 2023. \nNolt, John (2021). \"Free Logic: 1. The Basics\" (https://plato.stanford.edu/entries/logic-free/# \n1).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford \nUniversity. Retrieved 10 September 2022. \nNunes, Terezinha (2011). \"Logical Reasoning and Learning\". In Seel, Norbert M. (ed.). \n*Encyclopedia of the Sciences of Learning*. Springer Science & Business Media. pp. 2066– \n2069. ISBN 978-1-4419-1427-9. \nO'Regan, Gerard (2016).*Introduction to the History of Computing: A Computing History*\n*Primer*. Springer. p. 49. ISBN 978-3-319-33138-6. \nOaksford, Mike; Chater, Nick (2007).*Bayesian Rationality: The Probabilistic Approach to*\n*Human Reasoning*. OUP Oxford. p. 47. ISBN 978-0-19-852449-6. \nOlkowski, Dorothea; Pirovolakis, Eftichis (31 January 2019).*Deleuze and Guattari's*\n*Philosophy of Freedom: Freedom's Refrains*. Routledge. pp. 65–66. ISBN 978-0-429-66352- \n9. \nOlsson, Erik J. (2018). \"Bayesian Epistemology\".*Introduction to Formal Philosophy*(https:// \nphilpapers.org/rec/OLSBE). Springer. pp. 431–442. ISBN 978-3-030-08454-7. Archived (http \ns://web.archive.org/web/20210516095057/https://philpapers.org/rec/OLSBE) from the \noriginal on 16 May 2021. Retrieved 4 January 2022. \nOnline Etymology Staff. \"Logic\" (https://www.etymonline.com/word/logic?ref=etymonline_cro \nssreference).*etymonline.com*. Archived (https://web.archive.org/web/20211229134626/http \ns://www.etymonline.com/word/logic?ref=etymonline_crossreference) from the original on 29 \nDecember 2021. Retrieved 29 December 2021. \nPartee, Barbara H. (2016). Aloni, Maria; Dekker, Paul (eds.).*The Cambridge Handbook of*\n*Formal Semantics*. Cambridge University Press. ISBN 978-1-107-02839-5. ", + "page_start": 32, + "page_end": 32, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Ibn Sina (Avicenna) was the founder of Avicennian logic, which replaced Aristotelian logic as the \ndominant system of logic in the Islamic world.[189] It influenced Western medieval writers such as \nAlbertus Magnus and William of Ockham.[190] Ibn Sina wrote on the hypothetical syllogism[191] and on \nthe propositional calculus.[192] He developed an original \"temporally modalized\" syllogistic theory, \ninvolving temporal logic and modal logic.[193] He also made use of inductive logic, such as his methods \nof agreement, difference, and concomitant variation, which are critical to the scientific method.[191] Fakhr \nal-Din al-Razi was another influential Muslim logician. He criticized Aristotelian syllogistics and \nformulated an early system of inductive logic, foreshadowing the system of inductive logic developed by \nJohn Stuart Mill.[194] \n\nDuring the Middle Ages, many translations and interpretations of Aristotelian logic were made. The \nworks of Boethius were particularly influential. Besides translating Aristotle's work into Latin, he also \nproduced textbooks on logic.[195] Later, the works of Islamic philosophers such as Ibn Sina and Ibn \nRushd (Averroes) were drawn on. This expanded the range of ancient works available to medieval \nChristian scholars since more Greek work was available to Muslim scholars that had been preserved in \nLatin commentaries. In 1323, William of Ockham's influential*Summa Logicae*was released. It is a \ncomprehensive treatise on logic that discusses many basic concepts of logic and provides a systematic \nexposition of types of propositions and their truth conditions.[196] ", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Gamut, L.T.F. (1991).*Logic, Language and Meaning Vol 1: Introduction to Logic*. University \nof Chicago Press. 5.5. ISBN 978-0-226-28085-1. \nGarson, James (2023). \"Modal Logic\" (https://plato.stanford.edu/entries/logic-modal/).*The*\n*Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. \nRetrieved 11 March 2023. \nGensler, Harry J. (2006).*The A to Z of Logic*. Scarecrow Press. pp. xliii–xliv. ISBN 978-1- \n4617-3182-5. \nGoble, Lou (2001). \"Introduction\".*The Blackwell Guide to Philosophical Logic*(https://philpa \npers.org/rec/GOBTBG-2). Wiley-Blackwell. pp. 1–8. ISBN 978-0-631-20692-7. Archived (htt \nps://web.archive.org/web/20211207184959/https://philpapers.org/rec/GOBTBG-2) from the \noriginal on 7 December 2021. Retrieved 4 January 2022. \nGoodman, Lenn Evan (1992).*Avicenna*. Routledge. p. 188. ISBN 978-0-415-01929-3. \nGoodman, Lenn Evan (2003).*Islamic Humanism*. Oxford University Press. p. 155. \nISBN 978-0-19-513580-0. \nGroarke, Louis F. \"Aristotle: Logic\" (https://iep.utm.edu/aris-log/).*Internet Encyclopedia of*\n*Philosophy*. Archived (https://web.archive.org/web/20211229235433/https://iep.utm.edu/aris \n-log/) from the original on 29 December 2021. Retrieved 1 January 2022. \nGroarke, Leo (2021). \"Informal Logic\" (https://plato.stanford.edu/entries/logic-informal/).*The*\n*Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. \nArchived (https://web.archive.org/web/20220112030519/https://plato.stanford.edu/entries/lo \ngic-informal/) from the original on 12 January 2022. Retrieved 31 December 2021. \nGómez-Torrente, Mario (2019). \"Logical Truth\" (https://plato.stanford.edu/entries/logical-trut \nh/).*The Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford \nUniversity. Archived (https://web.archive.org/web/20211002190110/https://plato.stanford.ed \nu/entries/logical-truth/) from the original on 2 October 2021. Retrieved 22 November 2021. \nGödel, Kurt (1984). \"Russell's mathematical logic\". In Benacerraf, Paul; Putnam, Hilary \n(eds.).*Philosophy of Mathematics: Selected Readings*(https://www.cambridge.org/core/boo \nks/abs/philosophy-of-mathematics/russells-mathematical-logic/4D82F215FABFE06149D03 \nEF1EF5BE7E4) (2nd ed.). Cambridge University Press. pp. 447–469. ISBN 978-0-521- \n29648-9. Archived (https://web.archive.org/web/20220111091740/https://www.cambridge.or \ng/core/books/abs/philosophy-of-mathematics/russells-mathematical-logic/4D82F215FABFE \n06149D03EF1EF5BE7E4) from the original on 11 January 2022. Retrieved 9 January 2022. \nHájek, Petr (3 September 2006). \"Fuzzy Logic\" (https://plato.stanford.edu/Archives/Win201 \n2/entries/logic-fuzzy/).*Stanford Encyclopedia of Philosophy*. Metaphysics Research Lab, \nStanford University. Retrieved 19 July 2023. \nHájek, Alan; Lin, Hanti (2017). \"A Tale of Two Epistemologies?\" (https://philpapers.org/rec/H \nJEATO).*Res Philosophica*.**94**(2): 207–232. doi:10.11612/resphil.1540 (https://doi.org/10.1 \n1612%2Fresphil.1540). S2CID 160029122 (https://api.semanticscholar.org/CorpusID:16002 \n9122). Archived (https://web.archive.org/web/20220104182746/https://philpapers.org/rec/HJ \nEATO) from the original on 4 January 2022. Retrieved 4 January 2022. \nHall, Cordelia; O'Donnell, John (2000).*Discrete Mathematics Using a Computer*. Springer \nScience & Business Media. p. 48. ISBN 978-1-85233-089-7. \nHoude, R.; Camacho, L. (2003). \"Induction\".*New Catholic Encyclopedia*(https://www.encycl \nopedia.com/science-and-technology/computers-and-electrical-engineering/electrical-engine \nering/induction). ISBN 978-0-7876-4004-0. Archived (https://web.archive.org/web/20220108 \n171720/https://www.encyclopedia.com/science-and-technology/computers-and-electrical-en \ngineering/electrical-engineering/induction) from the original on 8 January 2022. Retrieved \n8 January 2022. \nHaack, Susan (1974).*Deviant Logic: Some Philosophical Issues*. CUP Archive. p. 51. \nISBN 978-0-521-20500-9. ", + "page_start": 28, + "page_end": 28, + "source_file": "wikipedia1.pdf" + }, + { + "text": "**Definition**\n\nThe word \"logic\" originates from the Greek word*logos*, which has a variety of translations, such as \nreason, discourse, or language.[4] Logic is traditionally defined as the study of the laws of thought or \ncorrect reasoning,[5] and is usually understood in terms of inferences or arguments. Reasoning is the \nactivity of drawing inferences. Arguments are the outward expression of inferences.[6] An argument is a \nset of premises together with a conclusion. Logic is interested in whether arguments are correct, i.e. \nwhether their premises support the conclusion.[7] These general characterizations apply to logic in the \nwidest sense, i.e., to both formal and informal logic since they are both concerned with assessing the \ncorrectness of arguments.[8] Formal logic is the traditionally dominant field, and some logicians restrict \nlogic to formal logic.[9] ", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Conventionalism. \n\n179. Chua 2017, pp. 631–636; Wilce 2021; Putnam 1969, pp. 216–241. \n180. Lagerlund 2018. \n181. Spade & Panaccio 2019. \n182. Haaparanta 2009, pp. 4–6 (https://books.google.com/books?id=0jXavKsArnIC&pg=PA4), 1. \n\nIntroduction; Hintikka & Spade, Modern logic, Logic since 1900. \n\n183. Kline 1972, \"A major achievement of Aristotle was the founding of the science of logic\", p. \n\n53; Łukasiewicz 1957, p. 7; Liu & Guo 2023, p. 15. \n\n184. Lear 1980, p. 34. \n185. Knuuttila 1980, p. 71; Fisher, Gabbay & Vila 2005, p. 119. \n186. Berman 2009, p. 133. \n187. Frede; Groarke. \n188. Ewald 2019; Smith 2022. \n189. Hasse 2008; Lagerlund 2018. \n190. Washell 1973, pp. 445–50; Kneale & Kneale 1962, pp. 229, 266. \n191. Goodman 2003, p. 155. \n192. Goodman 1992, p. 188. \n193. Hintikka & Spade, Arabic Logic (https://www.britannica.com/topic/history-of-logic/Medieval-lo ", + "page_start": 23, + "page_end": 23, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Vidyabhusana, Satis Chandra (1988).*A History of Indian Logic: Ancient, Mediaeval and*\n*Modern Schools*. Motilal Banarsidass Publisher. p. 221. ISBN 978-81-208-0565-1. \nVleet, Van Jacob E. (2010). \"Introduction\".*Informal Logical Fallacies: A Brief Guide*(https://p \nhilpapers.org/rec/VLEILF). Upa. pp. ix–x. ISBN 978-0-7618-5432-6. Archived (https://web.ar \nchive.org/web/20220228035654/https://philpapers.org/rec/VLEILF) from the original on 28 \nFebruary 2022. Retrieved 2 January 2022. \nVäänänen, Jouko (2021). \"Second-order and Higher-order Logic\" (https://plato.stanford.edu/ \nentries/logic-higher-order/).*The Stanford Encyclopedia of Philosophy*. Metaphysics \nResearch Lab, Stanford University. Archived (https://web.archive.org/web/20211030222316/ \nhttps://plato.stanford.edu/entries/logic-higher-order/) from the original on 30 October 2021. \nRetrieved 23 November 2021. \nWalton, Douglas N. (1987).*Informal Fallacies: Towards a Theory of Argument Criticisms*(htt \nps://philpapers.org/rec/WALIFT). John Benjamins. ISBN 978-1-55619-010-0. Archived (http \ns://web.archive.org/web/20220302001111/https://philpapers.org/rec/WALIFT) from the \noriginal on 2 March 2022. Retrieved 2 January 2022. \nWarren, Jared (2020).*Shadows of Syntax: Revitalizing Logical and Mathematical*\n*Conventionalism*(https://global.oup.com/academic/product/shadows-of-syntax-9780190086 \n152). Oxford University Press. ISBN 978-0-19-008615-2. \nWashell, Richard F. (1973). \"Logic, Language, and Albert the Great\" (https://philpapers.org/r \nec/WASLLA-3).*Journal of the History of Ideas*.**34**(3): 445–50. doi:10.2307/2708963 (http \ns://doi.org/10.2307%2F2708963). JSTOR 2708963 (https://www.jstor.org/stable/2708963). \nWasilewska, Anita (2018).*Logics for Computer Science: Classical and Non-Classical*. \nSpringer. pp. 145–6. ISBN 978-3-319-92591-2. \nWeber, Zach. \"Paraconsistent Logic\" (https://iep.utm.edu/para-log/).*Internet Encyclopedia*\n*of Philosophy*. Retrieved 12 December 2021. \nWeddle, Perry (2011). \"Chapter 36. Informal logic and the eductive-inductive distinction\". \n*Across the Lines of Disciplines*(https://www.degruyter.com/document/doi/10.1515/97831108 \n67718.383/html). De Gruyter Mouton. pp. 383–388. doi:10.1515/9783110867718.383 (http \ns://doi.org/10.1515%2F9783110867718.383). ISBN 978-3-11-086771-8. Archived (https://w \neb.archive.org/web/20211231172343/https://www.degruyter.com/document/doi/10.1515/978 \n3110867718.383/html) from the original on 31 December 2021. Retrieved 2 January 2022. \nWesterståhl, Dag (1989). \"Aristotelian Syllogisms and Generalized Quantifiers\" (https://philp \napers.org/rec/WESASA).*Studia Logica*.**48**(4): 577–585. doi:10.1007/BF00370209 (https:// \ndoi.org/10.1007%2FBF00370209). S2CID 32089424 (https://api.semanticscholar.org/Corpu \nsID:32089424). Archived (https://web.archive.org/web/20220104182746/https://philpapers.o \nrg/rec/WESASA) from the original on 4 January 2022. Retrieved 4 January 2022. \nWilbanks, Jan J. (1 March 2010). \"Defining Deduction, Induction, and Validity\" (https://link.sp \nringer.com/article/10.1007/s10503-009-9131-5).*Argumentation*.**24**(1): 107–124. \ndoi:10.1007/s10503-009-9131-5 (https://doi.org/10.1007%2Fs10503-009-9131-5). \nISSN 1572-8374 (https://search.worldcat.org/issn/1572-8374). S2CID 144481717 (https://ap \ni.semanticscholar.org/CorpusID:144481717). Archived (https://web.archive.org/web/202201 \n08171721/https://link.springer.com/article/10.1007/s10503-009-9131-5) from the original on \n8 January 2022. Retrieved 8 January 2022. \nWilce, Alexander (2021). \"Quantum Logic and Probability Theory: 2.1 Realist Quantum \nLogic\" (https://plato.stanford.edu/entries/qt-quantlog/#RealQuanLogi).*The Stanford*\n*Encyclopedia of Philosophy*. Metaphysics Research Lab, Stanford University. Retrieved \n11 March 2023. \nWile, Bruce; Goss, John; Roesner, Wolfgang (2005).*Comprehensive Functional*\n*Verification: The Complete Industry Cycle*. Elsevier. p. 447. ISBN 978-0-08-047664-3. \nWillman, Marshall D. (2022). \"Logic and Language in Early Chinese Philosophy\" (https://plat \no.stanford.edu/entries/chinese-logic-language/).*The Stanford Encyclopedia of Philosophy*. \nMetaphysics Research Lab, Stanford University. Introduction. Retrieved 11 March 2023. ", + "page_start": 36, + "page_end": 36, + "source_file": "wikipedia1.pdf" + }, + { + "text": "The syllogistic logic developed by Aristotle predominated in the West until the mid-19th century, when \ninterest in the foundations of mathematics stimulated the development of modern symbolic logic.[202] \nMany see Gottlob Frege's*Begriffsschrift*as the birthplace of modern logic. Gottfried Wilhelm Leibniz's \nidea of a universal formal language is often considered a forerunner. Other pioneers were George Boole, \nwho invented Boolean algebra as a mathematical system of logic, and Charles Peirce, who developed the \nlogic of relatives. Alfred North Whitehead and Bertrand Russell, in turn, condensed many of these \ninsights in their work*Principia Mathematica*. Modern logic introduced novel concepts, such as functions, \nquantifiers, and relational predicates. A hallmark of modern symbolic logic is its use of formal language \nto precisely codify its insights. In this regard, it departs from earlier logicians, who relied mainly on \nnatural language.[203] Of particular influence was the development of first-order logic, which is usually \ntreated as the standard system of modern logic.[204] Its analytical generality allowed the formalization of \nmathematics and drove the investigation of set theory. It also made Alfred Tarski's approach to model \ntheory possible and provided the foundation of modern mathematical logic.[205] ", + "page_start": 17, + "page_end": 17, + "source_file": "wikipedia1.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia1.pdf", + "query": "What is considered a deductively valid argument regarding logic ?", + "target_page": 6, + "target_passage": "A deductively valid argument is one whose premises guarantee the truth of its conclusion", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Deductive**\nA deductively valid argument is one whose premises guarantee the truth of its conclusion.[11] For \ninstance, the argument \"(1) all frogs are amphibians; (2) no cats are amphibians; (3) therefore no cats are \nfrogs\" is deductively valid. For deductive validity, it does not matter whether the premises or the \nconclusion are actually true. So the argument \"(1) all frogs are mammals; (2) no cats are mammals; (3) \ntherefore no cats are frogs\" is also valid because the conclusion follows necessarily from the premises.[65] \n\nAccording to an influential view by Alfred Tarski, deductive arguments have three essential features: (1) \nthey are formal, i.e. they depend only on the form of the premises and the conclusion; (2) they are a \npriori, i.e. no sense experience is needed to determine whether they obtain; (3) they are modal, i.e. that \nthey hold by logical necessity for the given propositions, independent of any other circumstances.[66] \n\nBecause of the first feature, the focus on formality, deductive inference is usually identified with rules of \ninference.[67] Rules of inference specify the form of the premises and the conclusion: how they have to be \nstructured for the inference to be valid. Arguments that do not follow any rule of inference are \ndeductively invalid.[68] The modus ponens is a prominent rule of inference. It has the form \"*p*; if*p*, then \n*q*; therefore*q*\".[69] Knowing that it has just rained ( ) and that after rain the streets are wet ( \n), one \ncan use modus ponens to deduce that the streets are wet ( ).[70] ", + "page_start": 5, + "page_end": 5, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Formal logic is interested in deductively valid arguments, for which the truth of their premises ensures \nthe truth of their conclusion. This means that it is impossible for the premises to be true and the \nconclusion to be false.[11] For valid arguments, the logical structure of the premises and the conclusion \nfollows a pattern called a rule of inference.[12] For example, modus ponens is a rule of inference \naccording to which all arguments of the form \"(1)*p*, (2) if*p*then*q*, (3) therefore*q*\" are valid, independent \nof what the terms*p*and*q*stand for.[13] In this sense, formal logic can be defined as the science of valid \ninferences. An alternative definition sees logic as the study of logical truths.[14] A proposition is logically \ntrue if its truth depends only on the logical vocabulary used in it. This means that it is true in all possible \nworlds and under all interpretations of its non-logical terms, like the claim \"either it is raining, or it is \nnot\".[15] These two definitions of formal logic are not identical, but they are closely related. For example, \nif the inference from*p*to*q*is deductively valid then the claim \"if*p*then*q*\" is a logical truth.[16] ", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia1.pdf" + }, + { + "text": "argument is made up of a chain of simple arguments. This means that the conclusion of one argument acts \nas a premise of later arguments. For a complex argument to be successful, each link of the chain has to be \nsuccessful.[43] \n\nArguments and inferences are either \ncorrect or incorrect. If they are correct \ntheir \ntheir premises support \nthen \nconclusion. In the incorrect case, this \nsupport \ntake \ndifferent forms corresponding to the \ndifferent types of reasoning.[62] The \nstrongest form of support corresponds \nto deductive reasoning. But even \narguments that are not deductively \nvalid may still be good arguments \ntheir premises offer non- \nbecause \ndeductive support to their conclusions. \nFor such cases, the term*ampliative*or \nused.[63] \n*inductive*\nDeductive arguments are associated \nwith formal logic in contrast to the \nrelation between ampliative arguments and informal logic.[64] \n\nis missing. It can \n\nArgument terminology used in logic ", + "page_start": 5, + "page_end": 5, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Arguments can be either correct or incorrect. An argument is correct if its premises support its \nconclusion. Deductive arguments have the strongest form of support: if their premises are true then their \nconclusion must also be true. This is not the case for ampliative arguments, which arrive at genuinely new \ninformation not found in the premises. Many arguments in everyday discourse and the sciences are \nampliative arguments. They are divided into inductive and abductive arguments. Inductive arguments are \nstatistical generalization—such as inferring that all ravens are black, based on many individual \nobservations of black ravens.[2] Abductive arguments are inferences to the best explanation—for \nexample, when a doctor concludes that a patient has a certain disease, as the best explanation for the \nsymptoms that they are observed to suffer.[3] Arguments that fall short of the standards of correct \nreasoning often embody fallacies. Systems of logic are theoretical frameworks for assessing the \ncorrectness of arguments. \n\nLogic has been studied since antiquity. Early approaches include Aristotelian logic, Stoic logic, Nyaya, \nand Mohism. Aristotelian logic focuses on reasoning in the form of syllogisms. It was considered the \nmain system of logic in the Western world until it was replaced by modern formal logic, which has its \nroots in the work of late 19th-century mathematicians such as Gottlob Frege. Today, the most commonly \nused system is classical logic. It consists of propositional logic and first-order logic. Propositional logic \nonly considers logical relations between full propositions. First-order logic also takes the internal parts of ", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Another characterization identifies informal logic with the study of non-deductive arguments. In this way, \nit contrasts with deductive reasoning examined by formal logic.[35] Non-deductive arguments make their \nconclusion probable but do not ensure that it is true. An example is the inductive argument from the \nempirical observation that \"all ravens I have seen so far are black\" to the conclusion \"all ravens are \nblack\".[36] \n\nA further approach is to define informal logic as the study of informal fallacies.[37] Informal fallacies are \nincorrect arguments in which errors are present in the content and the context of the argument.[38] A false \ndilemma, for example, involves an error of content by excluding viable options. This is the case in the \nfallacy \"you are either with us or against us; you are not with us; therefore, you are against us\".[39] Some \ntheorists state that formal logic studies the general form of arguments while informal logic studies \nparticular instances of arguments. Another approach is to hold that formal logic only considers the role of ", + "page_start": 2, + "page_end": 2, + "source_file": "wikipedia1.pdf" + }, + { + "text": "**Notes**\n\na. However, there are some forms of logic, like imperative logic, where this may not be the \n\ncase.[42] \n\nb. Conductive arguments present reasons in favor of a conclusion without claiming that the \n\nreasons are strong enough to decisively support the conclusion. ", + "page_start": 18, + "page_end": 18, + "source_file": "wikipedia1.pdf" + }, + { + "text": "**Arguments and inferences**\nLogic is commonly defined in terms of arguments or inferences as the study of their correctness.[59] An \n*argument*is a set of premises together with a conclusion.[60] An*inference*is the process of reasoning \nfrom these premises to the conclusion.[43] But these terms are often used interchangeably in logic. \nArguments are correct or incorrect depending on whether their premises support their conclusion. \nPremises and conclusions, on the other hand, are true or false depending on whether they are in accord \nwith reality. In formal logic, a sound argument is an argument that is both correct and has only true \npremises.[61] Sometimes a distinction is made between simple and complex arguments. A complex ", + "page_start": 4, + "page_end": 4, + "source_file": "wikipedia1.pdf" + }, + { + "text": "The third feature can be expressed by stating that deductively valid inferences are truth-preserving: it is \nimpossible for the premises to be true and the conclusion to be false.[71] Because of this feature, it is often \nasserted that deductive inferences are uninformative since the conclusion cannot arrive at new \ninformation not already present in the premises.[72] But this point is not always accepted since it would \nmean, for example, that most of mathematics is uninformative. A different characterization distinguishes ", + "page_start": 5, + "page_end": 5, + "source_file": "wikipedia1.pdf" + }, + { + "text": "**Logic**\n\n**Logic**is the study of correct reasoning. It includes both formal and \ninformal logic. Formal logic is the study of deductively valid \ninferences or logical truths. It examines how conclusions follow \nfrom premises based on the structure of arguments alone, \nindependent of their topic and content. Informal logic is associated \nwith informal fallacies, critical thinking, and argumentation \ntheory. Informal logic examines arguments expressed in natural \nlanguage whereas formal logic uses formal language. When used \nas a countable noun, the term \"a logic\" refers to a specific logical \nformal system that articulates a proof system. Logic plays a \ncentral role in many fields, such as philosophy, mathematics, \ncomputer science, and linguistics. \n\nLogic studies valid forms of \ninference like*modus ponens*. \n\nLogic studies arguments, which consist of a set of premises that leads to a conclusion. An example is the \nargument from the premises \"it's Sunday\" and \"if it's Sunday then I don't have to work\" leading to the \nconclusion \"I don't have to work\".[1] Premises and conclusions express propositions or claims that can be \ntrue or false. An important feature of propositions is their internal structure. For example, complex \npropositions are made up of simpler propositions linked by logical vocabulary like \n(if...then). Simple propositions also have parts, like \"Sunday\" or \"work\" in the example. The truth of a \nproposition usually depends on the meanings of all of its parts. However, this is not the case for logically \ntrue propositions. They are true only because of their logical structure independent of the specific \nmeanings of the individual parts. \n\n (and) or ", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia1.pdf" + }, + { + "text": " **Epistemology of logic**", + "page_start": 15, + "page_end": 15, + "source_file": "wikipedia1.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed8.pdf", + "query": "What was the mean correctness score for LLM-generated handoff notes ?", + "target_page": 7, + "target_passage": "Correctness 4.52", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**RESULTS**In this study of 1600 EM patient records (832 [52%] female and mean [SD] age of 59.9 \n\n[18.9] years), LLM-generated handoff notes, compared with physician-written ones, had higher \n\nROUGE (0.322 vs 0.088), BERTScore (0.859 vs 0.796), and SCALE scores (0.691 vs 0.456), \n\nindicating the LLM-generated summaries exhibited greater similarity and more detail. As reviewed by \n\n3 board-certified EM physicians, a subsample of 50 LLM-generated summaries had a mean (SD) \n\nusefulness score of 4.04 (0.86) out of 5 (compared with 4.36 [0.71] for physician-written) and mean \n\n(SD) patient safety scores of 4.06 (0.86) out of 5 (compared with 4.50 [0.56] for physician-written). \n\nNone of the LLM-generated summaries were classified as a critical patient safety risk. \n\n**CONCLUSIONS AND RELEVANCE**In this cohort study of 1600 EM patient medical records, \n\nLLM-generated EM-to-IP handoff notes were determined superior compared with physician-written \n\nsummaries via conventional automated evaluation methods, but marginally inferior in usefulness ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed8.pdf" + }, + { + "text": "**Abstract**\n\n**IMPORTANCE**An emergency medicine (EM) handoff note generated by a large language model \n\nof EM-to-inpatient (IP) handoffs. \n\n**OBJECTIVE**To develop LLM-generated EM-to-IP handoff notes and evaluate their accuracy and \n\nsafety compared with physician-written notes. \n\n**DESIGN, SETTING, AND PARTICIPANTS**This cohort study used EM patient medical records with \n\nacute hospital admissions that occurred in 2023 at NewYork-Presbyterian/Weill Cornell Medical \n\nEM-to-IP handoff notes. Using both conventional automated methods (ie, recall-oriented \n\nscore [BERTScore], and source chunking approach for large-scale inconsistency evaluation [SCALE]) \n\nand a novel patient safety-focused framework, LLM-generated handoff notes vs physician-written \n\nnotes were compared. Data were analyzed from October 2023 to March 2024. \n\n**EXPOSURE**LLM-generated EM handoff notes. \n\n**MAIN OUTCOMES AND MEASURES**LLM-generated handoff notes were evaluated for (1) lexical \n\nsimilarity with respect to physician-written notes using ROUGE and BERTScore; (2) fidelity with \n\nrespect to source notes using SCALE; and (3) readability, completeness, curation, correctness, \n\nusefulness, and implications for patient safety using a novel framework. ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed8.pdf" + }, + { + "text": "**Discussion**\n\nThe study demonstrated success in generating EM-to-IP handoff notes using both a fine tuned, \n\npretrained LLM and rule-based approaches within an end user–developed note template. It is \n\nimportant to note that (largely due to time constraints within the EM care delivery model) the \n\nperformance of EM-to-IP handoff notes was not the current standard of care in EM. The study site’s \n\nunique electronic handoff process enabled a comparison between physician-written and \n\nLLM-generated handoff notes. Traditional automated evaluations of the model output suggested ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\nLLM-model training, an informatics professional (V.H.) worked over a period of 200 hours with 3 \n\nboard certified emergency medicine physician leaders with experience in formal quality and patient \n\nsafety review processes (M.M., A.F., and P.S.) to improve the dataset through manual curation and \n\nannotation. As the task of EM-handoff note generation is not dependent on racial characteristics of \n\nthe patients, we removed all mentions of race during the annotation stage as a means to avoid race \n\nbias; therefore, the model was trained to generate text without race-based assumptions. Although \n\nresource intensive, a small and carefully curated dataset of at least 1000 examples has been shown \nto be sufficient to produce remarkable results for the language model chosen.42 Given the size of \nour dataset, we created a train and test dataset with a ratio of 1500:100, with a higher ratio of data \n\nplaced in the training set and eschewed a validation set to lower the variance of the models. We used \n\nk-fold cross validation on the training dataset to avoid sampling bias for the hyperparameter \n\noptimization of the LLMs. ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine**\n\nsubsequently evaluated 2 ED-to-inpatient handoff notes for each patient: (1) the physician-written \n\nnote and (2) the LLM-generated note. \n\nOn a Likert scale of 1 to 5, where 1 is unacceptable and 5 is excellent, the 3 physicians rated the \n\ncompleteness, curation, readability, and correctness of the summary as shown in eTable 1 in \n\nSupplement 1. Physicians rated the usefulness of the summary, defined as the capability of the \n\nsummary being incorporated into a workflow where a physician would make edits before final \n\ncompletion, mitigating potential future self-referential learning loops and the downstream adverse \nconsequences.51 Likewise, the raters assessed potential patient safety implications of unmitigated \nmodel errors using a scale from 1 to 5, where 1 denotes life-threatening risks and 5 denotes no \n\nidentified patient safety risk for completeness, curation, readability, and the 4 subcategories within \n\ncorrectness (hallucination, faulty logic, knowledge gap, and bias), as well as the overall patient safety \nrisk.45 Evaluators arrived at prestudy consensus that a usefulness Likert score of at least a 3 out of 5 \nindicated that the LLM-generated summary likely demonstrated baseline acceptability for such a ", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed8.pdf" + }, + { + "text": "**Conclusions**\n\nThis study’s results suggest promise for future thoughtful integration of LLM-generated EM-to-IP \n\nhandoff notes into clinical admission workflows, as well as the associated potential downstream \n\nquality and efficiency gains. Our novel clinical evaluation framework demonstrates an effective \n\npreimplementation strategy to measure potential patient safety implications of incorrectness \n\nidentified in LLM-generated clinical care summaries, which will guide future model refinement and \n\nimplementation strategies. In the absence of a current written standard of care in EM, this innovation \n\ncould represent a transformative advancement in the quality of EM-to-IP transitions of care. ", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\n**Additional Contributions:**We are grateful for the help we received from Rita Giordana Pulpo, MA (Parsons and \nCornell Tech), for the designs in our manuscript; Caroline Reiner, BA (Yale University) for her contributions in \nhelping design the data pipeline method for emergency medicine handoff note summarization; and Travis Gossey, \nMD (Northwestern), for his contributions with our project sponsorship, facilitating data access, and assisting with \nphysician recruitment. None of them were compensated for their contributions. \n\n**REFERENCES**\n**1**. Cohen MD and Hilligoss PB. The published literature on handoffs in hospitals: deficiencies identified in an \nextensive review. Qual Saf Health Care. 2010;19(6):493-497. doi:10.1136/qshc.2009.033480 \n\n**2**. Donaldson MS, Corrigan JM, Kohn LT. To err is human: building a safer health system. National Academy Press; \n2000. ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine**\n\nsuperior performance. However, while the manual clinical evaluation demonstrated the majority of \n\nthe LLM-generated notes were of promising comparative quality (scores of 4-5), they were, on \n\naverage, inferior to the clinician-written notes. \n\nOur novel clinical evaluation’s findings suggest the majority of identified quality limitations and \n\nincorrectness would have minimal impact on patient safety, even when extrapolated to the worst- \n\ncase scenario of the LLM-generated summary content not being reviewed and edited by a clinician \n\nbefore completion. This was designed to address contemporary LLM concerns of user trust, reliance \nand expertise.49 As such, none of the incorrect output text elements reached life-threatening risk. \nHowever, incompleteness and faulty logic identified in the automated summaries were not always \n\nnegligible, with just under 1 in 10 of these performance gaps determined to have the potential to \n\ncreate significant patient safety risk compared with the physician-written summaries. These critical \n\nimplementation safety findings will inform (1) directionality of further model refinement; (2) further \n\nclinical evaluation of postrefinement model output; and (3) irrespective of downstream model \n\nperformance, an EHR-implementation plan constrained to a user-interface design that will allow EM \n\nclinicians to review and edit the LLM-generated handoff note as a draft before finalizing (see ", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine** Developing and Evaluating LLM-Generated Emergency Medicine Handoff Notes \n\n**Evaluation**\nIt is critical to ensure that AI systems are safe, ethical, and without bias in the clinical domain. For the \n\nproposed approach, we performed comprehensive automatic evaluations and a novel, rigorous, \n\npatient safety-focused clinical evaluation. The unique clinical evaluation framework was designed to \n\n(1) screen for and identify the common, specific correctness issues in LLMs observed in longform \n\nclinical summarization and (2) assess the potential patient safety implications associated with any \n\nincorrectness identified using a modified version of the World Health Organization’s International \nClassification for Patient Safety.45 \n\n**Automated Evaluations**\nWe used the summarization evaluation metrics of recall-oriented understudy for gisting evaluation \n(ROUGE),46 bidirectional encoder representations from transformers score (BERTScore),47 and \nsource chunking approach for large-scale inconsistency evaluation (SCALE).48 ROUGE computes the \noverlap of n-grams between the generated and reference summaries. For longform document \n\nsummarization, the following ROUGE scores are considered to be close to the reference summaries: \nROUGE-1, above 0.4; ROUGE-2, above 0.2; and ROUGE-L, above 0.3.46 BERTScore leverages the \npretrained contextual embeddings from BERT and matches words to compute a similarity score for \neach token in the candidate sentence with each token in the reference sentence. We used SCALE,48 a \nnatural language inference–based approach, to measure the faithfulness between the source \n\ndocument and the generated text. Further background is provided about SCALE in eAppendix 2 in \n\nSupplement 1. ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed8.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine**\n\nevaluation frameworks may not address the anticipated effect LLM performance limitations could \nhave on patient safety.38-41 \n\nIn this study, we aim to expand on prior work of clinical summarization to rigorously evaluate \n\nthe outcomes of a fine-tuned model developed to generate accurate and safe summaries of the care \n\nrendered during an ED visit, with the long-term goal of integrating automated, structured EM-to-IP \n\nhandoff notes into an EHR-based electronic handoff admission workflow (see eAppendix 1 in \n\nSupplement 1). We fine-tune pretrained LLMs on well curated datasets of structured and \n\nunstructured EHR data from the ED encounter to summarize the patient’s ED care. We improved the \n\ncorrectness of model generations and customized the summaries in a structured format designed \n\nby a team of EM and internal medicine physician leaders for optimal usefulness. We proposed a novel \n\npatient safety-focused LLM evaluation framework to examine the LLM-generated handoff notes’ \n\nquality and accuracy and the downstream patient safety implications of any identified inaccuracies. \n\nTo evaluate noninferiority, we compared the LLM-generated handoff notes with the preexisting \n\nphysician-written EM-to-IP handoff notes as the active control, using both the proposed patient ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed8.pdf" + } + ] + }, + { + "references": { + "source_file": "legal1_opengouvernementlicense.pdf", + "query": "What are the improvements made to possible to the HadGEM3 and CMIP5 climate change models by UKCP18 ?", + "target_page": 1, + "target_passage": "mprovements include better representation of the past climate, the inclusion of more cloud and aerosol processes and the ability to model important climate phenomena ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "What improvements \ndoes UKCP18 deliver? \n\nUKCP18 will benefit from a range of developments \nsince the release of UKCP09, including: \n• Greater understanding of user needs as a result \nof the adaptation community’s use of UKCP09 \nprojections and the subsequent feedback – user \nworkshops indicated that users supported the \ncontinued use of probabilistic projections and the \nimportance of spatially coherent information4. \n• Advances in climate models in recent years, such \nas the Met Office Hadley Centre HadGEM35 model \nand the CMIP56 set of models. Improvements \ninclude better representation of the past \nclimate, the inclusion of more cloud and aerosol \nprocesses and the ability to model important \nclimate phenomena such as the El-Niño Southern \nOscillation (ENSO). \n• Groundbreaking Met Office research on \nmodelling of extreme events in high resolution \nregional climate models7. \n• The increased quantity and range of observations \navailable since 2009. \n• Use of the new Met Office supercomputer, \nenabling a credible range of climate projections to \nbe generated in greater spatial detail. ", + "page_start": 0, + "page_end": 0, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "The high-resolution simulations were performed using the HadGEM3A Global Atmosphere \n(GA) 3.0 model [12–14] at a resolution of N216 (0.556° of latitude by 0.833° of longitude with \ngridboxes of approx. 60 km length in mid-latitudes). This is the atmospheric component of \nthe HadGEM3-GC2 coupled climate model [15,16], which is part of the HadGEM3 family of \nclimate models [12]. This represents the third generation of HadGEM configurations, leading \non from the HadGEM2 family of climate model configurations [13] which was used for CMIP5. \nKey improvements over the previous model, HadGEM2, include increased vertical levels in the \natmosphere (85 compared to 38) and substantial changes to the model dynamics (ENDGame) [17]. \nThis version of the HadGEM3 model lies in the transition from CMIP5 to CMIP6 versions. The Met \nOffice is currently operationally running the coupled HadGEM3-GC2 model at N216 resolution \nfor seasonal and decadal forecasting and clear benefits are emerging from this use at higher \nresolution [18,19]. ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed11.pdf" + }, + { + "text": "Rather than using the original CMIP5 ensemble as in previous studies, the aim is to allow for \nan improved representation of atmospheric and land surface processes including extremes by \nusing higher spatial resolution [11]. \n\n**4**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n\nHadGEM3 (Hadley Centre Global Environment Model version 3) is a configuration of the UK \nMet Office Unified Model (MetUM) which has been developed for use for both climate research \nand weather prediction applications. It is the result of converging the development of the Met \nOffice’s weather and climate global atmospheric model components so that, where possible, \natmospheric processes are modelled or parametrized seamlessly across spatial resolutions and \ntimescales. \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed11.pdf" + }, + { + "text": "**60KM GLOBAL PROJECTIONS**\n**20 plausible climate futures. Latest Hadley Centre climate model. Simulations**\n**of extreme weather. Simultaneous impacts captured at multiple locations.**\n\nThis resolution will enable more realistic simulations of climate for the UK and capture the \ndrivers of extreme weather, a significant advance on the 300 km-resolution simulations of \nUKCP09. A set of 20 plausible global projections of 21st century climate will be generated \nusing an ensemble of the Met Office Hadley Centre HadGEM3 climate model. These \nprojections will be selected to represent a wide range of possible future climate states \nto reflect key uncertainties, informing a risk-based approach to planning. They will be \ngenerated to provide spatially coherent daily data at a horizontal resolution of 60 km for \ntwo greenhouse gas concentration scenarios. These will be compared with an ensemble of \nCMIP5 models to provide additional information on uncertainties in the projections relative \nto other climate models. \n\n**25KM PROBABILISTIC PROJECTIONS**\n**Captures natural variability and climate change . Updated models and**\n**observations. Provides seasonal scale projections.**\n\nBased on the established, peer-reviewed, ground-breaking method of UKCP09 for \nestimating uncertainty for use in risk-based analysis. Probabilistic projections will be \nupdated using an up-to-date collection of Met Office climate simulations and the latest \nIPCC-assessed simulations to estimate the model uncertainties, incorporate the latest \nobservations and estimate carbon cycle feedbacks. Projections will be on a 25 km grid for \nthe UK at monthly intervals for several emission scenarios, including one used in UKCP0911. \nThe new probabilistic projections will indicate the range of uncertainty in our knowledge \nof the climate system and natural variability through the 21st century, using probability \ndensity functions to provide information on how climate varies from month to month. This \ncontrasts with UKCP09 for which only 30-year means were provided12. ", + "page_start": 2, + "page_end": 2, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "We used each HadGEM3 simulation to drive JULES to simulate changes in run-off due to \nthe effects of climate change and CO2 rise on precipitation, evaporation and transpiration. We \nanalysed 30 year periods centred around the year of crossing GWLs of 1.5°C and 2°C relative to \npre-industrial. We examined changes in both mean flows and low flows (defined as the flows for \nthe lowest 10% of time). \n\n(e) Correcting biases in climate model output and implications for defining levels of global \n\nwarming ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed11.pdf" + }, + { + "text": "**DOWNSCALED HIGH RESOLUTION PROJECTIONS**\n**Downscaled versions of the global model for the UK. For the most spatially**\n**detailed downscaling this includes hourly data. Simultaneous impacts captured**\n**at multiple UK locations.**\n\nThe high resolution projections will provide information on types of weather of relevance \nto adaptation at two different resolutions. The 12 km model provides a downscaled \nproduct that is similar to UKCP09’s 25 km simulations but driven by an improved global \nmodel and at a higher resolution. This may be especially useful for those interested in \nwater availability and some aspects of agriculture. A key reason for providing this data is \nthat users will be able to compare it directly with EURO-CORDEX13. \nThe global projections will also be downscaled to 2.2 km using a process of nesting \nmodels at finer resolution that maintains the integrity of the representation of evolving \natmospheric processes. Key benefits of simulations at this resolution will be the \ninformation provided on high impact events such as localised heavy rainfall in summer and \npotential improvements in the diurnal cycle. \nThe output will be available at a time resolution of 3-hourly, possibly higher for some \noutput, for a high emission scenario. Spatial coherence will be maintained. Specific time \nslices (e.g. 2061-2080) will be made available with the exact nature of these still to be \nconfirmed. ", + "page_start": 2, + "page_end": 2, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "2. Murphy JM*et al.*2009*UK climate projections science report: climate change projections*. Exeter, UK: \n**26**\nMet Office Hadley Centre. See http://ukclimateprojections.metoffice.gov.uk. \n\n3. United Nations. 2010 Report of the Conference Parties on its fifteenth session, held in \nCopenhagen, 7 to 19 December 2009. Addendum. Part Two: Action taken by the Conference \nof the Parties at its fifteenth session. See http://unfccc.int/resource/docs/2009/cop15/eng/ \n11a01.pdf. \n\n4. United Nations. 2016 Report of the Conference Parties on its twenty-first session, held in Paris, \n30 November to 13 December 2015. Addendum Part two: Action taken by the Conference of \nthe Parties at its twenty-first session. See http://unfccc.int/resource/docs/2015/cop21/eng/ \n10a01.pdf. \n\n5. Hewitson B*et al.*2014 Regional context. In*Climate change 2014: impacts, adaptation, and*\n*vulnerability. Part B: regional aspects. Contribution of Working Group II to the Fifth assessment*\n*report of the Intergovernmental Panel on Climate Change*(eds VR Barros*et al.*), pp. 1133–1197. \nCambridge, UK: Cambridge University Press. \n\n6. Dankers R*et al.*2013 First look at changes in flood hazard in the inter-sectoral impact model \nintercomparison project ensemble.*Proc. Natl Acad. Sci. USA***111**, 3257–3261. (doi:10.1073/ \npnas.1302078110) \n\n7. IPCC. 2014 Summary for policymakers. In*Climate change 2014: impacts, adaptation, and*\n*vulnerability. Part A: global and sectoral aspects. Contribution of Working Group II to the Fifth*\n*Assessment Report of the Intergovernmental Panel on Climate Change*(eds CB Field*et al.*), pp. \n1–32. Cambridge, UK: Cambridge University Press. \n8. Schewe J*et al.*2014 Multimodel assessment of water scarcity under climate change.*Proc. Natl*\n*Acad. Sci. USA***111**, 3245–3250. (doi:10.1073/pnas.1222460110) \n\n9. Schleussner C-F*et al.*2015 Differential climate impacts for policy-relevant limits to global \nwarming: the case of 1.5°C and 2°C.*Earth Syst. Dynam. Discuss.***6**, 2447–2505. (doi:10.5194/ \nesdd-6-2447-2015) \n\n10. James R, Washington R, Schleussner C-F, Rogeli J, Conway D. 2017 Characterizing half-a- \ndegree difference: a review of methods for identifying regional climate responses to global \nwarming targets.*WIREs Clim Change***8**, e457. (doi:10.1002/wcc.457) \n11. Haarsma RJ*et al.*2016 High resolution model intercomparison project (HighResMIP v1.0) for \nCMIP6.*Geosci. Model Dev.***9**, 4185–4208. (doi:10.5194/gmd-9-4185-2016) \n\n12. Hewitt HT, Copsey D, Culverwell ID, Harris CM, Hill RSR, Keen AB, McLaren AJ, Hunke \nEC. 2011 Design and implementation of the infrastructure of HadGEM3: the next-generation \nMet Office climate modelling system.*Geosci. Model Dev.***4**, 223–253. (doi:10.5194/gmd-4- \n223-2011). \n13. Martin GM*et al.*2011 The HadGEM2 family of met office unified model climate \n\n30. Wiltshire A, Gornall J, Booth B, Dennis E, Falloon P, Kay G, McNeall D, McSweeney C, \nBetts R. 2013 The importance of population, climate change and CO2 plant physiological \nforcing in determining future global water stress.*Glob. Environ. Change***23**, 1083–1097. \n(doi:10.1016/j.gloenvcha.2013.06.005) \n\n31. Papadimitriou LV, Koutroulis AG, Grillakis MG, Tsanis IK. 2016 High-end climate change \nimpact on European runoff and low flows – exploring the effects of forcing biases.*Hydrol.*\n*Earth Syst. Sci.***20**, 1785–1808. (doi:10.5194/hess-20-1785) \n32. Milly PCD, Dunne KA. 2016 Potential evapotranspiration and continental drying.*Nat. Clim.*\n*Change***6**, 946–949. (doi:10.1038/nclimate3046) \n\n33. Swann ALS, Hoffman FM, Koven CD, Randerson JT. 2016 Plant responses to increasing \nCO2 reduce estimates of climate impacts on drought severity.*Proc. Natl Acad. Sci. USA***113**, \n10 019–10 024. (doi:10.1073/pnas.1604581113) \n34. Betts RA*et al.*2007 Projected increase in future river runoff through plant responses to carbon \ndioxide rise.*Nature***448**, 1037–1042. (doi:10.1038/nature06045) \n\n35. Papadimitriou LV, Koutroulis AG, Grillakis MG, Tsanis IK. 2017 The effect of GCM biases \non global runoff simulations of a land surface model.*Hydrol. Earth Syst. Sci.***21**, 4379–4401. \n(doi:10.5194/hess-21-4379-2017) \n\n36. Sheffield J, Goteti G, Wood EF. 2006 Development of a 50-year high-resolution global \ndataset of meteorological forcings for land surface modeling.*J. Climate***19**, 3088–3111. \n(doi:10.1175/JCLI3790.1) \n\n37. Grillakis MG, Koutroulis AG, Tsanis IK. 2013 Multisegment statistical bias correction of daily \nGCM precipitation output.*J. Geophys. Res. Atmos.***118**, 3150–3162. (doi:10.1002/jgrd.50323) \n38. Wartenburger R, Hirschi M, Donat MG, Greve P, Pitman AJ, Seneviratne SI. 2017 Changes in \nregional climate extremes as a function of global mean temperature: an interactive plotting \nframework.*Geosci. Model Dev.***10**, 3609–3634. (doi:10.5194/gmd-10-3609-2017) \n39. Mitchell D, James R, Forster PM, Betts RA, Shiogama H, Allen M. 2016 Realizing the impacts \nof a 1.5°C warmer world.*Nat. Clim. Change***6**, 735–737. (doi:10.1038/nclimate3055) \n40. Cox P*et al.*2008 Increase risk of Amazonian drought due to decreasing aerosol pollution. \n*Nature***453**, 212–216. (doi:10.1038/nature06960) \n\n41. Betts RA, Cox PM, Collins M, Harris PP, Huntingford C, Jones CD. 2004 The role of \necosystem-atmosphere interactions in simulated Amazonian precipitation decrease and forest \ndieback under global climate warming.*Theor. Appl. Climatol.***78**, 157–175. (doi:10.1007/ \ns00704-004-0050-y) \n\n42. Skinner CB, Poulsen CJ, Chadwick R, Diffenbaugh NS, Fiorella RP. 2017 The role of CO2 \nplant physiological forcing in shaping future daily-scale precipitation.*J. Climate***30**, 2319–2340. \n(doi:10.1175/JCLI-D-16-0603.1) ", + "page_start": 25, + "page_end": 25, + "source_file": "pubmed11.pdf" + }, + { + "text": "**Table 3.**Time of reaching GWLs of 1.5°C and 2°C in the raw output from the HadGEM3 climate simulations, driven by different \nsets of CMIP5 sea-surface temperatures. The dates are the centre year of a 20-year period for which the climate data are applied \nto the calculation of the ClimPACT indices. \n\n**8**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. ", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed11.pdf" + }, + { + "text": "A large number of previous studies have assessed potential impacts of future climate change \nusing the 5th Coupled Model Intercomparison Project (CMIP5) ensemble or subsets of this [7], \nand some have framed this in terms of impacts at global warming of 1.5°C and/or 2°C [8,9]. We \nalso base our study on a subset of CMIP5 projections, but use a new, higher-resolution atmosphere \nmodel to provide greater spatial detail and improved representation of atmospheric processes. \n\n2. Methods and models \n(a) Global climate simulations at 1.5°C and 2°C global warming \n\nThere are a number of ways in which 1.5°C or 2°C global warming can be defined—one could \nbe the long-term climate state following a stabilization of warming at that level, another could \nbe the state over a shorter period around the time of first reaching that level. Here we choose the \nsecond definition, which is what is seen first and hence needs to be adapted to. There are also \na number of methods with which such changes can be assessed [10]. We take the opportunity \nof availability of a new set of higher-resolutions transient climate and impacts simulations, and \nuse a time-sampling methodology [10] to assess global-scale impacts at these resolutions for the \nfirst time. ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed11.pdf" + }, + { + "text": "extremes, \nin weather \nWe \nhydrological \nimpacts and vulnerability to food \ninsecurity at global warming of 1.5°C and 2°C relative \nto pre-industrial, using a new global atmospheric \ngeneral circulation model HadGEM3A-GA3.0 driven \nby patterns of sea-surface temperatures and sea \nthe 5th Coupled \nice from selected members of \n\nprojected changes \n\n2018 The Authors. Published by the Royal Society under the terms of the \nCreative Commons Attribution License http://creativecommons.org/licenses/ \nby/4.0/, which permits unrestricted use, provided the original author and \nsource are credited. ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed11.pdf" + } + ] + }, + { + "references": { + "source_file": "legal1_opengouvernementlicense.pdf", + "query": "Which causes of the rise of sea level will be considered by UKCP18 ?", + "target_page": 2, + "target_passage": "Sea-level rise projections will extend to 2100 and will include contributions from glaciers, ice sheets, freshwater reservoirs, groundwater and thermal expansion", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**MARINE PROJECTIONS**\n**Sea level rise. Storm surge. Past event case studies.**\n\nSea-level rise projections will extend to 2100 and will include contributions from glaciers, \nice sheets, freshwater reservoirs, groundwater and thermal expansion. Outputs will include \nan estimate of the year-to-year changes in sea level rise and a “plausible but highly unlikely” \nscenario known as H++. A new feature of UKCP18 will be assessing the credibility of making \nsea level rise projections to 2300. The projections will use the latest information from the \nCMIP5 models and application of the methods used in the Intergovernmental Panel on \nClimate Change’s (IPCC) Fifth Assessment Report10. \n\nThe UKCP09 storm surge projections will be updated to provide new estimates of the change \nin high water levels over the 21st Century. These estimates will be based on a combination of \nprojected mean sea level change and projections of change in the extremes due to changes in \natmospheric storminess. These “storminess” projections will use the same surge model used \nin operational weather forecasting, using the wind and pressure from the CMIP5 ensemble to \ndrive the surge. New understanding of the modification of large-scale sea level change signals \nas they pass from the open ocean onto the shelf sea around the UK will be incorporated into \nthe UKCP18 marine projections. UKCP18 will also include storm surge historical case studies \nderived from applying plausible future sea level change to historical extreme events. ", + "page_start": 1, + "page_end": 1, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "What can users expect from UKCP18? \n\nThere are three components to UKCP18: observations of historic climate, marine projections and projections over land. \nThese components are described below and summarised in Table 1. UKCP18 will provide each of these components at \na higher spatial and temporal resolution than UKCP09 and with more information on different types of uncertainty. ", + "page_start": 1, + "page_end": 1, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "What is UKCP18 \nand why do we need it? \n\nFollowing the historic Paris Agreement on Climate \nChange in December 2015, the Department of \nEnvironment, Food and Rural Affairs announced a \nmajor upgrade to the UK Climate Projections. \n\nThe UKCP18 project will build upon the current set \nof projections (UKCP09) to provide the most up-to- \ndate assessment of how the climate of the UK may \nchange over the 21st century. This information \nwill be essential to future Climate Change Risk \nAssessments1 and to equip the UK with information \nto help adapt to the challenges and opportunities of \nclimate change in line with the National Adaptation \nProgramme2. \n\nOrganisations and individual users will use UKCP18 \nto inform risk assessments and adaptation plans \nto ensure they are resilient to extreme weather \nand climate change. Some organisations will use \nUKCP18 in responding to the Adaptation Reporting \nPower3 for example. ", + "page_start": 0, + "page_end": 0, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "\n\nSEA.LEVEL ", + "page_start": 188, + "page_end": 188, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n\nSEA \nLEVEL’ \n0 ", + "page_start": 137, + "page_end": 137, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n \n \n \n \n [html]Table 1 below indicates the likely dimensions of the outputs for each of the components as of July 2017.LandUpdated probability density functions presented as 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 5p (- 10 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 5p )-UK\n
Observations ( UK State of the Climate )Marine and coastal projectionsGlobal projectionsProbabilistic projections
High resolution projectionsCharacteristicsObserved trends ; long - term climatologies ; weather events for the preceding yearUpdated sea level rise and surge projections based on starting start start start surger model ( CS - 3 ) using CMIP5. EURO - CORDEX ‡Ensemble of P20 spatially series of the Met Office Hadley Centre model number of CMIPS models
Downscaled projections over the UK for - 10 spatially coherent time series. 2.2 km model provides realistic information on heavy rainfall eventsScaleUKUKGlobal
UKSpatial resolutionaTo match land projectionsUK Coastline †6Okm25km12km *
2.2kmHighest temporal resolutionDaily / monthlyAnnualDailyMonthlyDaily
Sub - dailyPeriod of databulk of 20th century to present day1950 - 21001900 - 21001961 - 21001981 - 2080
1981 - 20002021 - 20402061 - 2080Emissions scenariosN / ARCP2.6, RCP4.5, RCP8.5 H **RCP8.5 ; additional lower scenario ( for Met Office Hadley Centre model only )SRES A1B, RCP2.6, RCP4.5, RCP6.0 RCP8.5RCP8.5
RCP8.5Variables available **Temperature, precipitation ( including snow ), sunshine, windSea level rise, storm surgeTemperature, precipitation, humidity, wind speed, wind direction, solar radiationTemperature, precipitation, humidity, wind speed, solar radiationTemperature, precipitation, humidity, wind speed, wind direction, solar radiation
", + "page_start": 3, + "page_end": 3, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "What improvements \ndoes UKCP18 deliver? \n\nUKCP18 will benefit from a range of developments \nsince the release of UKCP09, including: \n• Greater understanding of user needs as a result \nof the adaptation community’s use of UKCP09 \nprojections and the subsequent feedback – user \nworkshops indicated that users supported the \ncontinued use of probabilistic projections and the \nimportance of spatially coherent information4. \n• Advances in climate models in recent years, such \nas the Met Office Hadley Centre HadGEM35 model \nand the CMIP56 set of models. Improvements \ninclude better representation of the past \nclimate, the inclusion of more cloud and aerosol \nprocesses and the ability to model important \nclimate phenomena such as the El-Niño Southern \nOscillation (ENSO). \n• Groundbreaking Met Office research on \nmodelling of extreme events in high resolution \nregional climate models7. \n• The increased quantity and range of observations \navailable since 2009. \n• Use of the new Met Office supercomputer, \nenabling a credible range of climate projections to \nbe generated in greater spatial detail. ", + "page_start": 0, + "page_end": 0, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "\nA \n\nEFFECT OF ALTITUDE \nEFFECT OF ALTITUDE \nAT ALTITUDE \nAT ALTITUDE \n\nSEA LEVEL \nSEA LEVEL t ", + "page_start": 179, + "page_end": 179, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n\nSTAGNATION \nTEMPERATURE \nAT \nSEA LEVEL ", + "page_start": 258, + "page_end": 258, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n\nSEA LEVEL \n\nMINIMUM THRUST REO’D ", + "page_start": 188, + "page_end": 188, + "source_file": "00-80T-80.pdf" + } + ] + }, + { + "references": { + "source_file": "legal1_opengouvernementlicense.pdf", + "query": "What perdiod is covered by the 12 km resolution projection data of the UKCP18 ?", + "target_page": 4, + "target_passage": "1981-2080", + "chunk_present": { + "presence": true, + "index": 8 + } + }, + "top_chunk": [ + { + "text": "What can users expect from UKCP18? \n\nThere are three components to UKCP18: observations of historic climate, marine projections and projections over land. \nThese components are described below and summarised in Table 1. UKCP18 will provide each of these components at \na higher spatial and temporal resolution than UKCP09 and with more information on different types of uncertainty. ", + "page_start": 1, + "page_end": 1, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "**DOWNSCALED HIGH RESOLUTION PROJECTIONS**\n**Downscaled versions of the global model for the UK. For the most spatially**\n**detailed downscaling this includes hourly data. Simultaneous impacts captured**\n**at multiple UK locations.**\n\nThe high resolution projections will provide information on types of weather of relevance \nto adaptation at two different resolutions. The 12 km model provides a downscaled \nproduct that is similar to UKCP09’s 25 km simulations but driven by an improved global \nmodel and at a higher resolution. This may be especially useful for those interested in \nwater availability and some aspects of agriculture. A key reason for providing this data is \nthat users will be able to compare it directly with EURO-CORDEX13. \nThe global projections will also be downscaled to 2.2 km using a process of nesting \nmodels at finer resolution that maintains the integrity of the representation of evolving \natmospheric processes. Key benefits of simulations at this resolution will be the \ninformation provided on high impact events such as localised heavy rainfall in summer and \npotential improvements in the diurnal cycle. \nThe output will be available at a time resolution of 3-hourly, possibly higher for some \noutput, for a high emission scenario. Spatial coherence will be maintained. Specific time \nslices (e.g. 2061-2080) will be made available with the exact nature of these still to be \nconfirmed. ", + "page_start": 2, + "page_end": 2, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "How can I get the information and when? \nAccess to the raw data, pre-prepared data and maps, headline messages and user guidance will be available \nthrough a dedicated website. \n\nA dedicated user interface will provide users with a means to download the data and produce customised \nvisualisations. The exact nature of these outputs is still the subject of consultation with users. \n\nDetailed descriptions of the scientific basis of the projections will be available as the project progresses. For the \nlatest information visit: \n**http://ukclimateprojections.metoffice.gov.uk/24125**\n\n*UKCP Project Team*\n\n*July 2017*", + "page_start": 3, + "page_end": 3, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "**60KM GLOBAL PROJECTIONS**\n**20 plausible climate futures. Latest Hadley Centre climate model. Simulations**\n**of extreme weather. Simultaneous impacts captured at multiple locations.**\n\nThis resolution will enable more realistic simulations of climate for the UK and capture the \ndrivers of extreme weather, a significant advance on the 300 km-resolution simulations of \nUKCP09. A set of 20 plausible global projections of 21st century climate will be generated \nusing an ensemble of the Met Office Hadley Centre HadGEM3 climate model. These \nprojections will be selected to represent a wide range of possible future climate states \nto reflect key uncertainties, informing a risk-based approach to planning. They will be \ngenerated to provide spatially coherent daily data at a horizontal resolution of 60 km for \ntwo greenhouse gas concentration scenarios. These will be compared with an ensemble of \nCMIP5 models to provide additional information on uncertainties in the projections relative \nto other climate models. \n\n**25KM PROBABILISTIC PROJECTIONS**\n**Captures natural variability and climate change . Updated models and**\n**observations. Provides seasonal scale projections.**\n\nBased on the established, peer-reviewed, ground-breaking method of UKCP09 for \nestimating uncertainty for use in risk-based analysis. Probabilistic projections will be \nupdated using an up-to-date collection of Met Office climate simulations and the latest \nIPCC-assessed simulations to estimate the model uncertainties, incorporate the latest \nobservations and estimate carbon cycle feedbacks. Projections will be on a 25 km grid for \nthe UK at monthly intervals for several emission scenarios, including one used in UKCP0911. \nThe new probabilistic projections will indicate the range of uncertainty in our knowledge \nof the climate system and natural variability through the 21st century, using probability \ndensity functions to provide information on how climate varies from month to month. This \ncontrasts with UKCP09 for which only 30-year means were provided12. ", + "page_start": 2, + "page_end": 2, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "What is UKCP18 \nand why do we need it? \n\nFollowing the historic Paris Agreement on Climate \nChange in December 2015, the Department of \nEnvironment, Food and Rural Affairs announced a \nmajor upgrade to the UK Climate Projections. \n\nThe UKCP18 project will build upon the current set \nof projections (UKCP09) to provide the most up-to- \ndate assessment of how the climate of the UK may \nchange over the 21st century. This information \nwill be essential to future Climate Change Risk \nAssessments1 and to equip the UK with information \nto help adapt to the challenges and opportunities of \nclimate change in line with the National Adaptation \nProgramme2. \n\nOrganisations and individual users will use UKCP18 \nto inform risk assessments and adaptation plans \nto ensure they are resilient to extreme weather \nand climate change. Some organisations will use \nUKCP18 in responding to the Adaptation Reporting \nPower3 for example. ", + "page_start": 0, + "page_end": 0, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "What improvements \ndoes UKCP18 deliver? \n\nUKCP18 will benefit from a range of developments \nsince the release of UKCP09, including: \n• Greater understanding of user needs as a result \nof the adaptation community’s use of UKCP09 \nprojections and the subsequent feedback – user \nworkshops indicated that users supported the \ncontinued use of probabilistic projections and the \nimportance of spatially coherent information4. \n• Advances in climate models in recent years, such \nas the Met Office Hadley Centre HadGEM35 model \nand the CMIP56 set of models. Improvements \ninclude better representation of the past \nclimate, the inclusion of more cloud and aerosol \nprocesses and the ability to model important \nclimate phenomena such as the El-Niño Southern \nOscillation (ENSO). \n• Groundbreaking Met Office research on \nmodelling of extreme events in high resolution \nregional climate models7. \n• The increased quantity and range of observations \navailable since 2009. \n• Use of the new Met Office supercomputer, \nenabling a credible range of climate projections to \nbe generated in greater spatial detail. ", + "page_start": 0, + "page_end": 0, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "**UK CLIMATE PROJECTIONS: A PROJECT OVERVIEW**\n\n", + "page_start": 0, + "page_end": 0, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "**MARINE PROJECTIONS**\n**Sea level rise. Storm surge. Past event case studies.**\n\nSea-level rise projections will extend to 2100 and will include contributions from glaciers, \nice sheets, freshwater reservoirs, groundwater and thermal expansion. Outputs will include \nan estimate of the year-to-year changes in sea level rise and a “plausible but highly unlikely” \nscenario known as H++. A new feature of UKCP18 will be assessing the credibility of making \nsea level rise projections to 2300. The projections will use the latest information from the \nCMIP5 models and application of the methods used in the Intergovernmental Panel on \nClimate Change’s (IPCC) Fifth Assessment Report10. \n\nThe UKCP09 storm surge projections will be updated to provide new estimates of the change \nin high water levels over the 21st Century. These estimates will be based on a combination of \nprojected mean sea level change and projections of change in the extremes due to changes in \natmospheric storminess. These “storminess” projections will use the same surge model used \nin operational weather forecasting, using the wind and pressure from the CMIP5 ensemble to \ndrive the surge. New understanding of the modification of large-scale sea level change signals \nas they pass from the open ocean onto the shelf sea around the UK will be incorporated into \nthe UKCP18 marine projections. UKCP18 will also include storm surge historical case studies \nderived from applying plausible future sea level change to historical extreme events. ", + "page_start": 1, + "page_end": 1, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "\n \n \n \n \n [html]Table 1 below indicates the likely dimensions of the outputs for each of the components as of July 2017.LandUpdated probability density functions presented as 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 5p (- 10 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 5p )-UK\n
Observations ( UK State of the Climate )Marine and coastal projectionsGlobal projectionsProbabilistic projections
High resolution projectionsCharacteristicsObserved trends ; long - term climatologies ; weather events for the preceding yearUpdated sea level rise and surge projections based on starting start start start surger model ( CS - 3 ) using CMIP5. EURO - CORDEX ‡Ensemble of P20 spatially series of the Met Office Hadley Centre model number of CMIPS models
Downscaled projections over the UK for - 10 spatially coherent time series. 2.2 km model provides realistic information on heavy rainfall eventsScaleUKUKGlobal
UKSpatial resolutionaTo match land projectionsUK Coastline †6Okm25km12km *
2.2kmHighest temporal resolutionDaily / monthlyAnnualDailyMonthlyDaily
Sub - dailyPeriod of databulk of 20th century to present day1950 - 21001900 - 21001961 - 21001981 - 2080
1981 - 20002021 - 20402061 - 2080Emissions scenariosN / ARCP2.6, RCP4.5, RCP8.5 H **RCP8.5 ; additional lower scenario ( for Met Office Hadley Centre model only )SRES A1B, RCP2.6, RCP4.5, RCP6.0 RCP8.5RCP8.5
RCP8.5Variables available **Temperature, precipitation ( including snow ), sunshine, windSea level rise, storm surgeTemperature, precipitation, humidity, wind speed, wind direction, solar radiationTemperature, precipitation, humidity, wind speed, solar radiationTemperature, precipitation, humidity, wind speed, wind direction, solar radiation
", + "page_start": 3, + "page_end": 3, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "b \n50 \n\ns \nt \nn \nu \no \nc \nm \na \nr \ng \no \nt \ns \nh \n\n40 \n\n30 \ni \n\ne \np \no \nt \no \ns \n20 \n\n10 \ni \n\ne \nb \na \nt \nS \nl \n0 \n0 \n0.74 0.71 0.72 0.73 \n87Srf/86Sr \n\nd \n\n70.5 \n67.5 \n64.5 \n61.5 \n58.5 \n55.5 \ne \nd \nu \nt \ni \nt \na \nL \n\n0.75 1.00 0.25 0.50 \n0 \n\ne \nNorway_VA \nScandinavian Peninsula EIA \n\nBritain \n\nCentral \nEurope ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed3.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv4.pdf", + "query": "How many articles compose the Syntec French collective bargaining agreement ?", + "target_page": 2, + "target_passage": "The Syntec French collective bargaining agree- ment comprises around 90 articles", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "3.1.1 Syntec (Retrieval) \n\nThe Syntec French collective bargaining agree- \nment3 comprises around 90 articles. Despite its \ntopic, the language used does not feature the speci- \nficity of the legal vocabulary, making the data \nsuitable for benchmarking general-purpose mod- \nels. The articles have been scraped for use as doc- \numents. Four annotators were divided into two \ngroups. Each group was given half of the articles \nand asked to choose an article and write a question \nabout it. Each annotator wrote 25 questions. Thus, \na hundred questions have been manually created \nand paired with the articles containing the answer4. \nExamples of the dataset are available in the ap- \npendix Figure 5. This dataset could also be used \nfor text classification, clustering or topic modeling. \nRegarding quality checks, every article’s integrity \nhas been reviewed while manually creating ques- \ntions. We also manually checked that the questions \ncould only be answered using the annotated article. \n\n3 MTEB for French \n\nIn this section, we describe the datasets and the \nmodels that we propose for the French extension \nof MTEB. We also list the research questions we \nwant to discuss with the results. ", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv4.pdf" + }, + { + "text": "Document \n\nid \nurl \n\narticle-14 \nhttps://www.syntec.fr/convention- \ncollective/resiliation-du-contrat- \nde-travail/#article-14 \nArticle 14 : Préavis pendant la péri- \node d’essai \n\nsection Résiliation du contrat de travail \ncontent Modification Avenant n° 7 du \n5/07/1991 Au cours de cette péri- \node, les deux parties peuvent se sé- \nparer avec un préavis d’une journée \nde travail pendant le premier mois. \nAprès le premier mois, le temps \nde préavis réciproque sera d’une \nsemaine par mois complet passé \ndans l’entreprise. Après le pre- \nmier mois, le temps de préavis ré- \nciproque sera d’une semaine par \nmois passé dans l’entreprise. Le \npréavis donne droit au salarié de \ns’absenter pour la recherche d’un \nemploi dans les conditions fixées à \nl’article 16. Le salarié sera payé au \nprorata du temps passé pendant la \npériode d’essai. \nQuery \n\narticle \narticle-14 \nquestion Quel est \nd’essai ? ", + "page_start": 14, + "page_end": 14, + "source_file": "arxiv4.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
DatasetSyntecHALSummEvalFr
Samples100 queries 90 documents26233 samples 10 classes100 texts1100 human summaries1600 machine summaries
Creation processScraping of Syntec collective bargaining agreement with articles as documents. Writing queries corresponding to articles.Scraping of HAL articles with id. title and domain. Further cleaning with deduplication, language filtering and class subsampling.Translation from English to French with Deepl of the SummEval dataset.
Annotation process4 annotators divided into 2 groups. Each group was given half of the articles and asked to choose an article and ask a question about it. Each annotator wrote 25 questions.Annotations provided by authors when submitting their paper. They choose the domain between existing academic fields.Detailed annotation process provided in Fabbri et al. ( 2021 ).
Quality checksHuman verification of annotations.Baseline models for classification and topic modeling.CorrelationBLEUse of scores of the French and the original English datasets. LLM as - a - judge translationrating and human verification.
", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv4.pdf" + }, + { + "text": "Antoine Louis and Gerasimos Spanakis. 2022. A statu- \ntory article retrieval dataset in French. In Proceed- \nings of the 60th Annual Meeting of the Association \nfor Computational Linguistics (Volume 1: Long Pa- \npers), pages 6789–6803, Dublin, Ireland. Association \nfor Computational Linguistics. \n\nJack FitzGerald, Christopher Hench, Charith Peris, \nScott Mackie, Kay Rottmann, Ana Sanchez, Aaron \nNash, Liam Urbach, Vishesh Kakarala, Richa Singh, \nSwetha Ranganath, Laurie Crist, Misha Britan, \nWouter Leeuwis, Gokhan Tur, and Prem Natara- \njan. 2023. MASSIVE: A 1M-example multilin- \ngual natural language understanding dataset with \n51 typologically-diverse languages. In Proceedings \nof the 61st Annual Meeting of the Association for \nComputational Linguistics (Volume 1: Long Papers), \npages 4277–4302, Toronto, Canada. Association for \nComputational Linguistics. \n\nPhilip May. 2021. Machine translated multilingual sts \nbenchmark dataset. ", + "page_start": 9, + "page_end": 9, + "source_file": "arxiv4.pdf" + }, + { + "text": "\n \n \n \n \n [html]ContentsList of figuresList of tablesForeword by Nicolas Schmit, European Commissioner for Jobs and Social RightsAcknowledgements12Status of working conditionsPsychosocial risks at workWorking time in hours and at atypical timesWork intensityPhysical health risks at workContract types and work locationsMobile work, home as workplace and domestic workWorker groups with specific risks and needsConclusionsTrends in outcomes – safety, health and wellbeingTrends in safety outcomes – work accidentsNon - fatal work accidentsSerious non - fatal and fatal work accidentsTrends in health outcomesStatistical picture of mortality and morbidityAttributable fractions, risk pairs and burden of diseaseExamples of specific prevalence estimatesWellbeing and health statusSatisfaction at workHealth affected – overall opinionReported health problemsWorking life perspective – healthSummary of survey results on wellbeing and health statusConclusionsMajor context developments and their influence on working conditionsChanges from industrial to service sectorsTechnological developments – influence on OSH.Workforce structureGlobalisation and OSHOSH legislation and OSH infrastructure in the EUFoundation, legislation, compliance and supervisionEU and national OSH strategiesAgency for Safety and Health at Work – EU - OSHA\n
5
7
8
9
Executive summary10
Setting the scene20
323
3.124
3.1. 129
3.1. 233
3.238
3.345
3.449
3.554
3.659
461
4.161
4.1. 164
4.1. 271
4.273
4.2. 177
4.2. 281
4.2. 386
4.389
4.3. 189
4.3. 291
4.3. 392
4.3. 496
4.3. 598
4.499
5101
5.1101
5.2103
5.3109
5.4114
6118
6.1118
6.2124
Europ3
", + "page_start": 2, + "page_end": 2, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "330 International Social Security Association (ISSA): Vison Zero Overview, Section Companies, here \n331 United Nations, Social Development Goals (SDGs), Goal 8, here and here \n**332**WHO: Protecting workers’ health, Key facts \n333 WHO, 2013: WHO Global Plan of Action on Workers’ Health (2008-2017): baseline for implementation: global \ncountry survey 2008/2009: executive summary and survey findings, here \n334 United Nations, SDGs, Goal 8, here and here \n335 ILO Constitution \n336 ILO: Conventions and Recommendations \n337 Treaty Establishing the European Coal and Steel Community and Annexes I-III, PARIS, 18 APRIL 1951, \nArticle 3e \n(DRAFT ENGLISH TEXT), here \n338 Consolidated Version of the Treaty on the Functioning of the European Union Official Journal of the European \nUnion, C 326/47, 6.10.2012, Article 151 and Article 153, here \n339 The European Parliament, the Council and the Commission: The European Pillar of Social Rights in 20 \nprinciples, here \n340 EU-OSHA, 2021: Directive 89/391/EEC – OSH “Framework Directive” of 12 June 1989 on the introduction of \nmeasures to encourage improvements in the safety and health of workers at work - “Framework Directive”, here \n341 Ibid., Framework Directive – Section 2 Employers’ obligations. \n342 Ibid., Framework Directive – Section 3 Workers’ obligations. ", + "page_start": 152, + "page_end": 152, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "tackling undeclared work’ provides fact sheets of the type and quantity of undeclared work in all EU \nMember States;464 Eurofound published several reports on platform work,465 and the FRA had a series \nof publications and fact sheets on severe cases of exploitation, particularly of migrant workforces.466 \nAlso, the creation of the European Labour Authority (ELA) 467 is partly a consequence of the**often**\n**irregular working conditions of mobile, posted, contracted or seasonal workers**who leave their \ncountry to work in the EU or in another European country. ELA particularly aims to mitigate such critical \nissues related to labour mobility and social security coordination between countries. \n\n**In this report**, the quantitative data and the interpretation of the developments will cover — in an ideal \ncase —**the period 2005 to 2020**. In 2004, a major extension of the EU took place, from 15 to 25 \nMember States. If it is not possible to cover the whole period, the analysis is limited to the maximum \npossible period. If comparability is high, for a very few selected data a further look back to the 1990s \nwas taken. ", + "page_start": 133, + "page_end": 133, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "77. \"Eurolines - Lyon Tourist Office\" (https://en.visiterlyon.com/stay/access-come-and-move-in-lyon/transport-and- \ntransfers/eurolines).*en.visiterlyon.com*. Retrieved 28 January 2024. \n\n78. \"Le réseau TCL | TCL\" (https://www.tcl.fr/a-propos-de-tcl/le-reseau-tcl).*www.tcl.fr*. Retrieved 28 January 2024. \n79. \"Plan interactif - Carte de Lyon et ses environs | TCL\" (https://www.tcl.fr/se-deplacer/plan-interactif). \n*www.tcl.fr*. Retrieved 28 January 2024. \n\n80. \"Discover the service | Rhônexpress\" (https://www.rhonexpress.fr/en_GB/discover-the-service). \n*www.rhonexpress.fr*. Retrieved 28 January 2024. \n\n81. \"RhônExpress\" (https://www.railway-technology.com/projects/rhonexpress/).*Railway Technology*. Retrieved \n28 January 2024. \n\n82. \"Lyon Public Transportation Statistics\" (https://moovitapp.com/insights/en/Moovit_Insights_Public_Transit_Ind \nex_France_Lyon-3483). Global Public Transit Index by Moovit. Retrieved 19 June 2017. \n Material was \ncopied from this source, which is available under a Creative Commons Attribution 4.0 International License (ht \ntps://creativecommons.org/licenses/by/4.0/). \n\n83. Council of Europe (2011). \"Intercultural city: Lyon, France\" (http://www.coe.int/t/dg4/cultureheritage/culture/Citi \nes/lyon_en.asp).*coe.int*. Retrieved 22 May 2011. \n\n84. \"Jumelage\" (http://www.economie.grandlyon.com/tous-les-partenariats-internationaux-villes.html). \n*economie.grandlyon.com*(in French). Grand Lyon économie. Retrieved 14 November 2019. \n\n85. \"World Trade Center Saint Louis\" (https://worldtradecenter-stl.com/st-louis-sister-cities-program/lyon-france/). \n*worldtradecenter-stl.com*. World Trade Center Saint Louis. Retrieved 18 May 2020. ", + "page_start": 24, + "page_end": 24, + "source_file": "wikipedia4.pdf" + }, + { + "text": "In the frame of social dialogue, employer federations and trade unions agree on the regulation of \n**working conditions in collective agreements**without intervention or close reference to state \nregulations, for example, on working time or telework rules. The Eurofound ‘Database of wages, working \ntime and collective disputes’ provides an EU-wide overview on such agreements.402 \n\nIn some countries,**employers’ and workers’ associations are governing widely independent OSH**\n**institutions**(e.g. Austrian AUVA or German Berufsgenossenschaften) that act in the frame of state \nregulation but with quite considerable independent decision power.403 In some cases they dispose of \nsignificant resources and are major players for some areas, like training of OSH professionals, or \ncompensation of occupational diseases. They can even implement financial incentives to initiate better \nOSH practices.404 \n\n**Management systems**and policies contribute to better prevention; they include ethical considerations \n(corporate responsibility programmes, sustainability and environmental reports), or quality objectives \n(quality management) particularly in global and large companies. Most of them cover all aspects of the \nbusiness activities and**OSH is one of these aspects**. Well known are the standards of the International \nOrganisation for Standardization (ISO), namely ISO 9001, Quality management systems, ISO 14001 \nEnvironmental management systems - Requirements with guidance for use, and ISO 31000, Risk \nmanagement - Principles and guidelines. 405 ", + "page_start": 125, + "page_end": 125, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**Table 17: Self-reported work accidents during the last 12 months (EU27) – LFS Ad hoc modules**\n\n\n \n \n \n \n [html]\n
UFS Ad hoc modulesSelf - reported work accidents200720132020
Percentage of respondents reporting one work accident3.20 %2.80 %2.30 %
Percentage of respondents reporting more than one work accident, Estimate EU - OSHA : 2.2 accidentsNot askedNot asked0.40 %
Persons in labour force ( EU - 27 )/ to ( former name : Active persons )184 m183 m194 m
- 2006- 2012
- 2019Extrapolated number of accidents ( in millions ) For 2020 also added 0.4 % with two or more accidents5.89 m5.12 m
1.94 × 2.3 = 4.461.94 × 0.4 = 0.785.24 mESAW Registered non - fatal accidents **( four days or more of obsence, 2006.2012.2019.6, 0.27 )**3.96 m2.94 m
3.14 m- 2006- 2012- 2019
", + "page_start": 67, + "page_end": 67, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv4.pdf", + "query": "In the context of research publication, what is HAL ?", + "target_page": 3, + "target_passage": "Hyper Articles en Ligne (HAL) is a French open archive of scholarly documents from all academic fields.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "3.1.2 HAL (Clustering) \n\nHyper Articles en Ligne (HAL) is a French open \narchive of scholarly documents from all academic \nfields. Scrapping this resource, we fetched 85,000 \npublications in French5. We extracted IDs, titles \nand the author’s choice among domain labels. The \nlast 2 are provided by authors when submitting \ntheir papers to HAL. Since domain annotations are \nprovided, the dataset can be used for many tasks, \nsuch as topic modeling or text classification. To en- \nsure the dataset quality is suitable for a benchmark, \nfurther data cleaning has been performed: \n\n3.1 New Datasets \n\nWe identified 7 datasets relevant to French in the ex- \nisting MTEB, which we assume are of good quality. \nWe complemented these with 8 external relevant \ndatasets proposed in the literature, such as BSARD \n(Louis and Spanakis, 2022) and Alloprof (Lefebvre- \nBrossard et al., 2023), which are proven to be good \nquality. We created 3 new ones presented in Table 1 \nand assessed their quality with various procedures \nand metrics. In addition to all performed checks, \nwe run multiple models on these datasets and pro- \nvide results to show that they are neither trivial nor \nimpossible to solve (see Tables 10, 11, 12 and 13). \nTherefore, as of today, our French MTEB \nruns on 18 datasets. Some datasets are framed \ndifferently according to the task category they \nare used with. For example, MasakhaNEWS \ndataset \nis used for \nboth Classification (MasakhaNEWSClassification) \nand Clustering (MasakhaNEWSClusteringS2S and ", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv4.pdf" + }, + { + "text": "HAL Figure 6 is an extract from the HAL \ndataset. Table 4 lists the distribution of classes \n(domain field) for the HAL dataset on raw \nsubset and mteb_eval subset, which is used \nfor MTEB evaluation. \nLabels descriptions \ncan be found at this URL: https://api.archives- \nouvertes.fr/ref/domain/?q=*:*&rows=393 or in Ta- \nble 4. After pre-processing, mteb_eval covers titles \nfrom 10 domains as classes with less than 500 sam- \nples were removed. In the MTEB evaluation subset \nof the dataset, titles composed of 2 words or less \nhave been removed (371 samples), resulting in an \naverage word count of 13.4. Figure 7 shows the \nword count distribution per title. Furthermore, the \ndataset has been cleaned up by manually remov- \ning all non-French titles. Additionally, it can be \nobserved in Table 4 that in the original raw dataset, \nthe shs and sdv classes represent by far the majority \nof the dataset samples with respectively 58706 sam- \nples (73%) and 11049 samples (13%). In order to ", + "page_start": 11, + "page_end": 11, + "source_file": "arxiv4.pdf" + }, + { + "text": "McGarry, Ken (1 December 2005). \"A survey of interestingness measures for knowledge \n\ndiscovery\".*The Knowledge Engineering Review*.**20**(1): 39–61. \ndoi:10.1017/S0269888905000408 (https://doi.org/10.1017%2FS0269888905000408). \nS2CID 14987656 (https://api.semanticscholar.org/CorpusID:14987656). ", + "page_start": 60, + "page_end": 60, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Reporting for specific materials, systems and methods \n\nWe require information from authors about some types of materials, experimental systems and methods used in many studies. Here, indicate whether each material, \nsystem or method listed is relevant to your study. If you are not sure if a list item applies to your research, read the appropriate section before selecting a response. ", + "page_start": 14, + "page_end": 14, + "source_file": "pubmed4.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Example 6 - 8 Ansible 7nodes inventory example
Hown - research - research - research - research - research - research - research - research
H + 70ades ( Diffaster - Tnfra, 3xklarkers ( Appl icat tions ) and 1 Load Balancer ):
Hown - researchers - researchers - research - research - research - research - research - research - research - research
[ 0SEv3 : vars ]
Hown - research - research - research - research - research - research - research
## Ans1b1e Vars
Hown - research - research - research - research - research - research - research
timeout = 60
# ans1b1e_user =| { CHANGEME_ANS1BLE_SSH_USER } }
# ans1b1e_becone = yes
ansible_user = root
Hown - research - research - research - research - research - research - research
# θ OpenSh1ft Bas1c Vars
Hown - research - research - research - research - research - research - research
# Dep1oyment type
opensh1ft_dep1oyment_type = opensh1ft - enterpr1se
# kRKING : only d1sab1e these checks in LAB / TEST environments
# opensh1ft_d1sab1e_check =\" d1sk_ava11ab11ty_nemory_ava11ab11ty *
# OpenSh1ft Vers1on :
opensh1 ft_re1ease = 3.11
opensh1ft_1mage_tag • v3.11.154
opensh1ft_pkg_vers1on =− 3.11.154
# 1rewa11d recommended for new 1nsta11at1at1ons ( default 1.1ptab1es ) os_f1rewa11_use_f1rewa11d = True
", + "page_start": 137, + "page_end": 137, + "source_file": "sg248459.pdf" + }, + { + "text": "IGM Chicago (30 June 2017). \"Robots and Artificial Intelligence\" (http://www.igmchicago.org/sur \nveys/robots-and-artificial-intelligence).*igmchicago.org*. Archived (https://web.archive.org/we \nb/20190501114826/http://www.igmchicago.org/surveys/robots-and-artificial-intelligence) \nfrom the original on 1 May 2019. Retrieved 3 July 2019. \n\nIphofen, Ron; Kritikos, Mihalis (3 January 2019). \"Regulating artificial intelligence and robotics: \n\nethics by design in a digital society\".*Contemporary Social Science*.**16**(2): 170–184. \ndoi:10.1080/21582041.2018.1563803 (https://doi.org/10.1080%2F21582041.2018.156380 \n3). ISSN 2158-2041 (https://search.worldcat.org/issn/2158-2041). S2CID 59298502 (https:// \napi.semanticscholar.org/CorpusID:59298502). \n\nJordan, M. I.; Mitchell, T. M. (16 July 2015). \"Machine learning: Trends, perspectives, and ", + "page_start": 57, + "page_end": 57, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Barfield, Woodrow; Pagallo, Ugo (2018).*Research handbook on the law of artificial intelligence*. \nCheltenham, UK: Edward Elgar Publishing. ISBN 978-1-7864-3904-8. OCLC 1039480085 \n(https://search.worldcat.org/oclc/1039480085). \n\nBeal, J.; Winston, Patrick (2009), \"The New Frontier of Human-Level Artificial Intelligence\", \n\n*IEEE Intelligent Systems*, vol. 24, pp. 21–24, doi:10.1109/MIS.2009.75 (https://doi.org/10.11 \n09%2FMIS.2009.75), hdl:1721.1/52357 (https://hdl.handle.net/1721.1%2F52357), \nS2CID 32437713 (https://api.semanticscholar.org/CorpusID:32437713) \n\nBerdahl, Carl Thomas; Baker, Lawrence; Mann, Sean; Osoba, Osonde; Girosi, Federico (7 \n\nFebruary 2023). \"Strategies to Improve the Impact of Artificial Intelligence on Health Equity: \nScoping Review\" (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11041459).*JMIR AI*.**2**: \ne42936. doi:10.2196/42936 (https://doi.org/10.2196%2F42936). ISSN 2817-1705 (https://se \narch.worldcat.org/issn/2817-1705). PMC 11041459 (https://www.ncbi.nlm.nih.gov/pmc/articl \nes/PMC11041459). PMID 38875587 (https://pubmed.ncbi.nlm.nih.gov/38875587). \nS2CID 256681439 (https://api.semanticscholar.org/CorpusID:256681439). ", + "page_start": 52, + "page_end": 52, + "source_file": "wikipedia3.pdf" + }, + { + "text": "\n- \n\nCL ", + "page_start": 271, + "page_end": 271, + "source_file": "00-80T-80.pdf" + }, + { + "text": "Print ISBN 978-92-9479-934-0 doi: 10.2802/26873 \n\nPDF ISBN 978-92-9479-935-7 doi: 10.2802/56459 ", + "page_start": 1, + "page_end": 1, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**INSTITUTIONS**\n\nSave time and reduce errors \nwith automated \ninformation-sharing and \ncross-system interoperability \n\nSpend more time doing \nresearch, less time managing it \n\n**Identify, track, and report on**\n**researchers’ affiliations and**\n**contributions (publications, peer**\n**reviews, grants, and more)**\nManage your organization \nname and your researchers' \nconnections with it \n\nControl and manage a trusted \nand easily shareable record of \ntheir research activities and \naffiliations – for free \n**Why Connect with ORCID?**\n**Hundreds of members and systems use ORCID globally** Maintain links with your \nresearchers - past, \npresent, and future \n\n**Institutions Face a Rising**\n**Tide of Research**\n**5.5 MILLION+**\n**live ORCID iDs registered since its 2012 launch**\n\n**OVER 3 MILLION**\n**Three Ways to Get Involved**\n**scholarly articles published per year**\nSource: The STM Report, October 2018 \n\n**1. Encourage and support your researchers in getting, sharing, and**\n**using their ORCID iD**\n**2. Invest in integrating ORCID into your systems**\n**3. Connect data to and from your researchers’ ORCID records to**\n**support information use and reuse across organizations**", + "page_start": 0, + "page_end": 0, + "source_file": "infographic3.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv4.pdf", + "query": "What is the effect of embedding dimension on embedding representation quality ?", + "target_page": 6, + "target_passage": "we observe a performance correla- tion with the embedding dimension and the model’s number of parameters, which are often correlated themselves", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "tation and, in practical applications, the under- \nlying storage and compute costs. We selected \nmodels with embedding dimensions ranging \nfrom 384 to 4096. \n\net al., 2019), their variants optimized for semantic \nsimilarity (Reimers and Gurevych, 2019), numer- \nous multilingual models performing at the top on \nMTEB (e.g E5 and T5), Bloom variants (Zhang \net al., 2023), models based on very recent power- \nful LLMs (Wang et al., 2023; Faysse et al., 2024) \nand finally the proprietary models of OpenAI, Co- \nhere and Voyage. Certain models were selected in \nmultiple sizes to isolate the dimensionality effect \neffectively. We provide information on the mod- \nels’ licenses as reported in the Hugging Face hub10. \nHowever, we encourage readers to conduct further \nresearch before utilizing a model. \n• Sequence length: Being the number of to- \nkens that a model can consider as input, the \nsequence length is important as it impacts the \nunit that can be encoded (sentence, paragraph, \ndocument). However, encoding overly long \nsequences requires efficiently storing the rele- \nvant information into a single vector. Among \nthe selected methods, this criterion varies \nfrom 128 tokens to 32768. ", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv4.pdf" + }, + { + "text": "But this is not to say that there is no room for \nimprovement. Ethayarajh (2019) measure how \nsimilar the embeddings for identical words are in \nevery layer, reporting that later BERT layers pro- \nduce more context-specific representations3. They \nalso find that BERT embeddings occupy a narrow \ncone in the vector space, and this effect increases \nfrom the earlier to later layers. That is, two ran- \ndom words will on average have a much higher \ncosine similarity than expected if embeddings \nwere directionally uniform (isotropic). Since \nisotropy was shown to be beneficial for static word \nembeddings (Mu and Viswanath, 2018), this might \nbe a fruitful direction to explore for BERT. \n\nAnother direction is information-theoretic prob- \ning. Pimentel et al. (2020) operationalize prob- \ning as estimating mutual information between the \nlearned representation and a given linguistic prop- \nerty, which highlights that the focus should be not \non the amount of information contained in a rep- \nresentation, but rather on how easily it can be ex- \ntracted from it. Voita and Titov (2020) quantify \nthe amount of effort needed to extract information \nfrom a given representation as minimum descrip- \ntion length needed to communicate both the probe \nsize and the amount of data required for it to do \nwell on a task. ", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Figure 1 shows a global model comparison \nacross all datasets. The models are arranged hori- \nzontally according to their performance, with the \nbest models on the left. The black bars repre- \nsent the statistical equivalence between the mod- \nels’ performances. The statistically equivalent \ntop performers for this benchmark are OpenAI’s \nmodels text-embedding-3-large, text-embedding-3- \nsmall and text-embedding-ada-002. Interestingly, \nmany models do not show a significant perfor- \nmance gap between their base and large flavours. \nSome French models stand out among the multi- \nlingual models, such as Solon-embeddings-large- \n0.1, sentence_croissant_alpha_v0.3 and sentence- \ncamembert-large. \nFurthermore, we observe a performance correla- \ntion with the embedding dimension and the model’s \nnumber of parameters, which are often correlated \nthemselves. This appears very clearly on the rela- \ntive ranking of E5 and T5 models (see Figure 1). \nHowever, some small models perform very well \non the benchmark, such as the standard version \nof the multilingual universal sentence encoder or \nSolon-embeddings-base-1.0. Notably, the maxi- \nmum sequence length, while an important criterion \nfor generative tasks with LLMs, is less correlated \nwith performance than the other dimensions. This \ncan be explained by many datasets containing rel- \natively small texts (see appendix Table 3 showing \nthat 14 datasets have less than 50 tokens). ", + "page_start": 5, + "page_end": 5, + "source_file": "arxiv4.pdf" + }, + { + "text": "Using the overall benchmark results, our goal \nwill be to answer the following research questions: \nQ1: Is a model outstanding on all tasks? \nAs we are trying to find out whether one embed- \nding model is statistically better than the others for \nFrench, the objective will also be to analyze the \nperformance of the models by tasks to facilitate \nmodel choice for specific applications. \nQ2: Are there any links between the model charac- \nteristics and performance? \nIn section 3.2, we undertook the substantial task of \ngathering the characteristics of all evaluated mod- \nels. The goal here will be to analyze their impact \non performance and draw conclusions about, for \nexample, the relationship between embedding di- \nmension and model ranking on the benchmark. \nQ3: Do monolingual models have multilingual ca- \npabilities? \nWe interrogate the ability of a model trained exclu- \nsively in one language to perform well in another \nlanguage. \nQ4: Are there any correlations between datasets \n\n• Model types: There are several strategies to \ngenerate text embeddings such as aggregat- \ning (e.g. with average pooling) token-level \nembeddings from raw pre-trained models, or \nadding an extra contrastive learning step on a \nsentence similarity task with, optionally, ad- \nditional transformation layers. We included \nmodels of all types in our benchmark, summa- \nrizing the model type information under two \nrelevant criteria: finetuned vs pretrained, and \ntrained for sentence similarity or not. ", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv4.pdf" + }, + { + "text": "4.1 Predicting Representations versus Pixels \n\nWe first ablate the effect of computing the prediction \nloss in representation space. We train a pair of ViT-L/16 \nmodels using either a V-JEPA feature prediction loss, \nor a mean-squared error loss with the normalized pixel \nvalues, as in masked autoencoders (He et al., 2021), and \nperform a sweep over the learning rate and weight decay \nschedules for both approaches. All models are pretrained \non VideoMix2M for 90K iterations with a batch size of \n3072 using multi-block masking. We examine perfor- \nmance on Kinetics-400 (K400), Something-Something-v2 \n(SSv2), and ImageNet-1K (IN1K), using a frozen back- \nbone with an attentive probe, and report top-1 accuracy \nusing a single center view. We also examine end-to-end \nfine-tuning performance of the models on Kinetics-400. \n\nResults of this comparison are reported in Table 1 and \nindicate that predicting in feature space provides a con- \nsistent performance improvement over pixel space pre- \ndiction in both frozen evaluation of the video backbone, \nas well as end-to-end fine-tuning. ", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv3.pdf" + }, + { + "text": "Embeddings are dense vector representations that \ncapture the semantics of an input. The first emblem- \natic example is Word2Vec, introduced by Mikolov \net al. (2013). It consists of neural architectures \ntrained to learn high-quality word representations \nfrom contextual relationships in vast amounts of \ntext. Other models were proposed since then, lever- \naging the transformer architecture (Vaswani et al., \n2017) to produce both generic and contextualized \nword embeddings using self-attention. Many mod- \nels now exist with various architectures, mono- \nlingual or multilingual, pre-trained or fine-tuned \n(Naseem et al., 2021; Ding et al., 2023). \n\n2 Related Work \n\nSentence Embeddings Sentence embeddings are \nrequired for many language tasks, such as Semantic \nTextual Similarity (STS) and knowledge retrieval. \nMany models have been proposed in the litera- \nture, leveraging pooling strategies (Devlin et al., \n2019; Muennighoff, 2022) or similarity fine-tuning \n(Reimers and Gurevych, 2019) using a contrastive \nframework (Gao et al., 2021; Neelakantan et al., \n2022; Ni et al., 2021; Wang et al., 2022; Zhang \net al., 2023), leveraging prompts (Wang et al., 2023) \nor a two steps training process (Chen et al., 2024; \nLee et al., 2024). Few French-language models \nhave been proposed in the literature (Martin et al., \n\nIn this work, our primary objective is to in- \ntroduce a large-scale embedding benchmark for ", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv4.pdf" + }, + { + "text": "Table 1 Pixels vs. Featurized Targets. We ablate the effect of computing the prediction loss in feature space vs pixel space. All \nmodels are trained on VideoMix2M for 90K iterations with a batch size of 3072 using the multi-block prediction task. We \nexamine downstream performance using a frozen backbone with attentive probing, and report top-1 accuracy using a single \ncenter view. We also examine end-to-end fine-tuning performance of the models on K400. Predicting in feature space provide \na consistent improvement over pixel space prediction. ", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv3.pdf" + }, + { + "text": "Liang Wang, Nan Yang, Xiaolong Huang, Linjun Yang, \nRangan Majumder, and Furu Wei. 2023. Improving \ntext embeddings with large language models. arXiv \npreprint arXiv:2401.00368. \n\nArvind Neelakantan, Tao Xu, Raul Puri, Alec Rad- \nford, Jesse Michael Han, Jerry Tworek, Qiming Yuan, \nNikolas Tezak, Jong Wook Kim, Chris Hallacy, et al. \n2022. Text and code embeddings by contrastive pre- \ntraining. arXiv preprint arXiv:2201.10005. \n\nSilvan Wehrli, Bert Arnrich, and Christopher Irrgang. \n2024. German text embedding clustering benchmark. \n\nJianmo Ni, Gustavo Hernández Ábrego, Noah Constant, \nJi Ma, Keith B. Hall, Daniel Cer, and Yinfei Yang. \n2021. Sentence-t5: Scalable sentence encoders from \npre-trained text-to-text models. \n\nShitao Xiao, Zheng Liu, Peitian Zhang, Niklas Muen- \nnighoff, Defu Lian, and Jian-Yun Nie. 2024. C-pack: \nPackaged resources to advance general chinese em- \nbedding. ", + "page_start": 10, + "page_end": 10, + "source_file": "arxiv4.pdf" + }, + { + "text": "the other models. However, other models should be \nconsidered for their performance on specific tasks, \nbeing open source or having a small embedding \ndimension. \n\nThis work opens several doors for future im- \nprovements. By examining dataset diversity in \nterms of topics and model ranking, we observe \nthat the benchmark would benefit from additional \ndatasets that introduce higher diversity. Beyond \nclassification, many tasks focus on semantic simi- \nlarity, explaining the strong performance of models \ntrained for similarity. Exploring novel tasks in the \ngenerative spectrum or evaluating token embed- \ndings (contextualized or not) on tasks like Named \nEntity Recognition could be an interesting path \nfor future exploration. There are also opportuni- \nties for improvements on the model side. With \nnumerous existing models that could be added to \nthe leaderboard and many new proposals awaiting. \nFor instance, we can already see the promising ca- \npabilities of early variants of recent models (Faysse \net al., 2024) and expect that future proposals will \ncome to compete strongly with closed-source mod- \nels. Ultimately, we hope to see the emergence of \nother language-specific MTEB variants (e.g. for \nhigh-resource languages like Spanish and German), \nenabling a more comprehensive evaluation of mul- \ntilingual model performance. ", + "page_start": 7, + "page_end": 7, + "source_file": "arxiv4.pdf" + }, + { + "text": "Theoretical motivation. A theoretical motivation for \nthe effectiveness of this collapse prevention strategy was \nproposed in Grill et al. (2020) for the BYOL method. We \nprovide a simple adaptation of their analysis for our ℓ1 \nloss. For ease of exposition, we will disregard the effect of \nthe conditioning variable z and consider one dimensional \nrepresentations. Denote the representation Eθ(y) by \na random variable Y . The optimal predictor under \nequation (1) is thus given by the following functional \nexpression, \n\nFigure 2 Joint-Embedding Predictive Architectures are \ntrained to predict the representation of an input y from \nthe representation of another input x. The additional vari- \nable z provides the predictor with information about the \ntransformation that computes y from x. \n\nOur goal is to explore the effectiveness of feature pre- \ndiction as a stand-alone objective for learning visual \nrepresentations from video. To that end, we use a \njoint-embedding predictive architecture (JEPA) (LeCun, \n2022); see Figure 2. The main idea behind a JEPA is \nto learn by predicting the representation of an input y \nfrom the representation of another input x. The basic \narchitecture is made up of an encoder, Eθ( \n), which com- \n· \nputes the representation of the inputs, and a predictor, \n), which predicts the representation of y from the \nPϕ( \n· \nrepresentation of x, conditioned on a variable z indicat- \ning the transformation (or corruption) between x and \ny. Conditioning on z enables the generation of distinct \npredictions for various transformations of x. ", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv3.pdf" + } + ] + }, + { + "references": { + "source_file": "EN-Draft FWC for services 0142.pdf", + "query": "What is the maximum amount covered by the FWC of the europeean chemical agency ?", + "target_page": 6, + "target_passage": "The maximum amount covering all purchases under this FWC, including all renewals and reimbursement of expenses is EUR 1 000 000 (one million)", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "[The maximum amount covering all services to be provided under this specific \ncontract including reimbursement of expenses and excluding price revision is EUR \n[*amount in figures and in words*].] \n\n**3.2**\n\n[Reimbursement of expenses is not applicable to this specific contract.] [Within the \nmaximum amount, up to EUR [*amount in figures and in words*] is earmarked for \nexpenses, which must be reimbursed in accordance with the FWC]. \n\n***\n\n**I.1.1.1.4.**Article 4 communication details \n\nFor the purpose of this specific contract, communications must be sent to the following \naddresses: \n\nContracting authority: \n\nEuropean Chemicals Agency \n\n [Directorate [*complete*]] \n\n[Unit [*complete*]] \n\n[*Postcode and city*] \n\nE-mail: [*insert functional mailbox*] ", + "page_start": 43, + "page_end": 43, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "HAVE AGREED \n\n**I.1.1.1.1.**Article 1 Subject matter \n\n**1.1**\n\nThis specific contract implements framework contract (FWC) No ECHA/2019/355 \nsigned by the parties on [*complete date*]*.*\n\n**1.2**\n\nIn accordance with the provisions set out in the FWC and in this specific contract \nand [its][their] annex[es], which form an integral part of it, the contractor must \nprovide the [following services:] [services specified in Annex [*complete*]*.*] \n\n**I.1.1.1.2.**Article 2 Entry into force and duration \n\n**2.1** This specific contract enters into force on the date on which the last party signs it. \n\n**2.2**\nThe provision of the services starts from the date of entry into force of this specific \ncontract. \n\n**2.3**\n\nThe provision of the services must not exceed [*complete*]**[**days] [months**]**. The \nparties may extend the duration by written agreement before it elapses and before \nexpiry of the FWC. \n\n**I.1.1.1.3.**Article 3 Price \n\n**3.1**\n\nThe price payable under this specific contract excluding reimbursement of expenses \nis EUR [*amount in figures and in words*]. ", + "page_start": 43, + "page_end": 43, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "Within a maximum of 5 working days of a specific contract or order form being sent by the \nAgency to the contractor, the Agency shall receive it back, duly signed and dated. The \nperiod allowed for the execution of the tasks shall start to run on the date of signature of \nthe specific contract or order form by both parties. \n\n**I.5. Prices**\n\n**I.5.1. Maximum amount of the FWC and maximum prices**\n\nThe maximum amount covering all purchases under this FWC, including all renewals and \nreimbursement of expenses is**EUR 1 000 000**(one million). However, this does not bind \nthe contracting authority to purchase for the maximum amount. \n\nThe maximum unit prices of the services are: \n\nSenior experts: \nExperts: [ ] EUR per man-day \n[ ] EUR per man-day \n\n**I.5.2. Price revision index**\n\nPrice revision is determined by the formula set out in Article II.20 and using the trend in \nthe harmonised indices of consumer prices (HICP) ‘Euro area (19 countries)’ published at \nhttp://ec.europa.eu/eurostat/web/hicp/data/database under HICP (2015 = 100) - monthly \ndata (index) (prc_hicp_midx).] ", + "page_start": 5, + "page_end": 5, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "**DRAFT FRAMEWORK CONTRACT FOR SERVICES**\n\n**NUMBER — ECHA/2019/355**\n\n1. The European Chemicals Agency in Helsinki (‘the contracting authority’), represented \nfor the purposes of signing this framework contract by [*forename, surname, function,*\n*directorate of authorising officer*], \n\nof the one part and \n\n2. [*Full official name*] \n\n[*Official legal form*] \n\n**[***Statutory registration number or ID or passport number***]**\n\n[*Full official address*] \n\n[*VAT registration number*] \n\n[appointed as the leader of the group by the members of the group that submitted the \njoint tender] \n\n[*For joint tenders,*r*epeat these data as many times as there are contractors and continue*\n*numbering*] \n\n([collectively] ‘the contractor’), represented for the purposes of the signature of this \nframework contract by [*forename, surname, function of legal representative and name of*\n*company in the case of a joint tender*], \n\non the other part, ", + "page_start": 0, + "page_end": 0, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "**No [*complete*]**\n\n**implementing framework contract No ECHA/2019/355**\n\n1. The European Chemicals Agency in Helsinki (‘the contracting authority’), represented \nfor the purposes of signing this specific contract by [*forename, surname, function,*\n*department of authorising officer*], \n\nand ", + "page_start": 42, + "page_end": 42, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "On the basis of the final audit findings, the contracting authority may recover all \nor part of the payments made in accordance with Article II.23 and may take any \nother measures which it considers necessary. \n\n**II.24.5**In accordance with Council Regulation (Euratom, EC) No 2185/96 of \n11 November 1996 concerning on-the-spot checks and inspection carried out by \nthe Commission in order to protect the European Communities’ financial interests \nagainst*fraud*and other*irregularities*and Regulation (EU, Euratom) No 883/2013 \nof the European Parliament and of the Council of 11 September 2013 concerning \ninvestigations conducted by the European Anti-Fraud Office, the European Anti- \nFraud Office may carry out investigations, including on the spot checks and \ninspections, to establish whether there has been*fraud*, corruption or any other \nillegal activity under the contract affecting the financial interests of the Union. \nFindings arising from an investigation may lead to criminal prosecution under \nnational law. \n\nThe investigations may be carried out at any moment during the provision of the \nservices and up to five years starting from the payment of the balance of the last \nspecific contract issued under this FWC. ", + "page_start": 37, + "page_end": 37, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "**I.6.3. Payment of the balance**\n\n1. The contractor (or leader in the case of a joint tender) may claim the payment of the \nbalance in accordance with Article II.21.6. \n\nThe contractor (or leader in the case of a joint tender) must send an invoice in paper format \nor via*e-PRIOR*for payment of the balance due under a specific contract, as provided for \nin the tender specifications and accompanied by the following: \n\n a list of all*pre-existing rights*to the*results*or parts of the*results*or a declaration stating \n\nthat there are no such*pre-existing rights*, as provided for in Article II.13.4; \n\n document of acceptance by ECHA of the deliverables as defined in the*tender*\n\n*specifications or specific contract*\n\n statements of reimbursable expenses in accordance with Article II.22. \n\n2. The contracting authority must approve the submitted documents and pay within 30 \ndays from receipt of the invoice. \n\n3. The contracting authority may suspend the time limit for payment specified in point 2 \nin accordance with Article II.21.7. Once the suspension is lifted, the contracting authority \nshall give its approval and pay within the remainder of the time-limit indicated in point 2 \nunless it rejects partially or fully the submitted documents. \n\n**I.6.4. Performance guarantee**\n\nPerformance guarantee is not applicable to this FWC. \n\n**I.6.5. Retention money guarantee**\n\nRetention money guarantee is not applicable to this FWC. \n\n**I.7. Bank account**\n\nPayments must be made to the contractor’s (or leader’s in the case of a joint tender) bank \naccount denominated in euro, identified as follows: \n\nName of bank: \n\nFull address of branch: \n\nExact denomination of account holder: \n\nFull account number including bank codes: \n\n[IBAN1 code:] \n\n**I.8. Communication details**\n\nFor the purpose of this FWC, communications must be sent to the following addresses: \n\nContracting authority: \n\nEuropean Chemicals Agency \nDirectorate and Unit D3, Risk Management I \nTelakkakatu 6 \n00150 Helsinki \nFinland \nE-mail: [insert functional mailbox] ", + "page_start": 6, + "page_end": 6, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "**I. Special Conditions**\n\n**I.1. Order of priority of provisions**\n\nIf there is any conflict between different provisions in this FWC, the following rules must \nbe applied: \n\n(a) The provisions set out in the special conditions take precedence over those in the \n\nother parts of the FWC. \n\n(b) The provisions set out in the general conditions take precedence over those in the \n\n*order form*and specific contract (Annex III) \n\n(c) The provisions set out in the*order form*and specific contract (Annex III) take \n\nprecedence over those in the other annexes. \n\n(d) The provisions set out in the tender specifications (Annex I) take precedence over \n\nthose in the tender (Annex II). \n\n(e) The provisions set out in the FWC take precedence over those in the specific \n\ncontracts. \n\n(f) The provisions set out in the specific contracts take precedence over those in the \n\nrequests for services. \n\nAny reference to specific contracts applies also to order forms. \n\n**I.2. Subject matter**\n\nThe subject matter of the FWC is scientific support to ECHA for work on restrictions, \ndose-response functions, Annex XIV, POPs and dossier evaluation. \n\n**I.3. Entry into force and duration of the FWC**", + "page_start": 4, + "page_end": 4, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "287 EU-OSHA, Emerging risks: Workers’ safety and health in green jobs \n288 United States Environmental Protection Agency: Green Engineering \n289 United Nations Environmental Programme (UNEP): Global Chemicals Outlook \n290 CEFIC, Facts and figures: Chemical Industry Contributes $5.7 Trillion to Global GDP and Supports 120 Million \nJobs, New Report Shows, here \n291 UNEP, 2019: Global Chemicals Outlook II - From Legacies to Innovative Solutions: Implementing the 2030 \nAgenda for Sustainable Development (p. 27). \n292 Naidu et al., 2021: Chemical pollution: A growing peril and potential catastrophic risk to humanity \n293 Eurostat: Production and consumption of chemicals by hazard class, here \n294 Statistics Sweden SCB: Environmental accounts – Chemical indicators 2019 \n295 EU-OSHA: ESENER Data visualisation 2019 Risk factors present in the establishment – Chemical or \nbiological substances. \n296 OSHWiki: Climate change - Impact on Occupational Safety and Health. \n297 Pace advanced from intergenerational conception (children live and work like their parents) to a generational \nconception (children work in a different occupation, compared to their parents but have one main job all their life), \nto intragenerational conceptions (several changes during lifetime), according to: Rosa, 2013: Social acceleration – \nA new theory of modernity. \n298 Eurostat: Employment and activity by sex, age and citizenship (%) - annual data, here ", + "page_start": 151, + "page_end": 151, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "E u ronet maintains both a fully funded and self-funded health insurance programs, which cover all full-time employees and their families at \nno charge to the employees. In order to administer the self-funded program, Euronet has entered into a contractual agreement with a third \np a rty administrator by which Euronet pays a monthly service fee to the administrator based upon employee enrollment participating in the \nself-funded plan. Euronet has also purchased a stop/loss insurance policy to limit Euro n e t ’s self-funded liability to $25,000 per employee per \nyear and a total loss on all claims to approximately $31,000 per month. ", + "page_start": 45, + "page_end": 45, + "source_file": "NASDAQ_EEFT_2000.pdf" + } + ] + }, + { + "references": { + "source_file": "EN-Draft FWC for services 0142.pdf", + "query": "How can I get compensation if the european chemical agency terminates a contract we have ?", + "target_page": 11, + "target_passage": "If the FWC or a specific contract is terminated: a) neither party is entitled to compensation", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "**No [*complete*]**\n\n**implementing framework contract No ECHA/2019/355**\n\n1. The European Chemicals Agency in Helsinki (‘the contracting authority’), represented \nfor the purposes of signing this specific contract by [*forename, surname, function,*\n*department of authorising officer*], \n\nand ", + "page_start": 42, + "page_end": 42, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "[The maximum amount covering all services to be provided under this specific \ncontract including reimbursement of expenses and excluding price revision is EUR \n[*amount in figures and in words*].] \n\n**3.2**\n\n[Reimbursement of expenses is not applicable to this specific contract.] [Within the \nmaximum amount, up to EUR [*amount in figures and in words*] is earmarked for \nexpenses, which must be reimbursed in accordance with the FWC]. \n\n***\n\n**I.1.1.1.4.**Article 4 communication details \n\nFor the purpose of this specific contract, communications must be sent to the following \naddresses: \n\nContracting authority: \n\nEuropean Chemicals Agency \n\n [Directorate [*complete*]] \n\n[Unit [*complete*]] \n\n[*Postcode and city*] \n\nE-mail: [*insert functional mailbox*] ", + "page_start": 43, + "page_end": 43, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "**I.6.3. Payment of the balance**\n\n1. The contractor (or leader in the case of a joint tender) may claim the payment of the \nbalance in accordance with Article II.21.6. \n\nThe contractor (or leader in the case of a joint tender) must send an invoice in paper format \nor via*e-PRIOR*for payment of the balance due under a specific contract, as provided for \nin the tender specifications and accompanied by the following: \n\n a list of all*pre-existing rights*to the*results*or parts of the*results*or a declaration stating \n\nthat there are no such*pre-existing rights*, as provided for in Article II.13.4; \n\n document of acceptance by ECHA of the deliverables as defined in the*tender*\n\n*specifications or specific contract*\n\n statements of reimbursable expenses in accordance with Article II.22. \n\n2. The contracting authority must approve the submitted documents and pay within 30 \ndays from receipt of the invoice. \n\n3. The contracting authority may suspend the time limit for payment specified in point 2 \nin accordance with Article II.21.7. Once the suspension is lifted, the contracting authority \nshall give its approval and pay within the remainder of the time-limit indicated in point 2 \nunless it rejects partially or fully the submitted documents. \n\n**I.6.4. Performance guarantee**\n\nPerformance guarantee is not applicable to this FWC. \n\n**I.6.5. Retention money guarantee**\n\nRetention money guarantee is not applicable to this FWC. \n\n**I.7. Bank account**\n\nPayments must be made to the contractor’s (or leader’s in the case of a joint tender) bank \naccount denominated in euro, identified as follows: \n\nName of bank: \n\nFull address of branch: \n\nExact denomination of account holder: \n\nFull account number including bank codes: \n\n[IBAN1 code:] \n\n**I.8. Communication details**\n\nFor the purpose of this FWC, communications must be sent to the following addresses: \n\nContracting authority: \n\nEuropean Chemicals Agency \nDirectorate and Unit D3, Risk Management I \nTelakkakatu 6 \n00150 Helsinki \nFinland \nE-mail: [insert functional mailbox] ", + "page_start": 6, + "page_end": 6, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "**I.11. Termination by either party2**\n\nEither party may terminate the FWC and/or the FWC and specific contracts by sending \n*formal notification*to the other party with three months written notice. \n\nIf the FWC or a specific contract is terminated: \n\na) neither party is entitled to compensation; \n\nb) the contractor is entitled to payment only for the services provided before \ntermination takes effect. \n\nThe second, third and fourth paragraphs of Article II.18.4 apply. \n\n**I.12. Applicable law and settlement of disputes**\n\n**I.12.1**The FWC is governed by Union law, complemented, where necessary, by the law of \n\nFinland. \n\n**I.12.2**The courts of Finland have exclusive jurisdiction over any dispute regarding the \n\ninterpretation, application or validity of the FWC. \n\n**I.13. Interinstitutional FWC**\n\nNot applicable \n\n**I.14. Service provided on the premises of the contracting authority**\n\nNot applicable. ", + "page_start": 10, + "page_end": 10, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "**DRAFT FRAMEWORK CONTRACT FOR SERVICES**\n\n**NUMBER — ECHA/2019/355**\n\n1. The European Chemicals Agency in Helsinki (‘the contracting authority’), represented \nfor the purposes of signing this framework contract by [*forename, surname, function,*\n*directorate of authorising officer*], \n\nof the one part and \n\n2. [*Full official name*] \n\n[*Official legal form*] \n\n**[***Statutory registration number or ID or passport number***]**\n\n[*Full official address*] \n\n[*VAT registration number*] \n\n[appointed as the leader of the group by the members of the group that submitted the \njoint tender] \n\n[*For joint tenders,*r*epeat these data as many times as there are contractors and continue*\n*numbering*] \n\n([collectively] ‘the contractor’), represented for the purposes of the signature of this \nframework contract by [*forename, surname, function of legal representative and name of*\n*company in the case of a joint tender*], \n\non the other part, ", + "page_start": 0, + "page_end": 0, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "(g) if the contractor does not comply with applicable obligations under environmental, \nsocial and labour law established by Union law, national law, collective agreements \nor by the international environmental, social and labour law provisions listed in \nAnnex X to Directive 2014/24/EU; \n\n(h) if the contractor is in a situation that could constitute a*conflict of interest*or a \n\n*professional conflicting interest*as referred to in Article II.7; \n\n(i) if a change to the contractor’s legal, financial, technical, organisational or ownership \nsituation is likely to substantially affect the*implementation of the FWC*or \nsubstantially modify the conditions under which the FWC was initially awarded; \n(j) in the event of*force majeure*, where either resuming implementation is impossible \nor the necessary ensuing amendments to the FWC or a specific contract would mean \nthat the tender specifications are no longer fulfilled or result in unequal treatment \nof tenderers or contractors; \n\n(k) if the needs of the contracting authority change and it no longer requires new \nservices under the FWC; in such cases ongoing specific contracts remain unaffected; \n(l) if the termination of the FWC with one or more of the contractors means that the \nmultiple FWC with reopening of competition no longer has the minimum required \nlevel of competition; \n\n(m) if the contractor is in breach of the data protection obligations resulting from \n\nArticle II.9.2; \n\n(n) if the contractor does not comply with the applicable data protection obligations \nresulting from Regulation (EU) 2016/679. \n\n**II.18.2. Grounds for termination by the contractor**\n\nThe contractor may terminate the FWC or any on-going specific contract if the contracting \nauthority fails to comply with its obligations, in particular the obligation to provide the \ninformation needed for the contractor to implement the FWC or to perform a specific \ncontract as provided for in the tender specifications. \n\n**II.18.3. Procedure for termination**\n\nA party must*formally notify*the other party of its intention to terminate the FWC or a \nspecific contract and the grounds for termination. \n\nThe other party has 30 days following the date of receipt to submit observations, including \nthe measures it has taken or will take to continue fulfilling its contractual obligations. \nFailing that, the decision to terminate becomes enforceable the day after the time limit for \nsubmitting observations has elapsed. \n\nIf the other party submits observations, the party intending to terminate must*formally*\n*notify*it either of the withdrawal of its intention to terminate or of its final decision to \nterminate. ", + "page_start": 30, + "page_end": 30, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "Within 60 days of the date of termination, the contractor must submit any report, \ndeliverable or*result*and any invoice required for services that were provided before the \ndate of termination. \n\nIn the case of joint tenders, the contracting authority may terminate the FWC or a specific \ncontract with each member of the group separately on the basis of points (d), (e) or (g) \nof Article II.18.1, under the conditions set out in Article II.11.2 \n\n**II.19. Invoices, value added tax and e-invoicing**\n\n**II.19.1. Invoices and value added tax**\n\nInvoices must contain the contractor’s (or leader’s in the case of a joint tender) \nidentification data, the amount, the currency and the date, as well as the FWC reference \nand reference to the specific contract. \n\nInvoices must indicate the place of taxation of the contractor (or leader in the case of a \njoint tender) for value added tax (VAT) purposes and must specify separately amounts not \nincluding VAT and amounts including VAT. \n\nThe contracting authority is exempt from all taxes and duties, including VAT, in accordance \nwith Articles 3 and 4 of the Protocol 7 of the Treaty on the Functioning of the European \nUnion on the privileges and immunities of the European Union. ", + "page_start": 31, + "page_end": 31, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "quality or continuity of the services. The parties may agree to draw up a transition plan \ndetailing the contractor’s assistance unless such plan is already detailed in other \ncontractual documents or in the tender specifications. The contractor must provide such \nassistance at no additional cost, except if it can demonstrate that it requires substantial \nadditional resources or means, in which case it must provide an estimate of the costs \ninvolved and the parties will negotiate an arrangement in good faith. \n\n**II.18.4. Effects of termination**\n\nThe contractor is liable for damage incurred by the contracting authority as a result of the \ntermination of the FWC or a specific contract, including the additional cost of appointing \nand contracting another contractor to provide or complete the services, except if the \ndamage is a result of a termination in accordance with Article II.18.1(j), (k) or (l) or Article \nII.18.2. The contracting authority may claim compensation for such damage. \n\nThe contractor is not entitled to compensation for any loss resulting from the termination \nof the FWC or a specific contract, including loss of anticipated profits, unless the loss was \ncaused by the situation specified in Article II.18.2. \n\nThe contractor must take all appropriate measures to minimise costs, prevent damage and \ncancel or reduce its commitments. ", + "page_start": 31, + "page_end": 31, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "*a specific contract*or any part of it: \n\n(a) if the procedure for awarding the FWC or a specific contract or the*implementation of*\n*the FWC*proves to have been subject to*irregularities, fraud or breach of obligations*; \n\n(b) in order to verify whether the presumed*irregularities, fraud*or*breach of obligations*\nhave actually occurred. \n\nThe contracting authority must*formally notify*the contractor of the suspension and the \nreasons for it. Suspension takes effect on the date of*formal notification*, or at a later date \nif the*formal notification*so provides. \n\nThe contracting authority must*notify*the contractor as soon as the verification is \ncompleted whether: \n\n(a) it is lifting the suspension; or \n(b) it intends to terminate the FWC or a specific contract under Article II.18.1(f) or \n(j). \n\nThe contractor is not entitled to compensation for suspension of any part of the FWC or a \nspecific contract. \n\nThe contracting authority may in addition suspend the time allowed for payments in \naccordance with Article II.21.7. \n\n**II.18. Termination of the FWC**\n\n**II.18.1. Grounds for termination by the contracting authority**\n\nThe contracting authority may terminate the FWC or any on-going specific contract in the \nfollowing circumstances: ", + "page_start": 29, + "page_end": 29, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "(a) if provision of the services under an on-going specific contract has not actually \nstarted within 15 days of the scheduled date and the contracting authority considers \nthat the new date proposed, if any, is unacceptable, taking into account \nArticle II.11.2; \n\n(b) if the contractor is unable, through its own fault, to obtain any permit or licence \n\nrequired for*implementation of the FWC*; \n\n(c) if the contractor does not implement the FWC or perform the specific contract in \naccordance with the tender specifications or*request for service*or is in breach of \nanother substantial contractual obligation or repeatedly refuses to sign specific \ncontracts. Termination of three or more specific contracts in these circumstances \nalso constitutes grounds for termination of the FWC; \n\n(d) if the contractor or any person that assumes unlimited liability for the debts of the \ncontractor is in one of the situations provided for in points (a) and (b) of Article \n136(1) of the Financial Regulation6; \n\n(e) if the contractor or any*related person*is in one of the situations provided for in \npoints (c) to (h) of Article 136(1) or to Article 136(2) of the Financial Regulation; \n(f) if the procedure for awarding the FWC or the*implementation of the FWC*prove to ", + "page_start": 29, + "page_end": 29, + "source_file": "EN-Draft FWC for services 0142.pdf" + } + ] + }, + { + "references": { + "source_file": "EN-Draft FWC for services 0142.pdf", + "query": "According to the european chemical agency contracts, what is considers a grave professional misconduct ?", + "target_page": 14, + "target_passage": "'Grave professional misconduct': a violation of applicable laws or regulations or ethical standards of the profession to which a contractor or a related person belongs, including any conduct leading to sexual or other exploitation or abuse, or any wrongful conduct of the contractor or a related person which has an impact on its professional credibility where such conduct denotes wrongful intent or gross negligence.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**No [*complete*]**\n\n**implementing framework contract No ECHA/2019/355**\n\n1. The European Chemicals Agency in Helsinki (‘the contracting authority’), represented \nfor the purposes of signing this specific contract by [*forename, surname, function,*\n*department of authorising officer*], \n\nand ", + "page_start": 42, + "page_end": 42, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "Union budget, ii) the non-disclosure of information in violation of a specific obligation, with \nthe same effect or iii) the misapplication of such funds or assets for purposes other than \nthose for which they were originally granted, which damages the Union's financial interests; \n\n**'Grave professional misconduct':**a violation of applicable laws or regulations or ethical \nstandards of the profession to which a contractor or a related person belongs, including \nany conduct leading to sexual or other exploitation or abuse, or any wrongful conduct of \nthe contractor or a related person which has an impact on its professional credibility where \nsuch conduct denotes wrongful intent or gross negligence. \n\n**‘Implementation of the FWC’**: the purchase of services envisaged in the FWC through \nthe signature and*performance of specific contracts*; \n\n**‘Interface control document’**: the guideline document which lays down the technical \nspecifications, message standards, security standards, checks of syntax and semantics, \netc. to facilitate machine-to-machine connection. This document is updated on a regular \nbasis; \n\n**‘Irregularity’**: any infringement of a provision of Union law resulting from an act or \nomission by an economic operator, which has, or would have, the effect of prejudicing the \nUnion’s budget. ", + "page_start": 13, + "page_end": 13, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "On the basis of the final audit findings, the contracting authority may recover all \nor part of the payments made in accordance with Article II.23 and may take any \nother measures which it considers necessary. \n\n**II.24.5**In accordance with Council Regulation (Euratom, EC) No 2185/96 of \n11 November 1996 concerning on-the-spot checks and inspection carried out by \nthe Commission in order to protect the European Communities’ financial interests \nagainst*fraud*and other*irregularities*and Regulation (EU, Euratom) No 883/2013 \nof the European Parliament and of the Council of 11 September 2013 concerning \ninvestigations conducted by the European Anti-Fraud Office, the European Anti- \nFraud Office may carry out investigations, including on the spot checks and \ninspections, to establish whether there has been*fraud*, corruption or any other \nillegal activity under the contract affecting the financial interests of the Union. \nFindings arising from an investigation may lead to criminal prosecution under \nnational law. \n\nThe investigations may be carried out at any moment during the provision of the \nservices and up to five years starting from the payment of the balance of the last \nspecific contract issued under this FWC. ", + "page_start": 37, + "page_end": 37, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "**DRAFT FRAMEWORK CONTRACT FOR SERVICES**\n\n**NUMBER — ECHA/2019/355**\n\n1. The European Chemicals Agency in Helsinki (‘the contracting authority’), represented \nfor the purposes of signing this framework contract by [*forename, surname, function,*\n*directorate of authorising officer*], \n\nof the one part and \n\n2. [*Full official name*] \n\n[*Official legal form*] \n\n**[***Statutory registration number or ID or passport number***]**\n\n[*Full official address*] \n\n[*VAT registration number*] \n\n[appointed as the leader of the group by the members of the group that submitted the \njoint tender] \n\n[*For joint tenders,*r*epeat these data as many times as there are contractors and continue*\n*numbering*] \n\n([collectively] ‘the contractor’), represented for the purposes of the signature of this \nframework contract by [*forename, surname, function of legal representative and name of*\n*company in the case of a joint tender*], \n\non the other part, ", + "page_start": 0, + "page_end": 0, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "The authors conclude on the**relevance of the EU OSH directives**: \n\n*‘The evaluation shows very clearly that the EU OSH acquis is the reference frame for national OSH*\n*regulatory regimes. While the Member States have chosen various models for their legal implementation*\n*of the Directives’ requirements, there is no doubt that the Directives’ requirements form the core of the*\n*national systems in one way or the other. The significance of the Directives in setting the scene for OSH*\n*regulation in the EU is therefore very high.’*\n\nThe authors also distinguish between the two major principles of legislative approaches in OSH, that is, \neither setting an objective and letting the actors define how this goal can be achieved**(goal-oriented**\n**approach)**, or prescribing also quite detailed measures to reach the objective**(prescriptive**\n**approach)**:352 \n\n*‘There seems to be a general view that the Framework Directive, with its orientation towards a goal-*\n*oriented approach to OSH (rather than prescriptive) successfully lays out a suitable template for*\n*managing workplace risks – but not in itself enough to ensure that all risks are dealt with sufficiently.*\n*One criticism of the goal-setting approach is that the absence of prescriptive intermediate goals makes*\n\n*compliance harder to verify and, in the absence of that verification procedure, harder to enforce*\n*(especially in OSH cultures with a history of the prescriptive approach).’*353 \n\nRegarding the**level of compliance with the legal goals or prescriptions**, the study authors assess it \nas ‘moderate to good.’ They see major differences depending on the topic and the size of the \nenterprises: ", + "page_start": 120, + "page_end": 120, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "47 Adăscăliței et al., 2021: The intensification of work in Europe: A multilevel analysis \n\n48 EU-OSHA, 2002: Report - New forms of contractual relationships and the implications for occupational safety \nand health (p. 7). \n\n49 Eurofound, 2011: Impact of subcontracting on working conditions ", + "page_start": 142, + "page_end": 142, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "(g) if the contractor does not comply with applicable obligations under environmental, \nsocial and labour law established by Union law, national law, collective agreements \nor by the international environmental, social and labour law provisions listed in \nAnnex X to Directive 2014/24/EU; \n\n(h) if the contractor is in a situation that could constitute a*conflict of interest*or a \n\n*professional conflicting interest*as referred to in Article II.7; \n\n(i) if a change to the contractor’s legal, financial, technical, organisational or ownership \nsituation is likely to substantially affect the*implementation of the FWC*or \nsubstantially modify the conditions under which the FWC was initially awarded; \n(j) in the event of*force majeure*, where either resuming implementation is impossible \nor the necessary ensuing amendments to the FWC or a specific contract would mean \nthat the tender specifications are no longer fulfilled or result in unequal treatment \nof tenderers or contractors; \n\n(k) if the needs of the contracting authority change and it no longer requires new \nservices under the FWC; in such cases ongoing specific contracts remain unaffected; \n(l) if the termination of the FWC with one or more of the contractors means that the \nmultiple FWC with reopening of competition no longer has the minimum required \nlevel of competition; \n\n(m) if the contractor is in breach of the data protection obligations resulting from \n\nArticle II.9.2; \n\n(n) if the contractor does not comply with the applicable data protection obligations \nresulting from Regulation (EU) 2016/679. \n\n**II.18.2. Grounds for termination by the contractor**\n\nThe contractor may terminate the FWC or any on-going specific contract if the contracting \nauthority fails to comply with its obligations, in particular the obligation to provide the \ninformation needed for the contractor to implement the FWC or to perform a specific \ncontract as provided for in the tender specifications. \n\n**II.18.3. Procedure for termination**\n\nA party must*formally notify*the other party of its intention to terminate the FWC or a \nspecific contract and the grounds for termination. \n\nThe other party has 30 days following the date of receipt to submit observations, including \nthe measures it has taken or will take to continue fulfilling its contractual obligations. \nFailing that, the decision to terminate becomes enforceable the day after the time limit for \nsubmitting observations has elapsed. \n\nIf the other party submits observations, the party intending to terminate must*formally*\n*notify*it either of the withdrawal of its intention to terminate or of its final decision to \nterminate. ", + "page_start": 30, + "page_end": 30, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "The photographs used in this publication illustrate a range of work activities. They do not necessarily show good practices or \ncompliance with legislative requirements. \n\nFor one-click access to websites and references please consult the online version of this publication \nhttps://osha.europa.eu/en/publications/occupational-safety-and-health-europe-state-and-trends-2023 ", + "page_start": 1, + "page_end": 1, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "[The maximum amount covering all services to be provided under this specific \ncontract including reimbursement of expenses and excluding price revision is EUR \n[*amount in figures and in words*].] \n\n**3.2**\n\n[Reimbursement of expenses is not applicable to this specific contract.] [Within the \nmaximum amount, up to EUR [*amount in figures and in words*] is earmarked for \nexpenses, which must be reimbursed in accordance with the FWC]. \n\n***\n\n**I.1.1.1.4.**Article 4 communication details \n\nFor the purpose of this specific contract, communications must be sent to the following \naddresses: \n\nContracting authority: \n\nEuropean Chemicals Agency \n\n [Directorate [*complete*]] \n\n[Unit [*complete*]] \n\n[*Postcode and city*] \n\nE-mail: [*insert functional mailbox*] ", + "page_start": 43, + "page_end": 43, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "The contractor shall assist the controller for the fulfilment of its obligations pursuant to \nArticle 33 to 41 under Regulation (EU) 2018/1725 to: \n\n(a) ensure compliance with its data protection obligations regarding the security of the \nprocessing, and the confidentiality of electronic communications and directories of users; \n(b) notify a personal data breach to the European Data Protection Supervisor; (c) \ncommunicate a personal data breach without undue delay to the data subject, where \napplicable; (d) carry out data protection impact assessments and prior consultations as \nnecessary. \n\nThe contractor shall maintain a record of all data processing operations carried on behalf \nof the controller, transfers of personal data, security breaches, responses to requests for \nexercising rights of people whose personal data is processed and requests for access to \npersonal data by third parties. \n\nThe contracting authority is subject to Protocol 7 of the Treaty on the Functioning of the \nEuropean Union on the privileges and immunities of the European Union, particularly as \nregards the inviolability of archives (including the physical location of data and services as \nset out in Article I.9.2) and data security, which includes personal data held on behalf of \nthe contracting authority in the premises of the contractor or subcontractor. ", + "page_start": 21, + "page_end": 21, + "source_file": "EN-Draft FWC for services 0142.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_GLW_2002.pdf", + "query": "What or Corning's corporate values ?", + "target_page": 12, + "target_passage": "Quality, Integrity, Performance, Leadership, Innovation, Independence, and The Individual", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "C O R P O R A T E V A L U E S : \nCorning’s Values provide an unchanging moral and ethical \ncompass that guides the actions of everyone in the company. The \ncorporate values are: Quality, Integrity, Performance, Leadership, \nInnovation, Independence, and The Individual. \n\nT O T A L Q U A L I T Y : \nIn alignment with the quality policy of the corporation, our policy is \nto achieve Total Quality performance. Total Quality performance \nmeans understanding who the customer is, what the requirements \nare, and meeting those requirements better than anyone else, \nwithout error, on time, every time. ", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "We know that our shareholders are most eager to see a \n\ngreater return on their investment with Corning, and of \n\ncourse our return to profitability will be key to building back \n\nWall Street’s confidence. We are 100 percent committed \n\nto reaching that goal of profitability in 2003 — and doing \n\nso within the rigorous compliance rules by which we \n\nhave always been guided. Integrity characterizes all our \n\nrelationships, both inside and outside of Corning, and we \n\nwill never compromise that foundation of our reputation. ", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "Corning Incorporated is more than the sum of its parts—much \nmore than a commercial enterprise. \n\nI continue to be extremely excited about the future opportunities \nemerging from our 152-year legacy of scientific innovations. \nWe are concentrating our efforts on high-impact, near-term \ngrowth initiatives with emphasis on our liquid-crystal display, \ndiesel filter, and chemical processing projects. \n\nWe have a time-tested set of Values and we rely on them \nto guide our every action. We also hold dear the pride of \nassociation that all who touch our corporation feel. \nShareholders, customers and employees understand that your \ncorporation has, for more than 150 years, produced useful \nand industry-creating products that have changed the lives \nof mankind. \n\nAnd we are certainly not giving up on optical communica- \ntions. We have the biggest share of the optical fiber market, \nby far, and continue to be the low-cost producer for anyone \nneeding to move information from place to place. So while \nwe’ve scaled back on production of fiber and other optical \nproducts, we certainly believe that they will continue to be \nan important part of our product mix again in the future. The \noptical communications industry is still in its infancy and we \nwill capitalize on our leadership position to grow both our \nearnings and return on shareholder equity. ", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "S C I E N C E & T E C H N O L O G Y \n\nCorning’s long history of extraordinary innovation continues in \nthe context of managing the sensitive balance between the near-term \nalignment of R&D and business objectives, and longer-range \ndiscovery research and new opportunity creation. \n\nOver the past year, we adjusted our R&D spending to align \nwith business conditions. At the same time, we carefully preserved \nour core technology capabilities to ensure our capacity to lead our \nmarkets and create life-changing innovations. \n\nWe have tightened our focus on high-impact projects and have \nstreamlined our processes to develop and commercialize promising \nopportunities more quickly and efficiently. We have emphasized \nour patent processes to ensure strong competitive positions from the \ncritical intellectual assets of our scientific organization. \n\nOur R&D organization is aligned with our operating goals and \nplays a critical role in meeting them. Our scientists and engineers \nare closely linked to our operations and are focused not only on \nnew product development, but also new process development. They \nare discovering new ways to manufacture innovative products with \nlowered cost and increased quality performance. \n\nInnovation is one of Corning’s core Values. It is the everyday \nlanguage and mindset of the company. Even in the face of difficult \neconomic conditions, we will pursue our tradition of developing \nbreakthrough technologies for the markets we serve — from \ntelecommunications to environmental — and will capitalize on the \ncreation of new market opportunities made possible by our strong \ncommitment to research and development. ", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "We take great pride in saying that Corning continues to be \n\na financially sound company, thanks to the aggressive \n\nstrategies we executed throughout 2002. Although it has \n\nbeen a very painful process, we have dramatically slowed \n\nthe rate at which we are spending cash. We ended the year \n\nwith a balance of cash and short-term investments of \n\n$2.1 billion. And we have access to $2 billion in credit \n\nthat we haven’t touched — and don’t plan to. We also \n\ncontinue to pay down debt each quarter. This, combined \n\nwith our plan to return to profitability in 2003, gives us \n\na high degree of confidence in our ability to meet any \n\nfuture financial obligations. So, we feel very good about our \n\nliquidity position right now. \n\nThe ongoing economic weakness and uncertainty in world \n\nevents continue to make the overall business environment \n\na volatile one. Still, we have greatly improved our ability \n\nto forecast revenues and expenses quarter-to-quarter, and \n\nwe are encouraged by the near-term growth potential of \n\nour non-telecommunications businesses — especially our \n\nliquid-crystal display, environmental and semiconductor \n\nbusinesses. If these markets continue to grow as we expect, \n\nwe are confident that we will be able to meet our goals. ", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "We will long remember 2002 as one of the most challenging years — if not the most challenging — in Corning Incorporated’s \n\nlong history. I quickly became even more steeped in these challenges in April when, at the request of our Board of Directors, \n\nI returned to the company as Chairman and Chief Executive Officer. ", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "C O R N I N G T E L E C O M M U N I C A T I O N S \n\nThe ongoing malaise of the telecommunications industry led \nCorning to initiate significant restructurings during 2002. Optical \nfiber plant closings and workforce reductions were evidence of our \ncomprehensive plan to align expenses with dramatically lowered \nrevenues in our telecommunications businesses. Despite industry \nweakness, we remain the global leader in the manufacturing and sale \nof optical communications products. Our position will serve us well \nwhen the inevitable growth of this dynamic market returns. \n\nFor the near-term, we are focused on maintaining our leading position \nacross our markets and with our customers. Through our many \ngenerations of manufacturing technology development, we are \nrestoring our businesses to profitability despite continued pricing \npressure and low-volume growth expectations. \n\nLooking further ahead, we remain committed to creating innovative \noptical communications products that meet even tighter quality, \ncapability and cost requirements for our customers. We are empha- \nsizing metro and access segments of the market as our major oppor- \ntunities. And we are watching carefully for signs of market recovery. \nWhen that time comes, we will be poised for growth once again. ", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Since that time, I am increasingly convinced that, despite our downturn, the long - term fature of Corning remains bright andfilled with opportunity.But in the meantime, we have been living in a very difficult reality – one marked by ongoing quarterly losses and drops inrevenue... Six, our shareholders — dong with our employees and our friends in the communities we serve — felt the pain. We all assessed our breasses opened by hydroplased as sessions?Alasaumino notoxicity relexina, susterin ( r ) # wandeming group activities allowing allowed allows during allows would be next as susted, value continued its seemingly referenties decline.With the severe drop - off in revenues from our telecomminications customers, we knew we could no longer afford to keep up the costly infrastructure of facilities and staff we had in place. Pat simply, we couldn ' s speed more than we were makiWe also keew our strengths — and they were map? We keew were not → not had we ever been − menly atelecomminications company. Rather, we are a technology company, with the materials and process experies to createIde - changing products. That ' s what we ' ve been for all of our 152 years ; that ' s what we ' ll continue to be.And we knew something else... that our Vulues, the historic strength of our company, were alive and well. Quality, Integrity,Performance, Leadership, Imovation, Budependence and The Individual continue to guide our every move, and continue to set to appet from other companies — expecially those caught in the accounting scandals that marred the besiness wors
", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "competitive markets. Guy is an excellent \nfit for this role on many levels and the entire \nBoard look forward to his leadership for \nmany years to come. \n\nI would encourage you to review the \ndiscussions around our corporate governance, \ncommunity investments and sustainability \ninitiatives later in this annual report. First class \ncorporate governance practices have always \nbeen a strong tenet at Rogers, and as an \nentrepreneur founded and family controlled \ncompany, our Board takes pride in what is a \nproactive and disciplined approach to \nensuring that our governance practices \ncontinue to justify the confidence of the \npublic capital markets. Giving back to the \ncommunities we serve is also an important \npart of our culture at Rogers and the Board is \nvery proud of the significant initiatives and \ninvestments which the company undertook \nover the past year on the corporate social \nresponsibility front. \n\nI would like to thank Rogers’ 28,000 \nemployees for their ongoing dedication to \nour customers and striving to make Rogers \nbetter every day, my fellow Board members \nfor their counsel and drive towards delivering \ncontinued value to our shareholders, and \nyou our shareholders for your continued \ninvestment in this great company. ", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "We, the members of HON INDUSTRIES, are dedicated to creating long-term value for all of our stakeholders, to \n\nexceeding our customers’ expectations, and to making our company a great place to work. We will always treat each \n\nother, as well as customers, suppliers, shareholders, and our communities, with fairness and respect. \n\nOur success depends upon business simplification, rapid continuous improvement, and innovation in every- \n\nthing we do, individual and collective integrity, and the relentless pursuit of the following long-standing beliefs: \n\n**W E W I L L B E P R O F I T A B L E .**\n\nWe pursue mutually profitable relationships with customers and suppliers. Only when our company achieves an ade- \n\nquate profit can the other elements of this Vision be realized. \n\n**W E W I L L C R E A T E L O N G - T E R M V A L U E F O R S H A R E H O L D E R S .**\n\nWe create long-term value for shareholders by earning financial returns significantly greater than our cost of capital and \n\npursuing profitable growth opportunities. We will safeguard our shareholders’ equity by maintaining a strong balance \n\nsheet to allow flexibility in responding to a continuously changing market and business environment. ", + "page_start": 63, + "page_end": 63, + "source_file": "NYSE_HNI_2003.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_GLW_2002.pdf", + "query": "As a Corning's investor, how can I get a summary of the annual meeting of shareholders ?", + "target_page": 11, + "target_passage": "A summary report of the proceedings at the annual meeting will be available without charge upon written request to Ms. Denise A. Hauselt, Secretary and Assistant General Counsel, Corning Incorporated, HQ-E2-10, Corning, NY 14831", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "**SHAREHOLDER INFORMATION**\n\n", + "page_start": 58, + "page_end": 58, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**Corporate Headquarters**\nThe Hartford Financial \nServices Group, Inc. \n690 Asylum Avenue \nHartford, Connecticut 06115 \n860-547-5000 \n\n**Internet Address**\nhttp://www.thehartford.com \n\n**Annual Meeting**\nShareholders are cordially invited to attend The Hartford’s \nAnnual Meeting of Shareholders, which will be held on \nThursday, April 18, 2002 at 9:00 a.m. in the Wallace Stevens \nTheater at The Hartford Financial Services Group, Inc.’s \nhome office at 690 Asylum Avenue, Hartford, Connecticut. \nShareholders of record as of February 28, 2002 are entitled \nto notice of, and to vote at, the Annual Meeting. \n\n**Form 10-K and Other Information**\nShareholders may receive, without charge, a copy of \nThe Hartford’s Form 10-K (without exhibits) filed with the \nSecurities and Exchange Commission for the year ended \nDecember 31, 2001 by contacting 1-888-FACT-HIG. Forms \n10-Q, press releases, and other shareholder communications \nare also available through this toll-free number. \n\n**Transfer Agent/Shareholder Records**\nFor information or assistance regarding stock records, \ndividend checks or stock certificates, please contact \nThe Hartford’s transfer agent: \n\nThe Bank of New York \nShareholder Relations Department–11E \nP.O. Box 11258 \nChurch Street Station \nNew York, NY 10286 \n800-254-2823 ", + "page_start": 37, + "page_end": 37, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
to shareholders on or about March 12.2003. The proxy statement can also be accessed electronically through the Investorforward - looking statements involve risks and uncertainties that may cause the outcome to be materially different. Such
Relations category of the Corning home page on the Internet at www. corning. com. A summary report of the proceedingsrisks and uncertainties include, but are not limited to :
at the annual meeting will be available without charge uponStrategies
written request to Ms. Denise A. Hauselt, Secretary andStrategy ( malaria )
Assistant General Counsel, Corning Incorporated, HQ - E2 - 10,Specificity, prevention, specification, specification, specification, specification, specification, specification, specification, specification, specification, specialized, specification, specialized, specificatiop
Corning, NY 14831.Controllinteractions
ADD1T10NAL INFORMAT10N— cost reductions,
A copy of Corning ’ s 2002 Annual Report on Form 10 - K filed— availability and costs of critical material :
with the Securities and Exchange Commission is available— new product development and commerci
upon written request to Ms. Denise A. Hauselt, Secretary and— attracting and retaining key personnel,
Assistant General Counsel, Corning Incorporated, HQ - E2 - 10,— order activity and demand from major custor
Corning, NY 14831. The Annual Report on Form 10 - K can— fluctuations in capital spending by customers
also be accessed electronically through the Investor Relationsin the telecommunications industry and other
category of the home page on the Internet at :business segments,
www. corning. com− financial condition of customers,
IN VESTOR TNFORMAT1ON— changes in the mix of sales between premium
Investment analysts who need additional information mayand non - premium products,
contact Mr. Kenneth C. Sofio, Manager of Investor Relations,— facility expansions and new plant start - up costs,
Corning Incorporated, HQ - E2 - 25, Corning, NY 14831 ;— adverse intigalison or regulatory developments, including
Telephone 607.974.9000future or pending tax legislation,
C 0 M MO N S TOC K— capital resource and cash flow activities,
Corning Incorporated common stock is listed on the− capital spending,
New York Stock Exchange and the SWX Swiss Exchange.— equity company activities,
In addition, it is traded on the Boston, Midwest, Pacific− interest costs,
and Philadelphia stock exchanges. Common stock options— acquisition and divestiture activity,
are traded on the Chicago Board Options Exchange. The— the rate of technology change,
abbreviated ticker symbol for Corning Incorporated is “ GLW.”— the ability to enforce patents,
TRANSFER AGENT AND REGISTRAR— product performance issues,
Computershare Investor Services LLLC— stock price fluctuations, and
P. O. Box A - 3504— other risks detailed in Corning ’ s SEC filings.
Chicago, IL 60690 - 3504Neither this report nor any statement contained herein is
Telephone : 800.255.0461furnished in connection with any offering of securities or for
Website : www. computershare. comthe purpose of promoting or influencing the sale of securities.
CHANGE of ADDRESSCorning is an equal opportunity employer.
Report change of address to ComputershareCorning is an equal opportunity employer.
Investor Services at the above address.Printed in USA
IN DEPENDENT ACCOUNTANTS() Corning Incorporated 2003
PricewaterhouseCoopers LLP1301 Avenue of the Americas
New York, NY 10019Corning Incorporated
One Riverfront PlazaMean ( SD )
Corning, NY 14831 - 000.60.97.9000WWW. C
www. corning. com02BR24601EN
", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "Transfer Agent Register \nWachovia Bank N.A., Shareholder Services Group, \n1525 West W.T. Harris Blvd., 3c3, Charlotte, North Carolina 28288-1153. \n\nAnnual Meeting \nThe Annual Meeting of shareholders will be held at 10 a.m. Central Time on \nWednesday, June 30, 2004, at Emmis’ Corporate office. \n\nForm 10-K \nA copy of the Annual Report on Form 10-K for the fiscal year ended February 29, \n2004, which was filed with the Securities and Exchange Commission, will be sent \nto shareholders without charge upon written request to Kate Healey, Emmis \nCommunications Corporation, One Emmis Plaza, 40 Monument Circle, Suite 700, \nIndianapolis, Indiana 46204, or ir@emmis.com. \n\nMarket and Dividend Information \nThe Company’s Class A Common Stock is traded in the over-the-counter market \nand is quoted on the National Association of Securities Dealers Automated \nQuotation (NASDAQ) National Market System under the symbol EMMS. \n\nThe following table sets forth the high and low bid prices of the Class A Common \nStock for the periods indicated. No dividends were paid during any such periods. ", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "As of February 25, 2003, there were 12**,**364**,**642 shares of Common Stock outstanding. \n\n**Documents Incorporated by Reference**\n\nCertain information called for by Part III is incorporated by reference to the Proxy Statement for the 2003 \nAnnual Meeting of our shareholders, which will be filed with the Securities and Exchange Commission not later \nthan 120 days after December 31, 2002. ", + "page_start": 26, + "page_end": 26, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "• compliance with debt covenants, availability and cost of credit, changes in interest rates, and trends in debt repayment patterns, \npersonal bankruptcies and bad debt write-offs, and \n• the timing and amounts of share repurchases by the company, if any, or any share issuances by the company, including issuances \nassociated with option exercises or other matters. \n\nThese and other factors, including those factors described in Item 1A: Risk Factors, could affect our financial results and cause actual results \nto differ materially from any forward-looking information we may provide. We undertake no obligation to update or revise any forward-looking \nstatements to reflect subsequent events, new information or future circumstances. \n\n**SEC FILINGS**\nWe file annual, quarterly and current reports, proxy statements and other documents with the Securities and Exchange Commission (“SEC”). \nAll material we file with the SEC is publicly available at the SEC’s Public Reference Room at 100 F Street NE, Washington, DC 20549. You \nmay obtain information on the operation of the Public Reference Room by calling the SEC at 1-800-SEC-0330. In addition, the SEC \nmaintains a website at www.sec.gov that contains reports, proxy and information statements and other information regarding issuers that file \nelectronically with the SEC. ", + "page_start": 17, + "page_end": 17, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**INVESTOR RELATIONS INQUIRIES SHOULD** **ANNUAL REPORT ON FORM 10-K**\n\n**BE DIRECTED TO:** **The Applied Industrial Technologies, Inc.**\n**Annual Report on Form 10-K for the fiscal**\n**MARK O. EISELE**\n**year ended June 30, 2012, including the**\nVice President – Chief Financial Officer \n**financial statements and schedules thereto,**\n & Treasurer \n**is available at our website at**\nApplied Industrial Technologies \n**www.Applied.com. It is also available**\n1 Applied Plaza \n**without charge upon written request to the**\nCleveland, OH 44115-5014 \n**Vice President – Chief Financial Officer &**\nTelephone: 216/426-4000, Fax: 216/426-4845 \n**Treasurer at the address shown.**\n\n**ANNUAL MEETING**\nThe Annual Meeting of Shareholders will be held \nat 10:00 a.m., Tuesday, October 23, 2012, at the \nCorporate Headquarters of Applied Industrial \nTechnologies, 1 Applied Plaza, East 36th and \nEuclid Avenue, Cleveland, Ohio 44115. ", + "page_start": 46, + "page_end": 46, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "Corning Incorporated is more than the sum of its parts—much \nmore than a commercial enterprise. \n\nI continue to be extremely excited about the future opportunities \nemerging from our 152-year legacy of scientific innovations. \nWe are concentrating our efforts on high-impact, near-term \ngrowth initiatives with emphasis on our liquid-crystal display, \ndiesel filter, and chemical processing projects. \n\nWe have a time-tested set of Values and we rely on them \nto guide our every action. We also hold dear the pride of \nassociation that all who touch our corporation feel. \nShareholders, customers and employees understand that your \ncorporation has, for more than 150 years, produced useful \nand industry-creating products that have changed the lives \nof mankind. \n\nAnd we are certainly not giving up on optical communica- \ntions. We have the biggest share of the optical fiber market, \nby far, and continue to be the low-cost producer for anyone \nneeding to move information from place to place. So while \nwe’ve scaled back on production of fiber and other optical \nproducts, we certainly believe that they will continue to be \nan important part of our product mix again in the future. The \noptical communications industry is still in its infancy and we \nwill capitalize on our leadership position to grow both our \nearnings and return on shareholder equity. ", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "**Item 13. Certain Relationships and Related Transactions, and Director Independence.**\n\nThe information required under this item is included in the following sections of our Proxy Statement for our 2015 Annual Meeting of \nShareholders, the sections of which are incorporated by reference herein and will be filed within 120 days after the end of our fiscal year: \n\nElection of Directors \nCertain Relationships and Related Transactions ", + "page_start": 79, + "page_end": 79, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**Item 13.*CERTAIN RELATIONSHIPS AND RELATED TRANSACTIONS***\n\nInformation under \"Other Information Relating to Directors, Nominees, and Executive Officers\" for the year ended October 25, 2003, as set forth on page \n17 of the definitive proxy statement for the Annual Meeting of Stockholders to be held January 27, 2004, is incorporated herein by reference. ", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_HRL_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_GLW_2002.pdf", + "query": "How many employees did Corning company count at the end of 2002 ?", + "target_page": 5, + "target_passage": "We are continuing to invest in our people — all 23,200 of them", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "We will long remember 2002 as one of the most challenging years — if not the most challenging — in Corning Incorporated’s \n\nlong history. I quickly became even more steeped in these challenges in April when, at the request of our Board of Directors, \n\nI returned to the company as Chairman and Chief Executive Officer. ", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "We take great pride in saying that Corning continues to be \n\na financially sound company, thanks to the aggressive \n\nstrategies we executed throughout 2002. Although it has \n\nbeen a very painful process, we have dramatically slowed \n\nthe rate at which we are spending cash. We ended the year \n\nwith a balance of cash and short-term investments of \n\n$2.1 billion. And we have access to $2 billion in credit \n\nthat we haven’t touched — and don’t plan to. We also \n\ncontinue to pay down debt each quarter. This, combined \n\nwith our plan to return to profitability in 2003, gives us \n\na high degree of confidence in our ability to meet any \n\nfuture financial obligations. So, we feel very good about our \n\nliquidity position right now. \n\nThe ongoing economic weakness and uncertainty in world \n\nevents continue to make the overall business environment \n\na volatile one. Still, we have greatly improved our ability \n\nto forecast revenues and expenses quarter-to-quarter, and \n\nwe are encouraged by the near-term growth potential of \n\nour non-telecommunications businesses — especially our \n\nliquid-crystal display, environmental and semiconductor \n\nbusinesses. If these markets continue to grow as we expect, \n\nwe are confident that we will be able to meet our goals. ", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "C O R N I N G T E L E C O M M U N I C A T I O N S \n\nThe ongoing malaise of the telecommunications industry led \nCorning to initiate significant restructurings during 2002. Optical \nfiber plant closings and workforce reductions were evidence of our \ncomprehensive plan to align expenses with dramatically lowered \nrevenues in our telecommunications businesses. Despite industry \nweakness, we remain the global leader in the manufacturing and sale \nof optical communications products. Our position will serve us well \nwhen the inevitable growth of this dynamic market returns. \n\nFor the near-term, we are focused on maintaining our leading position \nacross our markets and with our customers. Through our many \ngenerations of manufacturing technology development, we are \nrestoring our businesses to profitability despite continued pricing \npressure and low-volume growth expectations. \n\nLooking further ahead, we remain committed to creating innovative \noptical communications products that meet even tighter quality, \ncapability and cost requirements for our customers. We are empha- \nsizing metro and access segments of the market as our major oppor- \ntunities. And we are watching carefully for signs of market recovery. \nWhen that time comes, we will be poised for growth once again. ", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "C O R P O R A T E V A L U E S : \nCorning’s Values provide an unchanging moral and ethical \ncompass that guides the actions of everyone in the company. The \ncorporate values are: Quality, Integrity, Performance, Leadership, \nInnovation, Independence, and The Individual. \n\nT O T A L Q U A L I T Y : \nIn alignment with the quality policy of the corporation, our policy is \nto achieve Total Quality performance. Total Quality performance \nmeans understanding who the customer is, what the requirements \nare, and meeting those requirements better than anyone else, \nwithout error, on time, every time. ", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "We know that our shareholders are most eager to see a \n\ngreater return on their investment with Corning, and of \n\ncourse our return to profitability will be key to building back \n\nWall Street’s confidence. We are 100 percent committed \n\nto reaching that goal of profitability in 2003 — and doing \n\nso within the rigorous compliance rules by which we \n\nhave always been guided. Integrity characterizes all our \n\nrelationships, both inside and outside of Corning, and we \n\nwill never compromise that foundation of our reputation. ", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "Corning Incorporated is more than the sum of its parts—much \nmore than a commercial enterprise. \n\nI continue to be extremely excited about the future opportunities \nemerging from our 152-year legacy of scientific innovations. \nWe are concentrating our efforts on high-impact, near-term \ngrowth initiatives with emphasis on our liquid-crystal display, \ndiesel filter, and chemical processing projects. \n\nWe have a time-tested set of Values and we rely on them \nto guide our every action. We also hold dear the pride of \nassociation that all who touch our corporation feel. \nShareholders, customers and employees understand that your \ncorporation has, for more than 150 years, produced useful \nand industry-creating products that have changed the lives \nof mankind. \n\nAnd we are certainly not giving up on optical communica- \ntions. We have the biggest share of the optical fiber market, \nby far, and continue to be the low-cost producer for anyone \nneeding to move information from place to place. So while \nwe’ve scaled back on production of fiber and other optical \nproducts, we certainly believe that they will continue to be \nan important part of our product mix again in the future. The \noptical communications industry is still in its infancy and we \nwill capitalize on our leadership position to grow both our \nearnings and return on shareholder equity. ", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
CORNING TECHNOLOGIES26 ′
Table___
", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_GLW_2002.pdf" + }, + { + "text": "**2002 (132)**\nPaula Abla \nNicole Adams \nJenny Adkins \nRoger Aldrich \nJimmy Alexander \nBrian Babb \nCharlie Bagley \nBob Baker \nLynard Barrera \nCindy Barrios \nShane Barron \nDennis Bass \nJames Beavers \nRandy Bergen ", + "page_start": 31, + "page_end": 31, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "Salaries and employee benefits for 2002 totaled $32.0 million, an increase of $3.3 million, or 11.5%, as \ncompared to 2001. Salaries for 2002 were up $1.6 million with the increase attributable to normal pay increases, a \nhigher number of full time equivalent employees, and higher performance incentive payments. Profit sharing and \npension expenses for 2002 increased $823 thousand and $549 thousand, respectively, as compared to the prior year. \nThe higher profit sharing expense related to the Company’s 2002 increase in net earnings. In 2002, the Company \nlowered the expected long-term rate of return on pension plan assets from 8.5% to 6.5%; this change is the primary \nfactor contributing to higher pension expense in the current year as compared to the prior year. Net occupancy \nexpense for 2002 was virtually unchanged from the prior year and equipment expense was up $343 thousand over \nthe 2001 amount. The higher equipment expense resulted primarily from higher depreciation and higher repairs and \nmaintenance expense as compared to 2001. Intangible asset amortization for 2002 decreased $1.5 million and \nresulted primarily from the change in accounting principle that became effective January 1, 2002 and which \neliminated the amortization of goodwill. Printing, stationery and supplies expense for 2002 increased $391 thousand \nover the prior year amount. The increase for 2002 was due to $735 thousand in check printing fees being included \nin noninterest income for 2002 versus a reduction in printing expense in prior years. ATM expense for 2002 was \n$266 thousand higher than the 2001 amount and reflects increased customer usage in 2002. ", + "page_start": 46, + "page_end": 46, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "‚*2002:*The economic slowdown which began in 2001 continued to negatively impact the portion of our \nbusiness servicing the manufacturing sector and non-residential construction industry during 2002. \nVolumes attributable to manufacturing and construction activity continued to weaken during 2002. \n\nThe weakness in our business attributable to the economic slowdown was partially oÅset by an increase \nin recycling commodity prices in the early part of 2002. \n\nDespite the weakness we experienced in the aspects of our business noted above, our internal growth \nfrom core operations for 2002 was 3.0%. During 2002, we secured several long-term franchise and \nmunicipal contracts. We also beneÑted from the geographic mix of our business which favors high- \ngrowth markets. \n\n‚*2005 Outlook:*We anticipate internal growth from core operations to be in the range of 4.0% to 4.5% \nduring 2005 assuming no deterioration or improvement in the overall economy from that experienced \nduring the fourth quarter of 2004. However, our price and volume growth may remain Öat or may \ndecline in 2005 depending upon economic conditions and our success in implementing pricing \ninitiatives. \n\n*Cost of Operations.*Cost of operations was $1,714.4 million, $1,605.4 million and $1,472.9 million, or, \nas a percentage of revenue, 63.3%, 63.8% and 62.3%, for the years ended December 31, 2004, 2003 and 2002, \nrespectively. ", + "page_start": 42, + "page_end": 42, + "source_file": "NYSE_RSG_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf", + "query": "What is the shortcut to mute myself in MS teams ?", + "target_page": 3, + "target_passage": "Use [Ctrl]+[Shift]+[M] for a shortcut to mute and unmute during meetings.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": " press to clear it ", + "page_start": 10, + "page_end": 10, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**3**\n\n**Activity**\nFind notifications for all recent actions to stay on top of \nthings. You can manage your notifications according to \nyour preferences. \n\n**1** **6**\n\n**4**\n\n**Chat**\nMessage someone or a group of people. This tab brings \nup the list of all your chats. \n\n**2** **7**\n\n**5**\n\n**Teams**\nCreate teams and channels to gather people together \nin focused spaces with conversations and files. This tab \nbrings up a list of all the teams you are a part of. \n\n**3**\n\n**Help**\nLearn more about Teams with articles and training \ncontent. Stay up to date with the latest features, \nand report problems when things aren’t working out. \n\n**8**\n\n**6**\n\n**Calendar**\nBring up your calendar to view, create, and respond \nto meetings. \n\n**4**\n\n**Search**\nSearch for people, files, meetings, or conversations \nin Teams, then filter results to find just what you need. \n\n**9**\n\n**Calls**\nStart video and audio calls by dialing a phone number \nor placing a call over the internet. View your call history \nand voicemail. \n\n**5**\n\n**Profile**\nSelecting your profile picture shows you a menu where \nyou can customize your profile, find saved messages, or \nset your status and a message people can see when \nthey try to reach you. \n\n**10**\n\n**7**", + "page_start": 1, + "page_end": 1, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "**Teams and channels**\n\nWhen you are invited to a new Team, it will automatically appear on the left \npanel along with all its associated channels. You can choose to \"show\" the \nmost relevant chanels and \"hide\" the rest. ", + "page_start": 3, + "page_end": 3, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "\n\nLEAOING TAB ", + "page_start": 291, + "page_end": 291, + "source_file": "00-80T-80.pdf" + }, + { + "text": "**Tip:**An alternative way of opening the Actions menu is to highlight (select) a volume \nand use the right mouse button. \n\n2. From the**Actions**menu, select the**Map to Host or Host Cluster**option, as shown in \nFigure 7-35. ", + "page_start": 299, + "page_end": 299, + "source_file": "sg247938.pdf" + }, + { + "text": "**Welcome to Microsoft Teams**\n\nMicrosoft Teams is the app that brings your conversations, meetings, and files together in one place. This guide will help \nyou get started with Teams, learn the basics, get tips to practice on your own, and discover ways to engage your team. ", + "page_start": 0, + "page_end": 0, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "Figure 5-32 Turning the Identify LED off \n\nAlternatively, you can use the command-line interface (CLI) to get the same results. Enter the \nfollowing commands in this sequence: \n\n1. Enter**svctask chenclosure -identify yes 1**(or enter**chenclosure -identify yes 1**). \n2. Enter**svctask chenclosure -identify no 1**(or enter**chenclosure -identify no 1**). \n\nTo view internal components (components that cannot be seen from the outside), review the \nbottom of the GUI underneath where the list of external components is displayed. You can \nselect any of these components and details show in the right pane, as with the external \ncomponents. ", + "page_start": 171, + "page_end": 171, + "source_file": "sg247938.pdf" + }, + { + "text": "\n\nPOWER OFF ", + "page_start": 387, + "page_end": 387, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n\nFreeing the controls ", + "page_start": 331, + "page_end": 331, + "source_file": "00-80T-80.pdf" + }, + { + "text": "(cid:2) Use the exit statement in the PROGXX parmlib member. For more information about the \n\nPROGXX parmlib member, see*z/OS MVS Initialization and Tuning Reference*, \nSA22-7592. \n\n(cid:2) Use the**SETPROG EXIT**operator command. For more information about the**SETPROG EXIT**\n\ncommand, see*z/OS MVS System Commands*, SA22-7627*.*\n\nTo activate the exit routine, run the following command: \n\nSETPROG EXIT,ADD,EXITNAME=ARSLOG,MODENAME=ARSLOG, DSN=TEAM5.LOADLIB \n\nThe exit was link-edited to a normal library that is not AFP-authorized. \n\n**257** Chapter 11. Exits ", + "page_start": 280, + "page_end": 280, + "source_file": "sg246915.pdf" + } + ] + }, + { + "references": { + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf", + "query": "How can I make a channel visible to an invited member ?", + "target_page": 4, + "target_passage": "Channels can be: • Shared (visible to invited team members and external members of your organization who are not on the team)", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "**Teams and channels**\n\nWhen you are invited to a new Team, it will automatically appear on the left \npanel along with all its associated channels. You can choose to \"show\" the \nmost relevant chanels and \"hide\" the rest. ", + "page_start": 3, + "page_end": 3, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "**Channels**\nA**channel**is a central hub for a specific topic, within the larger team, where \npeople can hold focused conversations and organize a library of files. \n\nChannels can be: \n• Standard (visible to everyone on the team) \n• Private (only visible to select team members) \n• Shared (visible to invited team members and external members of your \n\norganization who are not on the team) ", + "page_start": 3, + "page_end": 3, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "**Participants**\nClick to see who has been invited to the meeting, or to add new people. \n\n**1**\n\n**Join meetings**\n\n1. From the calendar tab, select the meeting you intend to join, \n\nthen select join. . \n\n2. A new screen will show up. Here you can choose how you \n**3**\n\nwant to appear in the meeting, and your audio preferences. \n\n3. Then select join now. . ", + "page_start": 2, + "page_end": 2, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "Share your work with others \n\nTo invite others to view or edit your documents, select the**Share**button in the \ntop right corner of the app window. Then, you can choose to share a link to your \ndocument or send invitations directly to specific people. If someone doesn't have \nWord, they can use the free Word for the Web app to edit and comment. ", + "page_start": 3, + "page_end": 3, + "source_file": "Word QS.pdf" + }, + { + "text": "**Present in meetings**\n\n**Video**\nTurn your camera on or off. You can also select the … button near the camera \nto access audio and video settings. \n\n**5**\n\n1. Screen share from the Share button at the top of your \n\nmeeting window. \n\n2. Choose what screen or window you want to share. Don't forget \n\n**6**\nto include audio if you're sharing something with sound. \n\n3. When you are finished, use the share button at the top of your \n\nmeeting window to stop sharing. ", + "page_start": 2, + "page_end": 2, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "2. A list of all the hosts is displayed. The function icons indicate whether the host is Fibre \n\nChannel, iSCSI, or SAS attached. The port details of the selected host are shown to the \nright. You can add a new host object by clicking**Add Host**. If you click**Actions**(see \nFigure 8-51), the tasks that are described in “Modifying Volume Mappings” on page 346 \ncan be selected. ", + "page_start": 383, + "page_end": 383, + "source_file": "sg247938.pdf" + }, + { + "text": "**Creating Fibre Channel hosts**\nTo create a Fibre Channel host, complete the following steps: \n\n1. Rescan the SAN on Storwize V7000 by using the**detectmdisk**command (see \nExample 8-14). \n\nExample 8-14 Rescanning the SAN \n\nIBM_Storwize:ITSO-V7000:superuser>**detectmdisk**\n\n**Note:**The**detectmdisk**command does not return any response. \n\nIf the zoning was implemented correctly, any new WWPNs are discovered by the Storwize \nV7000 system after running the**detectmdisk**command. \n\n2. List the candidate WWPNs and identify the WWPNs belonging to the new host, as shown \nin Example 8-15. \n\nExample 8-15 Available WWPNs \n\nIBM_Storwize:ITSO-V7000:superuser>lsfcportcandidate \nfc_WWPN \n2100000E1E09E3E9 \n2100000E1E30E5E8 \n2100000E1E30E60F \n2100000E1EC2E5A2 \n2100000E1E30E597 \n2100000E1E30E5EC ", + "page_start": 395, + "page_end": 395, + "source_file": "sg247938.pdf" + }, + { + "text": "Figure 8-3 Open the host window \n\n2. To create a host, click**Add Host**. If you want to create a Fibre Channel host, continue with \n“Creating Fibre Channel hosts” on page 329. To create an iSCSI host, go to “Creating \niSCSI hosts” on page 331. ", + "page_start": 349, + "page_end": 349, + "source_file": "sg247938.pdf" + }, + { + "text": "5. Ensure that the primary host attach WWPNs (virtual WWPNs) now allow host traffic, as \nshown in**bold**in Example 8-7. \n\nExample 8-7 Host attach WWPNs (virtual WWPNs) permitting host traffic ", + "page_start": 346, + "page_end": 346, + "source_file": "sg247938.pdf" + }, + { + "text": "\nConnecting aWorld in Motion ", + "page_start": 0, + "page_end": 0, + "source_file": "NASDAQ_EEFT_2000.pdf" + } + ] + }, + { + "references": { + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf", + "query": "How can I notify a collegue mentionned in a chat message in Teams ?", + "target_page": 5, + "target_passage": "Tag a teammate in a message by typing the @ symbol followed by their name. They will receive a special notification calling for their attention.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**3**\n\n**Activity**\nFind notifications for all recent actions to stay on top of \nthings. You can manage your notifications according to \nyour preferences. \n\n**1** **6**\n\n**4**\n\n**Chat**\nMessage someone or a group of people. This tab brings \nup the list of all your chats. \n\n**2** **7**\n\n**5**\n\n**Teams**\nCreate teams and channels to gather people together \nin focused spaces with conversations and files. This tab \nbrings up a list of all the teams you are a part of. \n\n**3**\n\n**Help**\nLearn more about Teams with articles and training \ncontent. Stay up to date with the latest features, \nand report problems when things aren’t working out. \n\n**8**\n\n**6**\n\n**Calendar**\nBring up your calendar to view, create, and respond \nto meetings. \n\n**4**\n\n**Search**\nSearch for people, files, meetings, or conversations \nin Teams, then filter results to find just what you need. \n\n**9**\n\n**Calls**\nStart video and audio calls by dialing a phone number \nor placing a call over the internet. View your call history \nand voicemail. \n\n**5**\n\n**Profile**\nSelecting your profile picture shows you a menu where \nyou can customize your profile, find saved messages, or \nset your status and a message people can see when \nthey try to reach you. \n\n**10**\n\n**7**", + "page_start": 1, + "page_end": 1, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "To**create a new chat**, press [CTRL] + [N] (or look for the pen symbol at the \ntop of the chat list) and add the names of anyone you want to include. Type \nyour message and select Send or hit [Enter]. ", + "page_start": 3, + "page_end": 3, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "\n\n1:1 Chat \n\nGroup Chat \n\nMeeting Chat ", + "page_start": 3, + "page_end": 3, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "**Teams and channels**\n\nWhen you are invited to a new Team, it will automatically appear on the left \npanel along with all its associated channels. You can choose to \"show\" the \nmost relevant chanels and \"hide\" the rest. ", + "page_start": 3, + "page_end": 3, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "**‘Formal notification’**(or ‘formally notify’): form of communication between the parties \nmade in writing by mail or email, which provides the sender with compelling evidence that \nthe message was delivered to the specified recipient; \n\n**‘Fraud’:**an act or omission committed in order to make an unlawful gain for the \nperpetrator or another by causing a loss to the Union's financial interests, and relating to: \ni) the use or presentation of false, incorrect or incomplete statements or documents, which \nhas as its effect the misappropriation or wrongful retention of funds or assets from the ", + "page_start": 12, + "page_end": 12, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "By default, your chats will be arranged along the left-hand side of the chat \npanel, with the most recent messages at the top. You can right-click on any \nchat and select \"Pin,\" which will keep it at the top of your list for quick access. ", + "page_start": 3, + "page_end": 3, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "2. Select**Call Home**and then, click**Enable Notifications**(see Figure 13-45). For more \ninformation, see IBM Knowledge Center. \n\nFor the correct functionality of email notifications, ask your network administrator if Simple \nMail Transfer Protocol (SMTP) is enabled on the management network and is not, for \nexample, blocked by firewalls. Be sure to test the accessibility to the SMTP server by using \nthe**telnet**command (port 25 for a non-secured connection, port 465 for Secure Sockets \nLayer (SSL)-encrypted communication) using any server in the same network segment. ", + "page_start": 733, + "page_end": 733, + "source_file": "sg247938.pdf" + }, + { + "text": "**Channels**\nA**channel**is a central hub for a specific topic, within the larger team, where \npeople can hold focused conversations and organize a library of files. \n\nChannels can be: \n• Standard (visible to everyone on the team) \n• Private (only visible to select team members) \n• Shared (visible to invited team members and external members of your \n\norganization who are not on the team) ", + "page_start": 3, + "page_end": 3, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "Use the management GUI to manage and service your system. Select**Monitoring**→**Events**\nto list events that should be addressed and maintenance procedures that walk you through \nthe process of correcting problems. Information in the Events window can be filtered in three \nways: \n\n(cid:2) Recommended Actions \n\nShows only the alerts that require attention. Alerts are listed in priority order and should be \nresolved sequentially by using the available fix procedures. For each problem that is \nselected, you can perform the following tasks: \n\n– Run a fix procedure \n– View the properties \n\n(cid:2) Unfixed Messages and Alerts \n\nDisplays only the alerts and messages that are not fixed. For each entry that is selected, \nyou can perform the following tasks: \n\n– Run a fix procedure \n– Mark an event as fixed \n– Filter the entries to show them by specific minutes, hours, or dates \n– Reset the date filter \n– View the properties \n\n(cid:2) Show All \n\nDisplays all event types whether they are fixed or unfixed. For each entry that is selected, \nyou can perform the following tasks: \n\n– Run a fix procedure \n– Mark an event as fixed \n– Filter the entries to show them by specific minutes, hours, or dates \n– Reset the date filter \n– View the properties ", + "page_start": 724, + "page_end": 724, + "source_file": "sg247938.pdf" + }, + { + "text": "Share your work with others \n\nTo invite others to view or edit your documents, select the**Share**button in the \ntop right corner of the app window. Then, you can choose to share a link to your \ndocument or send invitations directly to specific people. If someone doesn't have \nWord, they can use the free Word for the Web app to edit and comment. ", + "page_start": 3, + "page_end": 3, + "source_file": "Word QS.pdf" + } + ] + }, + { + "references": { + "source_file": "Botswana-constitution.pdf", + "query": "What are the 3 prerequisites to be elligible as president of Botswana ?", + "target_page": 18, + "target_passage": "A person shall be qualified for election as President if, and shall not be qualified unless, he or she- (a) is a citizen of Botswana by birth or descent; (b) has attained the age of 30 years; and (c) is qualified to be elected as a Member of the National Assembly", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**CHAPTER III**\n**Citizenship (ss 20-29: repealed)**\n\n**20 to 29 inclusive.** **[Repealed.]**\n\n**CHAPTER IV**\n**The Executive (ss 30-56)**\n**PART I**\n**The President and the Vice-President (ss 30-41)**\n\n**30. Office of President**\n\nThere shall be a President of the Republic of Botswana who shall be the Head of \n\nState. \n**31. First President**\n\n(1) The first President shall be the person who immediately before 30th \n\nSeptember, 1966 holds the office of Prime Minister under the Constitution. \n\n(2) The first President shall be deemed to have assumed office at the coming into \n\noperation of this Constitution. ", + "page_start": 15, + "page_end": 15, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "**PART III**\n**Executive Functions (ss 47-56)**\n\n**47. Functions of President**\n\n(1) The executive power of Botswana shall vest in the President and, subject to \n\nthe provisions of this Constitution, shall be exercised by him or her either directly or \nthrough officers subordinate to him or her. \n\n(2) In the exercise of any function conferred upon him or her by this Constitution \nor any other law the President shall, unless it is otherwise provided, act in his or her own \ndeliberate judgment and shall not be obliged to follow the advice tendered by any other ", + "page_start": 22, + "page_end": 22, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "**57. Parliament**\n\nThere shall be a Parliament of Botswana which shall consist of the President and \n\na National Assembly. \n**58. Composition of National Assembly**\n\n(1) The President shall be ex-officio a member of the National Assembly, and \n\nshall be entitled to speak and to vote in all proceedings of the National Assembly. \n\n(2) In addition to the President the National Assembly shall consist of- \n\n(a) \n\n57 Elected Members who shall be elected in accordance with the provisions of \nthis Constitution and subject thereto in accordance with the provisions of any \nAct of Parliament; and \nfour Specially Elected Members who shall be elected in accordance with the \nFirst Schedule to this Constitution and subject thereto in accordance with the \nprovisions of any Act of Parliament. \n\n(3) If a person who is not a member of the National Assembly is elected to the \noffice of Speaker of the National Assembly, that person shall, by virtue of holding that \noffice, be a member of the Assembly in addition to the members referred to in \nsubsections (1) and (2) of this section. \n**59. Speaker**\n\n(1) There shall be a Speaker of the National Assembly who shall be elected by \nthe Members of the Assembly from among persons who are Members of the Assembly \nor from among persons who are not Members of the Assembly. \n\n(2) The President, the Vice-President, a Minister, an Assistant Minister or a \n\npublic officer shall not be qualified to be elected as Speaker. \n(3) The Speaker shall vacate his or her office- \n\n(a) \n\nif, having been elected from among the Members of the National Assembly, he \nor she ceases to be a Member of the Assembly otherwise than by reason of a \ndissolution of Parliament or if he or she is required by virtue of section 68(2) to \n(3) of this Constitution, to cease to perform his or her functions as a Member of \nthe Assembly; \nif any circumstances arise that, if he or she were not Speaker, would disqualify \nhim for election as such; \n\n(b) \n\n(c) when the Assembly first sits after any dissolution of Parliament; or \n(d) \n\nif he or she is removed from office by a resolution of the Assembly supported by \nthe votes of not less than two-thirds of all the Members thereof. \n\n(4) No business shall be transacted in the National Assembly (other than an \nelection to the office of Speaker) at any time when the office of Speaker is vacant. \n**60. Deputy Speaker**\n\n(1) There shall be a Deputy Speaker of the National Assembly who shall be \nelected from among the persons who are Members of the Assembly other than the \nPresident, the Vice-President, Ministers or Assistant Ministers. \n\n(2) The Members of the National Assembly shall elect a person to the office of \n\nDeputy Speaker when the Assembly first sits after any dissolution and, if the office \nbecomes vacant otherwise than by reason of the dissolution of the Assembly, at the first \nsitting of the Assembly after the office becomes vacant. \n\n(3) The Deputy Speaker shall vacate his or her office- \n\n(a) \n\nif he or she ceases to be a Member of the National Assembly, otherwise than \nby reason of a dissolution of Parliament; \nif any circumstances arise that, if he or she were not Deputy Speaker, would \ndisqualify him or her for election as such; \nif he or she is required, by virtue of section 68(2) to (3) of this Constitution, to \ncease to perform his or her functions as a Member of the Assembly; \n\n(b) \n\n(c) ", + "page_start": 26, + "page_end": 26, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "(1) The Chief Justice shall be appointed by the President. \n(2) The other judges of the High Court shall be appointed by the President, acting \n\nin accordance with the advice of the Judicial Service Commission. \n\n(3) A person shall not be qualified to be appointed as a judge of the High Court \n\nunless- \n(a) \n\nhe or she holds, or has held office, as a judge of a court having unlimited \njurisdiction in civil and criminal matters in Botswana, in a Commonwealth \ncountry or in any country outside the Commonwealth that may be prescribed by \nParliament or a court having jurisdiction in appeals from such a court; or \nhe or she is qualified to practise as an advocate or attorney in such a court and \nhas been qualified for not less than ten years to practise as an advocate or \nattorney in such a court; \nhe or she is qualified to practise as an advocate or attorney and he or she has \nhad the experience in the teaching of law in a recognised university for not less \nthan ten years; or \nhe or she is a Chief Magistrate who has held that office for not less than five \nyears. \n\n(b) \n\n(4) In computing, for the purposes of subsection (3) of this section, the period ", + "page_start": 40, + "page_end": 40, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "National Assembly. \n\n(6) A person attending the proceedings of the Ntlo ya Dikgosi by virtue of the \n\nprovisions of subsection (3) or (4) of this section shall be entitled to take part in the \nproceedings of the Ntlo ya Dikgosi relating to the matter in respect of which he or she \nattends as if he or she were a Member of the Ntlo ya Dikgosi: \n\nProvided that he or she shall not be entitled to vote in the Ntlo ya Dikgosi. \n**PART IV**\n**Powers of Parliament (ss 86-89)**\n\n**86. Legislative powers**\n\nSubject to the provisions of this Constitution, Parliament shall have power to \n\nmake laws for the peace, order and good government of Botswana. \n**87. Mode of exercising legislative powers**\n\n(1) Subject to the provisions of section 89(4) of this Constitution the power of \n\nParliament to make laws shall be exercised by Bills passed by the National Assembly, \nafter reference in the cases specified in section 88(2) of this Constitution to the Ntlo ya \nDikgosi, and assented to by the President. ", + "page_start": 37, + "page_end": 37, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "(c) where the Parliamentary election is contested in any constituency a poll shall be \ntaken in that constituency at which the votes shall be given by ballot, and for the \npurposes of that poll any Parliamentary candidate who declared support in \naccordance with paragraph (a) for a particular Presidential candidate shall use \nthe same voting colour and symbol, if any, as may have been allocated under \nany law for the time being in force in Botswana to that Presidential candidate for \nthe purposes of the Presidential election; \nthe returning officer shall declare to be elected as President any candidate for \nwhom support has been declared in accordance with paragraph (a) above by \nnot less than such number of persons elected as Members of the National \nAssembly in the Parliamentary election as corresponds to more than half the \ntotal number of seats for Elected Members in the Assembly, and if there is no \nsuch person the returning officer shall declare that no candidate has been \nelected. \n\n(d) \n\n(4) Parliament may make provision whereby the time for nominating Presidential \n\ncandidates may be extended in the event of there being no qualified candidate \nnominated at the expiration of the time for the delivery of such nominations. \n\n(5) Where, at the expiration of the time for the delivery of nominations in the ", + "page_start": 16, + "page_end": 16, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "has more than one residence in Botswana in the constituency in which he or \nshe has his or her principal residence; or \nin the case of a person who does not have a residence in Botswana but is able \nto register in person, in the constituency in which he or she last resided, or in \nwhich he or she was born; or \nin the case of a person who is not resident in Botswana and is unable to \nregister in person, at such place as may be prescribed by Parliament and \nregistration at such place shall be treated as registration in the constituency in \nwhich he or she last resided, or in which he or she was born in Botswana. \n\n(b) \n\n(c) \n\n(4) A person shall be entitled to be registered as a voter in one constituency only. \n(5) Every person who is registered in any constituency as a voter for the \npurposes of elections of the Elected Members of the National Assembly shall, unless he \nor she is disqualified by Parliament from voting in such elections on the grounds of his or \nher having been convicted of an offence in connection with the elections or on the \ngrounds of his or her having been reported guilty of such an offence by the court trying \nan election petition or on the grounds of his or her being in lawful custody at the date of \nthe election, be entitled so to vote in that constituency in accordance with the provisions \nmade by or under a law in that behalf; and no other person may so vote. \n**68. Tenure of office of Members**\n\n(1) The seat of an Elected Member or a Specially Elected Member of the \n\nNational Assembly shall become vacant- \n\n(a) \n(b) \n\nupon the dissolution of Parliament; \nif he or she is absent from the sittings of the Assembly for such period and in \nsuch circumstances as may be prescribed in the rules of procedure of the \nAssembly; \nsubject to the provisions of subsections (2) to (3) of this section, if any \ncircumstances arise that, if he or she were not a Member of the Assembly, \nwould cause him or her to be disqualified for election thereto. \n\n(c) \n\n(2) If circumstances such as are referred to in paragraph (c) of the preceding \n\nsubsection arise in relation to a Member of the Assembly by virtue of the fact that he or \nshe is declared insolvent, adjudged to be of unsound mind, sentenced to death or \nimprisonment, or convicted of an election offence and it is open to the Member to appeal \nagainst the decision (either with the leave of the court or other authority or without such \nleave), he or she shall forthwith cease to perform his or her functions as a Member of the \nAssembly but, subject to the next following subsection, he or she shall not vacate his or \nher seat until the expiration of a period of 30 days thereafter: ", + "page_start": 32, + "page_end": 32, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "**32. Election of President after dissolution of Parliament**\n\n(1) Whenever Parliament is dissolved an election shall be held to the office of \nPresident in such manner as is prescribed by this section and, subject thereto, by or \nunder an Act of Parliament. \n\n(2) Nominations in the election of a President shall be delivered to the returning \nofficer on such day and at such time as may be prescribed by or under any law for the \ntime being in force in Botswana; the nomination of a candidate in an election of a \nPresident shall not be valid unless it is supported, in such manner as may be prescribed \nby or under an Act of Parliament, by not less than 1000 persons registered as voters for \nthe purpose of elections to the Assembly. \n\n(3) The following provisions shall then apply- \n\n(a) \n\na person nominated as a Parliamentary candidate may, at the time of his or her \nnomination and subject to the provisions of paragraph (b), declare in such \nmanner as may be prescribed by or under an Act of Parliament which of the \ncandidates in the election of President he or she supports, but the nomination of \na Parliamentary candidate shall be valid notwithstanding that the nomination \npaper does not contain such a declaration; \nsuch a declaration shall not be made in relation to any Presidential candidate \nunless that candidate has signified, in such manner as may be prescribed by or \nunder an Act of Parliament, his or her consent to the making of a declaration in \nhis or her favour by that Parliamentary candidate; ", + "page_start": 16, + "page_end": 16, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "provided by Parliament shall have all the powers of such a court. \n**100. Appointment of judges of Court of Appeal**\n\n(1) The President of the Court of Appeal shall, unless that office is held ex-officio \n\nby the Chief Justice, be appointed by the President. \n\n(2) The Justices of Appeal, if any, shall be appointed by the President, acting in \n\naccordance with the advice of the Judicial Service Commission. \n\n(3) A person shall not be qualified to be appointed as a judge of the Court of \n\nAppeal unless- \n\n(a) \n\nhe or she holds, or has held office as, a judge of a court having unlimited \njurisdiction in civil and criminal matters in Botswana, in a Commonwealth \ncountry or in any country outside the Commonwealth that may be prescribed by \nParliament or a court having jurisdiction in appeals from such a court; or \nhe or she is qualified to practise as an advocate or attorney in such a court and \nhas been qualified for not less than ten years to practise as an advocate or \nattorney in such a court; or \nhe or she is qualified to practise as an advocate or attorney and he or she has \nhad experience in the teaching of law in a recognised university for not less \nthan ten years. \n\n(b) ", + "page_start": 42, + "page_end": 42, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "Provided that his or her seat shall become vacant- \n\n(i) \n\nin the case of a person who, at the date of his or her appointment, was the \nVice-President or a Minister, if he or she ceases to be the Vice-President or a \nMinister; or \nif the President, by instrument in writing under his or her hand, so directs. (ii) \n\n(3) The Committee shall not be summoned except by the authority of the \n\nPresident who shall, as far as is practicable, attend and preside at all meetings of the \nCommittee, and, in the absence of the President, the member of the Committee \nappointed under subsection (1)(a) of this section shall preside. \n\n(4) The Committee may act notwithstanding any vacancy in its membership and \n\nits proceedings shall not be invalidated by the presence or participation of any person \nnot entitled to be present at or to participate in those proceedings. \n\n(5) Subject to the provisions of this section, the Committee may regulate its own \n\nprocedure. \n**55. Functions of Advisory Committee on Prerogative of Mercy**\n\n(1) Where any person has been sentenced to death for any offence, the \nPresident shall cause a written report of the case from the trial judge, together with such \nother information derived from the record of the case or elsewhere as he or she may \nrequire, to be considered at a meeting of the Advisory Committee on the Prerogative of \nMercy; and after obtaining the advice of the Committee he or she shall decide whether to \nexercise any of his or her powers under section 53 of this Constitution. \n\n(2) The President may consult with the Committee before deciding whether to \n\nexercise any of his or her powers under the said section 53 in any case not falling within \nsubsection (1) of this section. \n**56. Constitution of offices**\n\nSubject to the provisions of this Constitution and of any Act of Parliament, the \npowers of constituting and abolishing offices for Botswana shall vest in the President. \n\n**CHAPTER V**\n**Parliament (ss 57-94)**\n**PART I**\n**Composition (ss 57-70)**", + "page_start": 25, + "page_end": 25, + "source_file": "Botswana-constitution.pdf" + } + ] + }, + { + "references": { + "source_file": "Botswana-constitution.pdf", + "query": "What is the condition to be allowing to access the position of Director of public prosecution in Botswana ?", + "target_page": 25, + "target_passage": "A person shall not be qualified to be appointed to the Office of Director of Public Prosecutions unless he or she is qualified to be appointed to the Office of a Judge of the High Court", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "holding or acting in such offices shall, subject to the provisions of sections 113 and 114 \nof this Constitution, vest in the President. \n\n(2) The offices to which this section applies are- \n\n(a) Ambassador, High Commissioner or other principal representative of Botswana \n\nin any other country or accredited to any international organisation; \n\n(b) Secretary to the Cabinet; \n(c) Attorney-General; \n(cA) Director of Public Prosecutions; \n(d) Permanent Secretary; \n(e) Commissioner of Police; and \n(f) \n\nany other superscale office (other than an office to which this Constitution \nmakes specific provision for appointment or an office to which appointment is \nmade under the provisions of section 104 of this Constitution) which may be \nprescribed by Act of Parliament. \n\n**113. Tenure of office of Director of Public Prosecutions**\nprovisions of this section, a person appointed as Director of Public Prosecutions shall \nhold office for a 5 year renewable term or until he or she attains the age of 60 years, \nwhichever is the earlier. \n\n(1) Subject to the \n\n(2) A person holding the office of Director of Public Prosecutions may be \nremoved from office only for inability to perform the functions of his or her office (whether \narising from infirmity of body or mind or any other cause) or for misbehaviour or for \nincompetence and shall not be so removed except in accordance with the provisions of \nthis section. \n\n(3) If the President considers that the question of removing a person holding the \n\noffice of Director of Public Prosecutions from office ought to be investigated then- \n\n(a) \n\nhe or she shall appoint a tribunal which shall consist of a Chairman and not less \nthan two other members, who hold or have held high judicial office; and \nthe tribunal shall enquire into the matter and report on the facts thereof to the \nPresident and advise the President whether the person holding the office of \nDirector of Public Prosecutions ought to be removed from office under this \nsection for inability as aforesaid or for misbehaviour or for incompetence. \n(4) Where a tribunal appointed under subsection (3) of this section advises the \n\n(b) \n\nPresident that a person holding the office of Director of Public Prosecutions \nought to be removed from office for inability as aforesaid or for misbehaviour or \nfor incompetence, the President shall remove such person from office. \n\n(5) If the question of removing a person holding the office of Director of Public \n\nProsecutions from office has been referred to a tribunal under this section, the President \nmay suspend that person from performing the functions of his or her office, and any such \nsuspension may at any time be revoked by the President and shall in any case cease to \nhave effect if the tribunal advises the President that the person ought not to be removed \nfrom office. \n**114. Tenure of office of Auditor-General**", + "page_start": 48, + "page_end": 48, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "**PART III**\n**Judicial Service Commission (ss 103-104)**\n\n**103. Composition and procedure**\n\n(1) There shall be a Judicial Service Commission for Botswana which shall \n\nconsist of- \n(a) \n(b) \n\nthe Chief Justice who shall be Chairman; \nthe President of the Court of Appeal (not being the Chief Justice or the most \nSenior Justice of the Court of Appeal); \nthe Attorney-General; \nthe Chairman of the Public Service Commission; \na member of the Law Society nominated by the Law Society; and \na person of intergrity and experience not being a legal practitioner appointed by \nthe President. \n\n(c) \n(d) \n(e) \n(f) \n\n(2) A member nominated under paragraph (e) or appointed under paragraph (f) \n\nof subsection (1) shall hold office for a period of two years, but shall be eligible for re- \nnomination or re-appointment, as the case may be, for another term of office for two \nyears: \n\nProvided that- \n\n(i) a member nominated under paragraph (e) may be removed from office by the \nrest of the members of the Commission acting together only for inability of the \nmember to discharge the functions of his or her office whether arising from \ninfirmity of mind or body or any other cause or for gross misbehaviour; or \n(ii) a member appointed under paragraph (f) may be removed from office by the ", + "page_start": 44, + "page_end": 44, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "Provided that his or her seat shall become vacant- \n\n(i) \n\nin the case of a person who, at the date of his or her appointment, was the \nVice-President or a Minister, if he or she ceases to be the Vice-President or a \nMinister; or \nif the President, by instrument in writing under his or her hand, so directs. (ii) \n\n(3) The Committee shall not be summoned except by the authority of the \n\nPresident who shall, as far as is practicable, attend and preside at all meetings of the \nCommittee, and, in the absence of the President, the member of the Committee \nappointed under subsection (1)(a) of this section shall preside. \n\n(4) The Committee may act notwithstanding any vacancy in its membership and \n\nits proceedings shall not be invalidated by the presence or participation of any person \nnot entitled to be present at or to participate in those proceedings. \n\n(5) Subject to the provisions of this section, the Committee may regulate its own \n\nprocedure. \n**55. Functions of Advisory Committee on Prerogative of Mercy**\n\n(1) Where any person has been sentenced to death for any offence, the \nPresident shall cause a written report of the case from the trial judge, together with such \nother information derived from the record of the case or elsewhere as he or she may \nrequire, to be considered at a meeting of the Advisory Committee on the Prerogative of \nMercy; and after obtaining the advice of the Committee he or she shall decide whether to \nexercise any of his or her powers under section 53 of this Constitution. \n\n(2) The President may consult with the Committee before deciding whether to \n\nexercise any of his or her powers under the said section 53 in any case not falling within \nsubsection (1) of this section. \n**56. Constitution of offices**\n\nSubject to the provisions of this Constitution and of any Act of Parliament, the \npowers of constituting and abolishing offices for Botswana shall vest in the President. \n\n**CHAPTER V**\n**Parliament (ss 57-94)**\n**PART I**\n**Composition (ss 57-70)**", + "page_start": 25, + "page_end": 25, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "under such a provision as is referred to in subsection (3)(a) of this section (other than a \nrestriction which is applicable to persons generally or to general classes of persons) so \nrequests at any time during the period of that restriction not earlier than six months after \nthe order was made or six months after he or she last made such request, as the case \nmay be, his or her case shall be reviewed by an independent and impartial tribunal \npresided over by a person, qualified to be enrolled as an advocate in Botswana, \nappointed by the Chief Justice. \n\n(5) On any review by a tribunal in pursuance of this section of the case of a \n\nperson whose freedom of movement has been restricted, the tribunal may make \nrecommendations, concerning the necessity or expediency of continuing the restriction \nto the authority by which it was ordered but, unless it is otherwise provided by law, that \nauthority shall not be obliged to act in accordance with any such recommendations. \n**15. Protection from discrimination on the grounds of race, etc.**\n\n(1) Subject to the provisions of subsections (4), (5) and (7) of this section, no law \n\nshall make any provision that is discriminatory either of itself or in its effect. ", + "page_start": 12, + "page_end": 12, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "(a) \n\ngrant to any person convicted of any offence a pardon, either free or subject to \nlawful conditions; \ngrant to any person a respite, either indefinite or for a specified period, of the \nexecution of any punishment imposed on that person for any offence; \nsubstitute a less severe form of punishment for any punishment imposed on \nany person for any offence; and \nremit the whole or part of any punishment imposed on any person for any \noffence or of any penalty or forfeiture otherwise due to the Government on \naccount of any offence. \n\n(b) \n\n(c) \n\n(d) \n\n**54. Advisory Committee on Prerogative of Mercy**\n\n(1) There shall be an Advisory Committee on the Prerogative of Mercy which \n\nshall consist of- \n\n(a) \n\nthe Vice-President or a Minister appointed by the President by instrument in \nwriting under his or her hand; \nthe Attorney-General; and \na person qualified to practise in Botswana as a medical practitioner, appointed \nby the President by instrument in writing under his or her hand. \n\n(2) A member of the Committee appointed under subsection (1)(a) or (c) of this \n\nsection shall hold his or her seat thereon for such period as may be specified in the \ninstrument by which he or she was appointed: ", + "page_start": 25, + "page_end": 25, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "detention is authorized; \nnot more than one month after the commencement of his or her detention and \nthereafter during his or her detention at intervals of not more than six months, \nhis or her case shall be reviewed by an independent and impartial tribunal \nestablished by law and presided over by a person, qualified to be enrolled as an \nadvocate in Botswana, appointed by the Chief Justice; and \nhe or she shall be afforded reasonable facilities to consult and instruct, at his or \nher own expense, a legal representative and he or she and any such legal \nrepresentative shall be permitted to make written or oral representations or both \nto the tribunal appointed for the review of his or her case. \n\n(c) \n\n(3) On any review by a tribunal in pursuance of this section of the case of a \n\ndetained person, the tribunal may make recommendations, concerning the necessity or \nexpediency of continuing his or her detention, to the authority by which it was ordered \nbut, unless it is otherwise provided by law, that authority shall not be obliged to act in \naccordance with any such recommendations. \n**17. Declarations relating to emergencies**\n\n(1) The President may at any time, by Proclamation published in the Gazette, ", + "page_start": 14, + "page_end": 14, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "provided by Parliament shall have all the powers of such a court. \n**100. Appointment of judges of Court of Appeal**\n\n(1) The President of the Court of Appeal shall, unless that office is held ex-officio \n\nby the Chief Justice, be appointed by the President. \n\n(2) The Justices of Appeal, if any, shall be appointed by the President, acting in \n\naccordance with the advice of the Judicial Service Commission. \n\n(3) A person shall not be qualified to be appointed as a judge of the Court of \n\nAppeal unless- \n\n(a) \n\nhe or she holds, or has held office as, a judge of a court having unlimited \njurisdiction in civil and criminal matters in Botswana, in a Commonwealth \ncountry or in any country outside the Commonwealth that may be prescribed by \nParliament or a court having jurisdiction in appeals from such a court; or \nhe or she is qualified to practise as an advocate or attorney in such a court and \nhas been qualified for not less than ten years to practise as an advocate or \nattorney in such a court; or \nhe or she is qualified to practise as an advocate or attorney and he or she has \nhad experience in the teaching of law in a recognised university for not less \nthan ten years. \n\n(b) ", + "page_start": 42, + "page_end": 42, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "(1) The Chief Justice shall be appointed by the President. \n(2) The other judges of the High Court shall be appointed by the President, acting \n\nin accordance with the advice of the Judicial Service Commission. \n\n(3) A person shall not be qualified to be appointed as a judge of the High Court \n\nunless- \n(a) \n\nhe or she holds, or has held office, as a judge of a court having unlimited \njurisdiction in civil and criminal matters in Botswana, in a Commonwealth \ncountry or in any country outside the Commonwealth that may be prescribed by \nParliament or a court having jurisdiction in appeals from such a court; or \nhe or she is qualified to practise as an advocate or attorney in such a court and \nhas been qualified for not less than ten years to practise as an advocate or \nattorney in such a court; \nhe or she is qualified to practise as an advocate or attorney and he or she has \nhad the experience in the teaching of law in a recognised university for not less \nthan ten years; or \nhe or she is a Chief Magistrate who has held that office for not less than five \nyears. \n\n(b) \n\n(4) In computing, for the purposes of subsection (3) of this section, the period ", + "page_start": 40, + "page_end": 40, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "(d) the Industrial Court. \n\n(2) In this Constitution, unless the context otherwise requires, references to \n\noffices in the public service shall be construed as including references to the offices of \njudges of the Court of Appeal and judges of the High Court and the offices of members \nof all subordinate courts (being offices the emoluments attaching to which, or any part of \nthe emoluments attaching to which, are paid directly out of moneys provided by \nParliament). \n\n(3) For the purposes of this Constitution a person shall not be considered to be a \npublic officer by reason only that he or she is in receipt of any remuneration or allowance \nas the President, Vice-President, a Minister or Assistant Minister, Speaker, Deputy \nSpeaker or Member of the Assembly, a Member of the Ntlo ya Dikgosi or a member of \nany Commission established by this Constitution. \n\n(4) For the purposes of this Constitution, a person shall not be considered as \n\nholding a public office by reason only of the fact that he or she is in receipt of a pension \nor other like allowance in respect of service under the Government of Botswana or the \nformer Protectorate of Bechuanaland. ", + "page_start": 54, + "page_end": 54, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "has more than one residence in Botswana in the constituency in which he or \nshe has his or her principal residence; or \nin the case of a person who does not have a residence in Botswana but is able \nto register in person, in the constituency in which he or she last resided, or in \nwhich he or she was born; or \nin the case of a person who is not resident in Botswana and is unable to \nregister in person, at such place as may be prescribed by Parliament and \nregistration at such place shall be treated as registration in the constituency in \nwhich he or she last resided, or in which he or she was born in Botswana. \n\n(b) \n\n(c) \n\n(4) A person shall be entitled to be registered as a voter in one constituency only. \n(5) Every person who is registered in any constituency as a voter for the \npurposes of elections of the Elected Members of the National Assembly shall, unless he \nor she is disqualified by Parliament from voting in such elections on the grounds of his or \nher having been convicted of an offence in connection with the elections or on the \ngrounds of his or her having been reported guilty of such an offence by the court trying \nan election petition or on the grounds of his or her being in lawful custody at the date of \nthe election, be entitled so to vote in that constituency in accordance with the provisions \nmade by or under a law in that behalf; and no other person may so vote. \n**68. Tenure of office of Members**\n\n(1) The seat of an Elected Member or a Specially Elected Member of the \n\nNational Assembly shall become vacant- \n\n(a) \n(b) \n\nupon the dissolution of Parliament; \nif he or she is absent from the sittings of the Assembly for such period and in \nsuch circumstances as may be prescribed in the rules of procedure of the \nAssembly; \nsubject to the provisions of subsections (2) to (3) of this section, if any \ncircumstances arise that, if he or she were not a Member of the Assembly, \nwould cause him or her to be disqualified for election thereto. \n\n(c) \n\n(2) If circumstances such as are referred to in paragraph (c) of the preceding \n\nsubsection arise in relation to a Member of the Assembly by virtue of the fact that he or \nshe is declared insolvent, adjudged to be of unsound mind, sentenced to death or \nimprisonment, or convicted of an election offence and it is open to the Member to appeal \nagainst the decision (either with the leave of the court or other authority or without such \nleave), he or she shall forthwith cease to perform his or her functions as a Member of the \nAssembly but, subject to the next following subsection, he or she shall not vacate his or \nher seat until the expiration of a period of 30 days thereafter: ", + "page_start": 32, + "page_end": 32, + "source_file": "Botswana-constitution.pdf" + } + ] + }, + { + "references": { + "source_file": "Botswana-constitution.pdf", + "query": "What are considered \"disciplined force\" according to Botswana constitution ?", + "target_page": 16, + "target_passage": "\"disciplined force\" means- (a) a naval, military or air force; (b) a police force; or (c) a prison service", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**\"disciplinary law\"**means a law regulating the discipline of any disciplined force; \n**\"disciplined force\"**means- \na naval, military or air force; \na police force; or \na prison service; (a) \n(b) \n(c) \n\n**\"legal representative\"**means a person entitled to practise in Botswana as an \n\nadvocate or attorney; \n\n**\"member\"**, in relation to a disciplined force, includes any person who, under the \n\nlaw regulating the discipline of that force, is subject to that discipline. \n\n(2) In relation to any person who is a member of a disciplined force raised under \nan Act of Parliament, nothing contained in or done under the authority of the disciplinary \nlaw of that force shall be held to be inconsistent with or in contravention of any of the \nprovisions of this Chapter other than sections 4, 6 and 7. \n\n(3) In relation to any person who is a member of a disciplined force raised \n\notherwise than as aforesaid and lawfully present in Botswana, nothing contained in or \ndone under the authority of the disciplinary law of that force shall be held to be \ninconsistent with or in contravention of any of the provisions of this Chapter. ", + "page_start": 15, + "page_end": 15, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "**PART III**\n**Executive Functions (ss 47-56)**\n\n**47. Functions of President**\n\n(1) The executive power of Botswana shall vest in the President and, subject to \n\nthe provisions of this Constitution, shall be exercised by him or her either directly or \nthrough officers subordinate to him or her. \n\n(2) In the exercise of any function conferred upon him or her by this Constitution \nor any other law the President shall, unless it is otherwise provided, act in his or her own \ndeliberate judgment and shall not be obliged to follow the advice tendered by any other ", + "page_start": 22, + "page_end": 22, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "**57. Parliament**\n\nThere shall be a Parliament of Botswana which shall consist of the President and \n\na National Assembly. \n**58. Composition of National Assembly**\n\n(1) The President shall be ex-officio a member of the National Assembly, and \n\nshall be entitled to speak and to vote in all proceedings of the National Assembly. \n\n(2) In addition to the President the National Assembly shall consist of- \n\n(a) \n\n57 Elected Members who shall be elected in accordance with the provisions of \nthis Constitution and subject thereto in accordance with the provisions of any \nAct of Parliament; and \nfour Specially Elected Members who shall be elected in accordance with the \nFirst Schedule to this Constitution and subject thereto in accordance with the \nprovisions of any Act of Parliament. \n\n(3) If a person who is not a member of the National Assembly is elected to the \noffice of Speaker of the National Assembly, that person shall, by virtue of holding that \noffice, be a member of the Assembly in addition to the members referred to in \nsubsections (1) and (2) of this section. \n**59. Speaker**\n\n(1) There shall be a Speaker of the National Assembly who shall be elected by \nthe Members of the Assembly from among persons who are Members of the Assembly \nor from among persons who are not Members of the Assembly. \n\n(2) The President, the Vice-President, a Minister, an Assistant Minister or a \n\npublic officer shall not be qualified to be elected as Speaker. \n(3) The Speaker shall vacate his or her office- \n\n(a) \n\nif, having been elected from among the Members of the National Assembly, he \nor she ceases to be a Member of the Assembly otherwise than by reason of a \ndissolution of Parliament or if he or she is required by virtue of section 68(2) to \n(3) of this Constitution, to cease to perform his or her functions as a Member of \nthe Assembly; \nif any circumstances arise that, if he or she were not Speaker, would disqualify \nhim for election as such; \n\n(b) \n\n(c) when the Assembly first sits after any dissolution of Parliament; or \n(d) \n\nif he or she is removed from office by a resolution of the Assembly supported by \nthe votes of not less than two-thirds of all the Members thereof. \n\n(4) No business shall be transacted in the National Assembly (other than an \nelection to the office of Speaker) at any time when the office of Speaker is vacant. \n**60. Deputy Speaker**\n\n(1) There shall be a Deputy Speaker of the National Assembly who shall be \nelected from among the persons who are Members of the Assembly other than the \nPresident, the Vice-President, Ministers or Assistant Ministers. \n\n(2) The Members of the National Assembly shall elect a person to the office of \n\nDeputy Speaker when the Assembly first sits after any dissolution and, if the office \nbecomes vacant otherwise than by reason of the dissolution of the Assembly, at the first \nsitting of the Assembly after the office becomes vacant. \n\n(3) The Deputy Speaker shall vacate his or her office- \n\n(a) \n\nif he or she ceases to be a Member of the National Assembly, otherwise than \nby reason of a dissolution of Parliament; \nif any circumstances arise that, if he or she were not Deputy Speaker, would \ndisqualify him or her for election as such; \nif he or she is required, by virtue of section 68(2) to (3) of this Constitution, to \ncease to perform his or her functions as a Member of the Assembly; \n\n(b) \n\n(c) ", + "page_start": 26, + "page_end": 26, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "(2) Nothing contained in or done under the authority of any law shall be held to \n\nbe inconsistent with or in contravention of this section to the extent that the law in \nquestion makes provision- \n\n(a) \n\nthat is reasonably required in the interests of defence, public safety, public \norder, public morality, public health, town and country planning, the \ndevelopment and utilization of mineral resources, for the purpose of any census \nor in order to secure the development or utilization of any property for a purpose \nbeneficial to the community; \nthat is reasonably required for the purpose of protecting the rights or freedoms \nof other persons; \nthat authorizes an officer or agent of the Government of Botswana, a local \ngovernment authority or a body corporate established by law for a public \npurpose to enter on the premises of any person in order to inspect those \npremises or anything thereon for the purpose of any tax, rate or duty or in order \nto carry out work connected with any property that is lawfully on those premises \nand that belongs to that Government, authority or body corporate, as the case \nmay be; or \nthat authorizes, for the purpose of enforcing the judgment or order of a court in \nany civil proceedings, the search of any person or property by order of a court \nor entry upon any premises by such order, \n\n(d) ", + "page_start": 8, + "page_end": 8, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "(d) the Industrial Court. \n\n(2) In this Constitution, unless the context otherwise requires, references to \n\noffices in the public service shall be construed as including references to the offices of \njudges of the Court of Appeal and judges of the High Court and the offices of members \nof all subordinate courts (being offices the emoluments attaching to which, or any part of \nthe emoluments attaching to which, are paid directly out of moneys provided by \nParliament). \n\n(3) For the purposes of this Constitution a person shall not be considered to be a \npublic officer by reason only that he or she is in receipt of any remuneration or allowance \nas the President, Vice-President, a Minister or Assistant Minister, Speaker, Deputy \nSpeaker or Member of the Assembly, a Member of the Ntlo ya Dikgosi or a member of \nany Commission established by this Constitution. \n\n(4) For the purposes of this Constitution, a person shall not be considered as \n\nholding a public office by reason only of the fact that he or she is in receipt of a pension \nor other like allowance in respect of service under the Government of Botswana or the \nformer Protectorate of Bechuanaland. ", + "page_start": 54, + "page_end": 54, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "\n \n \n \n \n [html]( 4 )( c ) of this section, the areas of Gharzi and Kgalagada shall each have the option of either selecting one Member under subseclon ( 2 ) of this section or of each selecting two regional Members under subsection ( 4 )( c ) of this section, but m79.Qualifications for membership of Nilla ya Dikgeai ( 1 ) A person shall be qualified to be appointed under section 77 ( 1 )( b ) as aMemhas been declared insolvent or adjudged or otherwise declared bankrupt under any law in force in any part of the Commonwealth or any country with aThere shall be a Secretary to the NIIo ya Dikgosi whose office shall be an office ublic penvice.82.enure of office of Members of Ntlo ya Dikgool 11 ) A Member of the Ntlo ya\n
of the Ntlo ya Dikgosi if he or she —( a )is a citizen of Botswana ; and
( b )has attained the age of 21 years( 2 ) No person shall be qualified to be appointed, selected or designated as a
MemNo Manage and asked asked asked asked as a shewisher asknowledgement of allegian obedience or adherence to a foreign power or state ;( b )
Tablecomparable legal system and has not been discharged, or has made a composition with his or her creditors and has not paid his or her debts in full ;( c )
is certified insane or otherwise adjudged or declared to be of unsound mind under any law for the time being in force in Botswana ;( d )subject to such exceptions as may be prescribed by Parliament, holds any public office, or is acting in any public office by virtue of a contract of service expressed to continue for a period exceeding six months :
( e )is under sentence of death imposed on him or him or her by a count in any part of the Commonwealth or any country with a comparable legal system, or is under a sentence of imprisoment ( by whatever name collect ) exceeding six months imposed on hi( f )
holds, or is acting in anyoffice the functions ofwhichinvolveary responsibility for, or in connection with, the conduct of any elections to the National Assembly or the complation or revision of any electoral register for the purposese( g )is disqualified for election to the National Assembly by virtue of provision made in pursuance of section 62 ( 2 ) of this Constitution. ( 3 ) For the purposes of this section, two or more terms of imprisonment that are
requiredd to be served consecutively shall be regarded as a single term of imprisonmentfor th
the aggregate period of those terms, and no account shall be taken of a sentence of risonment imposed as an alternative to or in default of the payment of a fine. ( 4 ) A Member of the NIb ya Dikgosi shall not, while he or she is such a Memberparticipantsin party politics, but active participation in politics prior to being a Member of Ntlo ya Dikgosi shall not bar any person from being such a Member.
80.Every Member of the Ntic ya Dikgool shall, before taking his or her seat therein,take
and subscribe before the Ntlo ya Dikgosi the oath of allegiance.81.Secretary to Ntlo ya Dikgosi
", + "page_start": 35, + "page_end": 35, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "\n \n \n \n \n [html]freedoms of the individual, that is to say, the right, whatever his or her race, place oforigin, political opinions, colour, creed or sex, but subject to respect for the rights and( 1 ) No person shall be deprived of his or her life intentionally save in execution ofthe sentence of a court in respect of an offence under the law in force in Botswana of which he or she has been convicted.( 2 ) A person shall not be regarded as having been deprived of his or her life infor the purpose of suppressing a riot, insurrection or mutiny ; or( d )( d )for the purpose of bringing him or her before a court in execution of the order of a court ;\n
Protection of Fundamental Rights and Freedoms of the Individual ( ss 3 - 19 )
3.Fundamental rights and freedoms of the individual
Whereas every person in Botswana is entitled to the fundamental rights and
freedoms of others and for the public interest to each and all of the following, namely -( a )life, liberty, security of the person and the protection of the law ;
( b )freedom of conscience, of expression and of assembly and association ; and( c )
protection for the privacy of his or home and other property and from deprivation of property without compensation,the provisions of this Chapter shall have effect for the purpose of affording protection tothose rights and freedoms subject to such limitations of that protection as are contained
in those provisions, being limitations designed to ensure that the enjoyment of the said rights and freedoms by any individual does not prejudion the rights and freedoms of others or the public interest.4. Protection of right to life
contravention of subsection ( 1 ) of this section if he or she dies as the result of the use, to such extent and in such circumstances as are permitted by law, of such force as sis reasonable -( a )for the defence of any person from violence or for the defence of property ;
( b )in order to effect a lawful arrest or to prevent the escape of a person lawfully detained ;( c )
in order to prevent the commission by that person of a criminal offence,or if he or she dies as the result of a lawful act of war.5. Protection
Protection of right to personal liberty( 1 ) No person shall be deprived of his or her personal liberty save as may beauthorized by law in any of the following cases, that is to saya
( a )in execution of the senterce or order of a court, whether established for Extowana or some other country, in respect of a criminal offence of which she has been convicted ;( b )
in execution of the order of a court of record punishing him or her for contempt of that or another court ;( c )in execution of the order of a court made to secure the fulfilment of any obligation imposed on him or her by law ;
( e )upon reasonable suspicion of his or her having committed, or being about to commit, a criminal offerice under the law in force in Botswana ;( f )
under the order of a court or with the consent of his or her parent or guardian,
", + "page_start": 4, + "page_end": 4, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "**CHAPTER III**\n**Citizenship (ss 20-29: repealed)**\n\n**20 to 29 inclusive.** **[Repealed.]**\n\n**CHAPTER IV**\n**The Executive (ss 30-56)**\n**PART I**\n**The President and the Vice-President (ss 30-41)**\n\n**30. Office of President**\n\nThere shall be a President of the Republic of Botswana who shall be the Head of \n\nState. \n**31. First President**\n\n(1) The first President shall be the person who immediately before 30th \n\nSeptember, 1966 holds the office of Prime Minister under the Constitution. \n\n(2) The first President shall be deemed to have assumed office at the coming into \n\noperation of this Constitution. ", + "page_start": 15, + "page_end": 15, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "National Assembly. \n\n(6) A person attending the proceedings of the Ntlo ya Dikgosi by virtue of the \n\nprovisions of subsection (3) or (4) of this section shall be entitled to take part in the \nproceedings of the Ntlo ya Dikgosi relating to the matter in respect of which he or she \nattends as if he or she were a Member of the Ntlo ya Dikgosi: \n\nProvided that he or she shall not be entitled to vote in the Ntlo ya Dikgosi. \n**PART IV**\n**Powers of Parliament (ss 86-89)**\n\n**86. Legislative powers**\n\nSubject to the provisions of this Constitution, Parliament shall have power to \n\nmake laws for the peace, order and good government of Botswana. \n**87. Mode of exercising legislative powers**\n\n(1) Subject to the provisions of section 89(4) of this Constitution the power of \n\nParliament to make laws shall be exercised by Bills passed by the National Assembly, \nafter reference in the cases specified in section 88(2) of this Constitution to the Ntlo ya \nDikgosi, and assented to by the President. ", + "page_start": 37, + "page_end": 37, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "her lawful detention shall not be held to be inconsistent with or in contravention of this \nsection. \n\n(3) Nothing contained in or done under the authority of any law shall be held to \n\nbe inconsistent with or in contravention of this section to the extent that the law in \nquestion makes provision- \n\n(a) \n\nfor the imposition of restrictions that are reasonably required in the interests of \ndefence, public safety, public order, public morality or public health or the \nimposition of restrictions on the acquisition or use by any person of land or \nother property in Botswana and except so far as that provision or, as the case \nmay be, the thing done under the authority thereof, is shown not to be \nreasonably justifiable in a democratic society; \nfor the imposition of restrictions on the freedom of movement of any person who \nis not a citizen of Botswana; \nfor the imposition of restrictions on the entry into or residence within defined \nareas of Botswana of persons who are not Bushmen to the extent that such \nrestrictions are reasonably required for the protection or well-being of Bushmen; \nfor the imposition of restrictions upon the movement or residence within \nBotswana of public officers; or \n....... \n\n(b) \n\n(c) \n\n(4) If any person whose freedom of movement has been restricted by order ", + "page_start": 12, + "page_end": 12, + "source_file": "Botswana-constitution.pdf" + } + ] + }, + { + "references": { + "source_file": "serverless-core.pdf", + "query": "How much does AWS lambda charge when the function is not running ?", + "target_page": 52, + "target_passage": "there is no charge when your code is not running", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Unlike traditional servers, Lambda functions do not run constantly. When a function is triggered by \n\nan event, this is called an*invocation*. Lambda functions are limited to 15 minutes in duration, but \n\non average, across all AWS customers, most invocations last for less than a second. ", + "page_start": 55, + "page_end": 55, + "source_file": "serverless-core.pdf" + }, + { + "text": "Serverless \n\ncould be listening. The handler function might create and send another event to an SNS queue so \n\nthat alerts for high temperature are sent to users through SMS messages. \n\nThe function finally wraps up the JSON weather data into a new event and sends it back to API \n\ngateway. Afterward, the function continues to handle hundreds of additional requests. Request \n\nfrom users slow down after 2AM, so after some time the Lambda service will tear down the \n\nfunction execution environment to conserve resources. As a Customer, you will only be charged for \n\nfunction usage. ", + "page_start": 38, + "page_end": 38, + "source_file": "serverless-core.pdf" + }, + { + "text": "Related resources: \n\n• Accelerate Your Lambda Functions with Lambda SnapStart - an AWS Compute blog article by \n\nJeff Barr from Nov 2022 that shows the configuration change and vast difference from roughly \n\nsix seconds init time to 142 milliseconds of restore time with SnapStart ", + "page_start": 62, + "page_end": 62, + "source_file": "serverless-core.pdf" + }, + { + "text": "Many traditional systems are designed to run periodically and process batches of transactions that \n\nhave built up over time. For example, a banking application may run every hour to process ATM \n\ntransactions into central ledgers. In Lambda-based applications, the custom processing should be \ntriggered by every event, allowing the service to scale up concurrency as needed, to provide near- \n\nreal time processing of transactions. \n\nWhile you can run cron tasks in serverless applications by using Amazon EventBridge Scheduler, \n\nconsider the size of each batch of data that your event sends to Lambda. In this scenario, there \n\nis potential for the volume of transactions to grow beyond what can be processed within the 15- \n\nminute Lambda timeout. If the limitations of external systems force you to use a scheduler, you \n\nshould generally schedule for the shortest reasonable recurring time period. \n\nFor example, it’s not best practice to use a batch process that triggers a Lambda function to fetch \n\na list of new Amazon S3 objects. This is because the service might receive more new objects in \n\nbetween batches than can be processed within a 15-minute Lambda function. ", + "page_start": 24, + "page_end": 24, + "source_file": "serverless-core.pdf" + }, + { + "text": "Subsequent events will invoke the handler again, without the initialization delay. During this cycle, \n\nthe function stays in memory, so clients and variables declared outside of the handler method can \n\nbe reused. \n\nAfter a period of time, Lambda will eventually tear down the runtime. This can happen for a variety \n\nof reasons; some examples: scaling down to conserve resources, updating the function, updating \n\nthe runtime. \n\nThe function**handler**is the essential component of your function code. As noted previously, the \nhandler is the entry point, but it may not be the only function in your code. In fact, a best practice \n\nis keeping the handler sparse and doing the actual processing in other functions in your code. \n\nHere are some example**handlers**: \n\nPython ", + "page_start": 56, + "page_end": 56, + "source_file": "serverless-core.pdf" + }, + { + "text": "**How to write logs with serverless applications**\n\nYou might have noticed the logging statements in the preceding handler code. Where do those log \n\nmessages go? \n\nDuring invocation, the Lambda runtime automatically captures function output to Amazon \n\nCloudWatch. \n\nIn addition to logging your function's output, the runtime also logs entries when function \n\ninvocation starts and ends. This includes a report log with the request ID, billed duration, ", + "page_start": 58, + "page_end": 58, + "source_file": "serverless-core.pdf" + }, + { + "text": "Logging and debugging go hand in hand. Traces of events are available with Amazon X-Ray for \n\ndebugging. \n\n**Securing functions**\n\nAWS Identity and Access Management (IAM) is the service used to manage access to AWS services. \n\nLambda is fully integrated with IAM, allowing you to control precisely what each Lambda function \n\ncan do within the AWS Cloud. There are two important things that define the scope of permissions \n\nin Lambda functions: \n\n•*resource policy*: Defines which events are authorized to invoke the function. \n\n•*execution role policy*: Limits what the Lambda function is authorized to do. ", + "page_start": 59, + "page_end": 59, + "source_file": "serverless-core.pdf" + }, + { + "text": "Next, API Gateway integrates with Lambda, a compute service, to handle the new event. Lambda \n\nfunction code parses the parameters in the inbound event, connects to the data store, and retrieves \n\nthe cart. The function queries the database API through an SDK library. Because the DynamoDB \n\ndatabase is also serverless and built to respond with low latency, there is no need for a connection \n\npool. \n\nAfter converting currency to USD and removing unavailable items, the function sends the result as \n\na new event to API Gateway. \n\nFinally, API Gateway converts the event into a response to send to the waiting client. \n\nThe method with which a function is invoked should be informed by your application archecture \n\nand needs. For example, batch-processing patterns have different applications to on-demand data \n\nprocessing. Understanding these paradigm differences can also help customers decide between \n\nAWS services. \n\nDeploying a microservice as a containerized application on Fargate could be more appropriate if \n\nthe microservice is primarily used for batch data processing. Whereas a Lambda function would be \n\nmuch more straight-forward to deploy and maintain in applications that require on-demand data \n\nprocessing. ", + "page_start": 29, + "page_end": 29, + "source_file": "serverless-core.pdf" + }, + { + "text": "These services are designed to integrate with Lambda and you can use infrastructure as code \n\n(IaC) to create and discard resources in the services. You can use any of these services via the AWS \n\nSDK without needing to install applications or configure servers. Becoming proficient with using \n\nthese services via code in your Lambda functions is an important step to producing well-designed \n\nserverless applications. ", + "page_start": 23, + "page_end": 23, + "source_file": "serverless-core.pdf" + }, + { + "text": "Within the Lambda service, your function code is stored in a code package, deployed as a .zip or a \n\ncontainer image. All interaction with the code occurs through the Lambda API. There is no direct \ninvocation of functions from outside of the Lambda service. ", + "page_start": 51, + "page_end": 51, + "source_file": "serverless-core.pdf" + } + ] + }, + { + "references": { + "source_file": "serverless-core.pdf", + "query": "What is the role of resource policies of lambda functions ?", + "target_page": 60, + "target_passage": "resource policy: Defines which events are authorized to invoke the function.", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "Using IAM roles to describe a Lambda function’s permissions, decouples security configuration \n\nfrom the code. This helps reduce the complexity of a lambda function, making it easier to maintain. \n\nA Lambda function’s resource and execution policy should be granted the minimum required \n\npermissions for the function to perform it’s task effectively. This is sometimes referred to as the \n\nrule of least privilege. As you develop a Lambda function, you expand the scope of this policy to \n\nallow access to other resources as required. ", + "page_start": 59, + "page_end": 59, + "source_file": "serverless-core.pdf" + }, + { + "text": "What you will learn on your journey to building applications with Lambda: \n\n• How the event-driven programming model invokes Lambda functions \n\n• How to create, invoke, test, update, package, and secure functions \n\n• How the execution and runtime environment runs your functions \n\n• How to view logs and monitor your functions \n\n• Where to find hands-on opportunities to learn how to invoke functions ", + "page_start": 51, + "page_end": 51, + "source_file": "serverless-core.pdf" + }, + { + "text": "**Stateless data**\n\nWhen building Lambda functions, you should assume that the environment exists only for a single \n\ninvocation. The function should initialize any required state when it is first started – for example, \n\nfetching a shopping cart from a DynamoDB table. It should commit any permanent data changes \n\nbefore exiting to a durable store such as Amazon S3, DynamoDB, or Amazon SQS. It should not rely \n\non any existing data structures or temporary files, or any internal state that would be managed by \n\nmultiple invocations (such as counters or other calculated, aggregate values). \n\nLambda provides an initializer before the handler where you can initialize database connections, \n\nlibraries, and other resources. Since execution environments are reused where possible to \n\nimprove performance, you can amortize the time taken to initialize these resources over multiple \n\ninvocations. However, you should not store any variables or data used in the function within this \n\nglobal scope. ", + "page_start": 10, + "page_end": 10, + "source_file": "serverless-core.pdf" + }, + { + "text": "With SnapStart, Lambda initializes your function when you publish a function version. Lambda \n\ntakes a Firecracker microVM snapshot of the memory and disk state of the initialized execution \n\nenvironment, encrypts the snapshot, and caches it for low-latency access. ", + "page_start": 62, + "page_end": 62, + "source_file": "serverless-core.pdf" + }, + { + "text": "Logging and debugging go hand in hand. Traces of events are available with Amazon X-Ray for \n\ndebugging. \n\n**Securing functions**\n\nAWS Identity and Access Management (IAM) is the service used to manage access to AWS services. \n\nLambda is fully integrated with IAM, allowing you to control precisely what each Lambda function \n\ncan do within the AWS Cloud. There are two important things that define the scope of permissions \n\nin Lambda functions: \n\n•*resource policy*: Defines which events are authorized to invoke the function. \n\n•*execution role policy*: Limits what the Lambda function is authorized to do. ", + "page_start": 59, + "page_end": 59, + "source_file": "serverless-core.pdf" + }, + { + "text": "In traditional applications, you write code to do these tasks. You organize that code into**functions**. \nYou put the function code inside an application framework. Whichever framework you picked will \n\nrun inside a language dependent runtime environment. Finally, that runtime environment will be \n\nhosted on a virtual or physical server. \n\nSetting up, configuring and maintaining the frameworks, runtime environments, and virtual or \n\nphysical infrastructure slows down your delivery of features, bug fixes, and improvements. \n\n**What is Lambda?**\n\nIn Lambda, you write function code. Lambda runs the functions. That’s it. There are no servers. ", + "page_start": 50, + "page_end": 50, + "source_file": "serverless-core.pdf" + }, + { + "text": "**How Lambda invokes your function (runtime environment)**\n\nLambda invokes your function in an*execution environment*, which contains a secure and isolated \n\n*runtime environment*. \n\n• A*runtime*provides a language-specific environment which relays invocation events, context \n\ninformation, and responses between the Lambda and your functions. \n\n• An*execution environment*manages the processes and resources that are required to run the \n\nfunction. ", + "page_start": 55, + "page_end": 55, + "source_file": "serverless-core.pdf" + }, + { + "text": "These services are designed to integrate with Lambda and you can use infrastructure as code \n\n(IaC) to create and discard resources in the services. You can use any of these services via the AWS \n\nSDK without needing to install applications or configure servers. Becoming proficient with using \n\nthese services via code in your Lambda functions is an important step to producing well-designed \n\nserverless applications. ", + "page_start": 23, + "page_end": 23, + "source_file": "serverless-core.pdf" + }, + { + "text": "Serverless \n\nYou can use runtimes that Lambda provides for JavaScript (Node.js), TypeScript, Python, Java, \n\nPython, Go, C#, and PowerShell, or you can build your own custom runtime environment inside of a \ncontainer. \n\nIf you package your code as a .zip file archive, you must configure your function to use a runtime \n\nthat matches your programming language. For a container image, you include the runtime when \n\nyou build the image. ", + "page_start": 56, + "page_end": 56, + "source_file": "serverless-core.pdf" + }, + { + "text": "Next, API Gateway integrates with Lambda, a compute service, to handle the new event. Lambda \n\nfunction code parses the parameters in the inbound event, connects to the data store, and retrieves \n\nthe cart. The function queries the database API through an SDK library. Because the DynamoDB \n\ndatabase is also serverless and built to respond with low latency, there is no need for a connection \n\npool. \n\nAfter converting currency to USD and removing unavailable items, the function sends the result as \n\na new event to API Gateway. \n\nFinally, API Gateway converts the event into a response to send to the waiting client. \n\nThe method with which a function is invoked should be informed by your application archecture \n\nand needs. For example, batch-processing patterns have different applications to on-demand data \n\nprocessing. Understanding these paradigm differences can also help customers decide between \n\nAWS services. \n\nDeploying a microservice as a containerized application on Fargate could be more appropriate if \n\nthe microservice is primarily used for batch data processing. Whereas a Lambda function would be \n\nmuch more straight-forward to deploy and maintain in applications that require on-demand data \n\nprocessing. ", + "page_start": 29, + "page_end": 29, + "source_file": "serverless-core.pdf" + } + ] + }, + { + "references": { + "source_file": "serverless-core.pdf", + "query": "Why can't I use SnapStart on my function tagged with $LATEST ?", + "target_page": 63, + "target_passage": " You can use SnapStart only on published function versions and aliases that point to versions. You can't use SnapStart on a function's unpublished version ($LATEST)", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Launch functions faster with SnapStart**\n\nLambda SnapStart for Java can improve startup performance by up to 10x at no extra cost, \n\ntypically with no changes to your function code. The largest contributor to startup latency (often \n\nreferred to as cold start time) is the time that Lambda spends initializing the function, which \n\nincludes loading the function's code, starting the runtime, and initializing the function code. ", + "page_start": 62, + "page_end": 62, + "source_file": "serverless-core.pdf" + }, + { + "text": "Related resources: \n\n• Accelerate Your Lambda Functions with Lambda SnapStart - an AWS Compute blog article by \n\nJeff Barr from Nov 2022 that shows the configuration change and vast difference from roughly \n\nsix seconds init time to 142 milliseconds of restore time with SnapStart ", + "page_start": 62, + "page_end": 62, + "source_file": "serverless-core.pdf" + }, + { + "text": "With SnapStart, Lambda initializes your function when you publish a function version. Lambda \n\ntakes a Firecracker microVM snapshot of the memory and disk state of the initialized execution \n\nenvironment, encrypts the snapshot, and caches it for low-latency access. ", + "page_start": 62, + "page_end": 62, + "source_file": "serverless-core.pdf" + }, + { + "text": "As you progress on your journey, you should explore the following more advanced topics. \n\n• Connect services with event source mapping \n\n• Deploy code in containers \n\n• Add additional code with layers \n\n• Augment functions with extensions \n\n• Launch functions faster with SnapStart \n\n• Connect to functions with Function URLs ", + "page_start": 60, + "page_end": 60, + "source_file": "serverless-core.pdf" + }, + { + "text": "Serverless \n\nYou can use runtimes that Lambda provides for JavaScript (Node.js), TypeScript, Python, Java, \n\nPython, Go, C#, and PowerShell, or you can build your own custom runtime environment inside of a \ncontainer. \n\nIf you package your code as a .zip file archive, you must configure your function to use a runtime \n\nthat matches your programming language. For a container image, you include the runtime when \n\nyou build the image. ", + "page_start": 56, + "page_end": 56, + "source_file": "serverless-core.pdf" + }, + { + "text": "Notice that in this example it was required to specify the stripe width, because for DRAID6 it is \n12 by default. The drive count value must equal or be greater than the combined value of the \nstripe width and rebuild areas count. \n\nTo check array initialization progress with the CLI, use**lsarrayinitprogress**. \n\n**6.2.4 Actions on arrays**\n\nMDisks that are created from internal storage support specific actions that external MDisks \ndo not support. Some actions that are supported on traditional RAID arrays are not supported \non distributed RAID arrays, and vice versa. \n\nTo choose an action, open**Pools**→**MDisks by Pools,**select the array (MDisk), and click \n**Actions**. Alternatively, right-click the array, as shown in Figure 6-42 on page 223. ", + "page_start": 243, + "page_end": 243, + "source_file": "sg247938.pdf" + }, + { + "text": "**Tip:**If you are updating from V7.8 or later code, the 30-minute wait period can be \nadjusted by using the**applysoftware**CLI command with the -**delay (mins)**parameter \nto begin the update instead of using the GUI. ", + "page_start": 715, + "page_end": 715, + "source_file": "sg247938.pdf" + }, + { + "text": "4. The procedure to generate the snap on a Storwize V7000 system, including the most \n\nrecent statesave from each node canister, starts. This process might take a few minutes \n(see Figure 13-70). ", + "page_start": 751, + "page_end": 751, + "source_file": "sg247938.pdf" + }, + { + "text": "Figure 13-68 Support Package option \n\n2. Click the**Upload Support Package**button. \n\nAssuming that the problem encountered was an unexpected node restart that logged a \n2030 error, we collect the default logs and the most recent statesave from each node to \ncapture the most relevant data for support. \n\n**Note:**When a node unexpectedly reboots, it first dumps its current statesave \ninformation before it restarts to recover from an error condition. This statesave is critical \nfor IBM Support to analyze what occurred. Collecting a snap type 4 creates statesaves \nat the time of the collection, which is not useful for understanding the restart event. ", + "page_start": 749, + "page_end": 749, + "source_file": "sg247938.pdf" + }, + { + "text": "To create and start a snapshot, complete the following steps: \n1. Open the FlashCopy window from the**Copy Services**→**FlashCopy**menu. \n\n2. Select the Volume that you want to create a snapshot of, and right-click it or click \n**Actions**→**Create Snapshot**, as shown in Figure 11-32. ", + "page_start": 501, + "page_end": 501, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_SHEN_2003.pdf", + "query": "At Shentel company, what determines an employees pension ?", + "target_page": 22, + "target_passage": "Pension benefits are based primarily on the employee's compensation and years of service", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "\n\nPENSION ", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "12. PENSION AND PROFIT SHARING PLANS: \n\nThe Company has a defined benefit pension plan covering substantially all of its employees. The benefits are based \non years of service and a percentage of the employee’s qualifying compensation during the final years of \nemployment. The Company’s funding policy is to contribute annually the amount necessary to satisfy the Internal \nRevenue Service’s funding standards. Contributions are intended to provide not only for benefits attributed to \nservice to date but also for those expected to be earned in the future. ", + "page_start": 84, + "page_end": 84, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "under the plan, respectively. Upon a change in control, a key employee is deemed to have a two-year \n\nCash dividends declared and paid per share for each year are: employment with the Company, and all his or her benefits are vested \n\nunder Company plans. If, at any time within two years of the change in \n\n\n \n \n \n \n [html]\n
( IR dollars )200320022001
Common shares$. 52$. 50$. 48
\n\ncontrol, his or her position, salary, bonus, place of work, or Company- \n\nprovided benefits are modified, or employment is terminated by the \nDuring 2002, shareholders approved the 2002 Members’ Stock ", + "page_start": 49, + "page_end": 49, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "***Retirement plans:***The Company maintains a noncontributory defined benefit plan covering substantially all \nemployees. Pension benefits are based primarily on the employee's compensation and years of service. The \nCompany's policy is to fund the maximum allowable contribution calculated under federal income tax regulations. \nDuring 2003, the Company adopted an Executive Supplemental Retirement Plan for selected employees. This is an \nunfunded plan and is maintained primarily for the purpose of providing deferred compensation for a select group of \nmanagement or highly compensated employees. The Company also maintains a defined contribution plan under which \nsubstantially all employees may defer a portion of their earnings on a pre-tax basis, up to the allowable federal \nmaximum. The Company may make matching and discretionary contributions to this plan. Neither of the funded \nretirement plans holds Company stock in the respective portfolios. \n\n***Income taxes:***Income taxes are accounted for under the asset and liability method. Deferred tax assets and liabilities \nare recognized for the future tax consequences attributable to differences between financial statement carrying amounts \nof existing assets and liabilities and their respective tax bases. Deferred tax assets and liabilities are measured using \nenacted tax rates expected to apply to taxable income in the years in which those temporary differences are expected to be \nrecovered or settled. The effect on deferred tax assets and liabilities of a change in tax rates is recognized in income in \nthe period that includes the enactment date. The Company evaluates the recoverability of tax assets generated on a \nstate-by-state basis from net operating losses apportioned to that state. Management uses a more likely than not \nthreshold to make that determination and has established a valuation allowance against the deferred tax assets, in case \nthey may not be recoverable. ", + "page_start": 21, + "page_end": 21, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**SHENTEL SERVICE AREAS**\n\n", + "page_start": 1, + "page_end": 1, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
The cost of pensions is actuarially determined and takes into account
the following assumptions and methods for pension accounting related to our defined benefit plans :
• the expected rates of salary increases for calculating increases in future benefits
• mortality rates for calculating the life expectancy of plan members, and
• past service costs from plan amendments are immediately expensed in net income.
We recognize contributions to defined contribution plans as an employee benefit experse in operating costs in the consolidated statements of income in the periods the employees provide the related senices.
See note 22 for more information about our pension plans.
Termination Benefits
We recognize termination benefits as an expense when we are committed to a formal detailed plan to terminate employment before the normal retirement date and it is not realistic that we will withdraw it.
Property, Plant and Equipment
Recognition and Measurement
We recognize property, plant and equipment at cost, less accumulated depreciation and accumulated impairment losses.
Cost includes expenditures that are directly attributable to the acquisition of the asset. The cost of self - constructed assets also includes :
• the cost of materials and direct labour
· costs directly associated with bringing the assets to a working condition for their intended use
· costs of dismantling and removing the items and restoring the site where they are located ( see Provisions, above ), and • borrowing costs on qualifying assets.
We use estimates to determine certain costs that are directly attributable to self - constructed assets. These estimates primarily includecertain internal and external direct labour associated with the acquisition, construction, d
They also include interest costs, which we capitalize to certain property, plant and equipment during construction and development.
We use significant estimates to determine the estimated useful lives of property, plant and equipment, considering industry tends such as technological advancements, our past experience, our expected use and our review of asset lives
", + "page_start": 101, + "page_end": 101, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "The Company has established an investment policy and regularly monitors the performance of the assets of the trust maintained in \nconjunction with the Qualified Defined Benefit Retirement Plan. The strategy implemented by the trustee of the Qualified Defined \nBenefit Retirement Plan is to achieve long-term objectives and invest the pension assets in accordance with ERISA and fiduciary \nstandards. The long-term primary objectives are to provide for a reasonable amount of long-term capital, without undue exposure \nto risk; to protect the Qualified Defined Benefit Retirement Plan assets from erosion of purchasing power; and to provide investment \nresults that meet or exceed the actuarially assumed long-term rate of return. The expected long-term rate of return on assets \nassumption was developed by considering the historical returns and the future expectations for returns of each asset class as well as \nthe target asset allocation of the pension portfolio. \n\nCash Flows \n\nEmployer Contributions \n\nThe Company expects to contribute $6,000 to its pension benefit plans and $240 to its retiree health care benefit plans in \n2013. Contributions do not equal estimated future payments as certain payments are made from plan assets. \n\nEstimated Future Benefit Payments \n\nThe following benefit payments, which reflect expected future service, as applicable, are expected to be paid in each of the next ", + "page_start": 36, + "page_end": 36, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "The Company maintains a nonqualified deferred retirement plan for certain key \nemployees. The plan allows participants to defer, on a pre-tax basis, a portion of their \nsalary and bonus and accumulate tax deferred earnings, plus investment earnings on \nthe deferred balances, as a retirement fund. Participants receive a Company match of \nup to 4% of salary, net of any Company match received under the Company’s 401(k) \nplan. All employee deferrals vest immediately. The Company matching contributions \nvest ratably over a three-year period. The Company recorded charges for matching \ncontributions of $1 million in 2004, $2 million in 2003 and $1 million in 2002. ", + "page_start": 72, + "page_end": 72, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "The Company has established an investment policy and regularly monitors the performance of the assets of the trust maintained in \nconjunction with the Qualified Defined Benefit Retirement Plan. The strategy implemented by the trustee of the Qualified Defined \nBenefit Retirement Plan is to achieve long-term objectives and invest the pension assets in accordance with ERISA and fiduciary \nstandards. The long-term primary objectives are to provide for a reasonable amount of long-term capital, without undue exposure \nto risk; to protect the Qualified Defined Benefit Retirement Plan assets from erosion of purchasing power; and to provide investment \nresults that meet or exceed the actuarially assumed long-term rate of return. The expected long-term rate of return on assets \nassumption was developed by considering the historical returns and the future expectations for returns of each asset class as well as \nthe target asset allocation of the pension portfolio. \n\nCash Flows \n\nEmployer Contributions \n\nThe Company expects to contribute $6,000 to its pension benefit plans and $240 to its retiree health care benefit plans in \n2013. Contributions do not equal estimated future payments as certain payments are made from plan assets. \n\nEstimated Future Benefit Payments \n\nThe following benefit payments, which reflect expected future service, as applicable, are expected to be paid in each of the next \nfive years and in the aggregate for the subsequent five years: ", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Note20132012
Deferred pension liability22$189
$343Supplemental executive retirement plan22
4945Restricted share units
3128CRTC commitments
189Deferred compensation
1213Deferred inducements
9Stock appreciation rights
59Program rights liability
25Other
136$
", + "page_start": 120, + "page_end": 120, + "source_file": "NYSE_RCI_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_SHEN_2003.pdf", + "query": "At the end of 2003, how many available-for-sales investments did Shenandoah company count in its portfolio ?", + "target_page": 53, + "target_passage": "The Company’s available-for-sale portfolio at December 31, 2003 is made up of two investments", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "10 \n\n0 \n2000 1999 2001 2002 \n\n44 \n\n**Capital Expenditures**\n**($ millions)**\n\n80 \n29 \n\n23 \n60 \n\n16 \n40 \n12 \n\n20 \n\n0 \n0 \n2003 1999 2001 2002 2000 \n\nSHENANDOAH TELECOMMUNICATIONS COMPANY ■ 6 ", + "page_start": 7, + "page_end": 7, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**Significant Transactions**\n\nThe Company had several significant transactions during 2003. The largest was the sale of its 66% interest in the \nVirginia 10 RSA cellular operation, as described above. The Company originally entered into the agreement with \nVerizon Wireless in November 2002. The Company was the general partner of the limited partnership which operated \nan analog cellular network in the six-county area of Northwestern Virginia, including Clarke, Frederick, Page, \nRappahannock, Shenandoah, and Warren counties, and the city of Winchester. The sales price was $37.0 million plus \nthe Company’s 66% share of the partnership’s working capital, which was approximately $1.7 million. The Company \nwas required to do a working capital true up following the closing, from which the Company recorded a charge for $23 \nthousand after taxes. In the fourth quarter the Company recorded an additional charge for taxes of $0.2 million to \nreflect the consolidated effective tax rate based on the final operating results for the year. \n\nThe sale of this business is reflected in the discontinued operations section of the income statement along with the \nresults of operations for the two months of 2003 that the operation remained a part of the Company. ", + "page_start": 41, + "page_end": 41, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "The Company continued its efforts to successfully grow revenues and profits from other lines of business and by \nfurnishing more and newer services in our enlarged footprint extending beyond Shenandoah County. Revenues from our \ninformation access services, which includes contract work on the 511Virginia Travel Project and Internet access services, \nincreased $0.6 million, to $7.0 million during 2003. The Virginia Department of Transportation has requested proposals \nto continue the 511 project for future years, as well as to expand it to cover all the interstate highways throughout the \nCommonwealth. The success of the project to date has attracted many other bidders competing against our Company to \nwin the contracts. Our recently launched regional phone book, Shentel Pages, exceeded our initial revenue expectations. \nIt is hoped that a single source of phone listings and Yellow Page advertising, in both printed and online versions, will \nincreasingly be demanded by residents and businesses in the northern Shenandoah Valley region. \n\nWhile our 2003 results have been good, we recognize we still have many challenges to overcome in order to continue \n\nour history of profitable long-term growth. Foremost is sustaining profitability in our PCS business which is so heavily \ndependent on Sprint's decisions and overall success with PCS. Our recently announced amendment to our Sprint \nagreements will provide some cost savings and allow us greater certainty in fees paid to Sprint. The recently announced \nmerger between two of Sprint's competitors may provide some much needed consolidation in the U.S. wireless industry. ", + "page_start": 2, + "page_end": 2, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "In December 2003, Shentel mailed out 120,000 ShentelPages \ndirectories to every home and business in Shenandoah, \nRockingham, Frederick, Page, Clarke and Warren counties. \nShentelPages now has a potential audience that exceeds 300,000 \nreaders. The 2004 directory continues to be an important local \nresource. In addition to telephone listings, it contains both \ngeneral and county-specific information - from ZIP codes to area \ncodes, and from international dialing instructions to the listing of \nregional interstate exits. \n\nThrough ShentelPages, businesses have a new way of \nreaching thousands more potential customers within the six- \ncounty area to sell their products and services. ShentelPages is \nbundled with our electronic version, ShentelPages.com. This \nservice allows area residents to use their computer and the \nInternet to let their fingers do the walking. \n\nJust like our first book in 1906, the 2004 ShentelPages provides area residents with a quick and easy way \n\nto stay in touch. \n\nSHENANDOAH TELECOMMUNICATIONS COMPANY ■ 8 ", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "is the intent of the Company to evaluate whether to hold or sell parts or all of each investment on an individual basis. \nAt December 31, 2003, the Company had external investments totaling $7.5 million. \n\nIn 2004, the Company anticipates taking advantage of a conversion feature on its Rural Telephone Bank stock. The \nCompany will convert a portion of its holdings into a different class of stock that will pay cash dividends each year. \nThe bank declares a dividend rate that varies, each year. The range of the dividend has been between 4.2% and 5.65% \nover the last 5 years. The rate in the two most recent years was 4.2%. This transaction is estimated to provide the \nCompany with approximately $0.3 million in dividend income each year, based on the 2003 dividend rate of 4.2% and \nassuming we had converted the stock at the beginning of 2003. \n\n**Financial Condition, Liquidity and Capital Resources**\n\nThe Company has four principal sources of funds available to meet the financing needs of its operations, capital \nprojects, debt service, investments and potential dividends. These sources include cash flows from operations, cash \nand cash equivalents, the liquidation of investments and borrowings. Management routinely considers the alternatives \navailable to determine what mix of sources are best suited for the long-term benefit of the Company. ", + "page_start": 53, + "page_end": 53, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "In 2003, the Company received distributions from its equity investments totaling $0.5 million in cash and invested $0.7 \nmillion in two equity investments, Dolphin Communications Parallel Fund, LP and Dolphin Communications Fund II, \nLP. These two investments recorded losses of approximately $0.4 million for the 2003 year. The Company recorded a \nloss from the Virginia Independent Telephone Alliance investment of $19 thousand, for 2003. The Company recorded \na gain from the ValleyNet partnership of $84 thousand and received distributions of $84 thousand. Other equity \ninvestments lost an additional $0.4 million for 2003. \n\nThe Company was committed to invest an additional $1.8 million at December 31, 2003 in various equity method \ninvestees pursuant to capital calls from the fund managers. It is not practical to estimate the fair value of the other \ninvestments due to their limited market and restrictive nature of their transferability. \n\nThe Company’s ownership interests in Virginia Independent Telephone Alliance and ValleyNet are approximately \n22% and 20%, respectively. The Company purchases services from Virginia Independent Telephone Alliance and \nValleyNet at rates comparable with other customers. The Company’s ownership in NTC Communications is \napproximately 18%. Other equity method investees are investment limited partnerships which are approximately 2% \nowned each. \n\n25 ■ 2003 ANNUAL REPORT ", + "page_start": 26, + "page_end": 26, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "included in the Cash, Cash Equivalents, and Investments note included \n\nin the Notes to Consolidated Financial Statements. \n\n*(In thousands)*\n***C A P I T A L E X P E N D I T U R E I N V E S T M E N T S***\n\nLong-term debt \nCapital lease obligations \nOperating leases \nTransportation service \n\nCapital expenditures were $34.8 million in 2003, $25.9 million in \n\n2002, and $36.9 million in 2001. Expenditures during 2003, 2002, \ncontract 9,650 4,794 4,856 \nand 2001 have been consistently focused on machinery and equipment \n\nOther long-term \n obligations needed to support new products, process improvements, and cost 11,893 4,289 1,430 914 5,260 \n\nTotal $ 103,564 48,861 26,463 10,945 17,295 \nsavings initiatives. Expenditures in 2003 also included the purchase \n\nfrom a related party of a previously leased hearth products plant for \nOther long-term obligations includes $2,959,000 earn-out on convert- \n$3.6 million. \nible debentures included in current liabilities, $69,000 of financial \n\nguarantees with customers, and $8,865,000 of payments included in ***A C Q U I S I T I O N S***\n\nDuring 2001, the Company completed the acquisition of three small ", + "page_start": 36, + "page_end": 36, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "During 2003, the Company expended $4.9 million for the purchase of the Company’s common stock. Included in this amount was $4.1 million in April \n2003 for the completion of a tender offer in which a total of 173,614 shares of common stock were repurchased at a price of $23.00 per share. During \nthe fourth quarter of 2003, the Company repurchased the following shares of the Company’s common stock: ", + "page_start": 27, + "page_end": 27, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "The $5.0 million placed in escrow, as part of the sales agreement on the Virginia 10 RSA limited partnership, should be \nreleased after February 28, 2005. There are no known claims that have been filed against the amount in escrow. \n\nThe Company spent $12.5 million on capital projects in 2003, or about $7.0 million below what was budgeted for the \nyear. The variance was primarily due to postponing construction of an additional diverse fiber route and the delay of \nthe second phase of renovations on the Shentel Center in Edinburg, Virginia. \n\nThe Company has no other off-balance sheet arrangements and has not entered into any transactions involving \nunconsolidated, limited purpose entities or commodity contracts. \n\nCapital expenditures budgeted for 2004 total approximately $30 million, including approximately $20 million for \nadditional PCS base stations, additional towers, and switch upgrades to enhance the PCS network. Improvements and \nreplacements of approximately $5 million are planned for the telephone operation. The remaining $5 million covers \nbuilding renovations, vehicles, office equipment, and other miscellaneous capital needs. \n\nThe Company anticipates using funds from operations, to the extent they are available to fund the capital expenditures \nand the payment of debt and interest. Due to lower than expected tax expenses in 2003, the Company will apply the \ntax receivable to the 2004-year tax liability. It is anticipated by no later than second quarter of 2004, additional federal \ntax payments will be due based on anticipated profits expected to be generated in the operation. ", + "page_start": 54, + "page_end": 54, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**Note 1. Summary of Significant Accounting Policies (Continued)**\n\n***Reclassifications:***Certain amounts reported in the 2002 and 2001 financial statements have been reclassified to \nconform with the 2003 presentation, with no effect on net income or shareholders' equity. \n\n**Note 2. Discontinued Operations**\n\nIn November 2002, the Company entered into an agreement to sell its 66% General Partner interest in the Virginia 10 \nRSA Limited Partnership (cellular operation) to Verizon Wireless for $37.0 million. The closing of the sale took place \nat the close of business on February 28, 2003. The total proceeds received were $38.7 million, including $5.0 million \nheld in escrow, and a $1.7 million adjustment for estimated working capital at the time of closing. There was a post \nclosing adjustment based on the actual working capital balance as of the closing date, which resulted in a $39 thousand \ncharge for the Company. The $5.0 million escrow was established for any contingencies and indemnification issues \nthat may arise during the two-year post-closing period and is included in deferred charges and other assets in the 2003 \nconsolidated balance sheet. The Company’s gain on the transaction was approximately $35 million. Post closing, the \nCompany provided transition services to Verizon for a period of approximately three months, with compensation for \nthose services being approximately $40 thousand per month during the transition period. ", + "page_start": 24, + "page_end": 24, + "source_file": "NASDAQ_SHEN_2003.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_SHEN_2003.pdf", + "query": "What was the main reason of the decrease of customer base of the Shenandoah and Virginia 10 RSA partnership ?", + "target_page": 51, + "target_passage": "he decline was the result of competition with digital technologies and increased competition from national carriers in the area", + "chunk_present": { + "presence": true, + "index": 6 + } + }, + "top_chunk": [ + { + "text": "The $5.0 million placed in escrow, as part of the sales agreement on the Virginia 10 RSA limited partnership, should be \nreleased after February 28, 2005. There are no known claims that have been filed against the amount in escrow. \n\nThe Company spent $12.5 million on capital projects in 2003, or about $7.0 million below what was budgeted for the \nyear. The variance was primarily due to postponing construction of an additional diverse fiber route and the delay of \nthe second phase of renovations on the Shentel Center in Edinburg, Virginia. \n\nThe Company has no other off-balance sheet arrangements and has not entered into any transactions involving \nunconsolidated, limited purpose entities or commodity contracts. \n\nCapital expenditures budgeted for 2004 total approximately $30 million, including approximately $20 million for \nadditional PCS base stations, additional towers, and switch upgrades to enhance the PCS network. Improvements and \nreplacements of approximately $5 million are planned for the telephone operation. The remaining $5 million covers \nbuilding renovations, vehicles, office equipment, and other miscellaneous capital needs. \n\nThe Company anticipates using funds from operations, to the extent they are available to fund the capital expenditures \nand the payment of debt and interest. Due to lower than expected tax expenses in 2003, the Company will apply the \ntax receivable to the 2004-year tax liability. It is anticipated by no later than second quarter of 2004, additional federal \ntax payments will be due based on anticipated profits expected to be generated in the operation. ", + "page_start": 54, + "page_end": 54, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**Significant Transactions**\n\nThe Company had several significant transactions during 2003. The largest was the sale of its 66% interest in the \nVirginia 10 RSA cellular operation, as described above. The Company originally entered into the agreement with \nVerizon Wireless in November 2002. The Company was the general partner of the limited partnership which operated \nan analog cellular network in the six-county area of Northwestern Virginia, including Clarke, Frederick, Page, \nRappahannock, Shenandoah, and Warren counties, and the city of Winchester. The sales price was $37.0 million plus \nthe Company’s 66% share of the partnership’s working capital, which was approximately $1.7 million. The Company \nwas required to do a working capital true up following the closing, from which the Company recorded a charge for $23 \nthousand after taxes. In the fourth quarter the Company recorded an additional charge for taxes of $0.2 million to \nreflect the consolidated effective tax rate based on the final operating results for the year. \n\nThe sale of this business is reflected in the discontinued operations section of the income statement along with the \nresults of operations for the two months of 2003 that the operation remained a part of the Company. ", + "page_start": 41, + "page_end": 41, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**Note 1. Summary of Significant Accounting Policies (Continued)**\n\n***Reclassifications:***Certain amounts reported in the 2002 and 2001 financial statements have been reclassified to \nconform with the 2003 presentation, with no effect on net income or shareholders' equity. \n\n**Note 2. Discontinued Operations**\n\nIn November 2002, the Company entered into an agreement to sell its 66% General Partner interest in the Virginia 10 \nRSA Limited Partnership (cellular operation) to Verizon Wireless for $37.0 million. The closing of the sale took place \nat the close of business on February 28, 2003. The total proceeds received were $38.7 million, including $5.0 million \nheld in escrow, and a $1.7 million adjustment for estimated working capital at the time of closing. There was a post \nclosing adjustment based on the actual working capital balance as of the closing date, which resulted in a $39 thousand \ncharge for the Company. The $5.0 million escrow was established for any contingencies and indemnification issues \nthat may arise during the two-year post-closing period and is included in deferred charges and other assets in the 2003 \nconsolidated balance sheet. The Company’s gain on the transaction was approximately $35 million. Post closing, the \nCompany provided transition services to Verizon for a period of approximately three months, with compensation for \nthose services being approximately $40 thousand per month during the transition period. ", + "page_start": 24, + "page_end": 24, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "During the 1990’s significant investments were made in the cellular and PCS (wireless) businesses. The VA 10 RSA \ncellular operation, in which the Company held a 66% interest and was the general partner, experienced rapid revenue \ngrowth and excellent margins in the late 1990’s. The cellular operation covered only six counties, and became \nincreasingly dependent on roaming revenues. Management believed the roaming revenues and associated margins \nwould be unsustainable as other wireless providers increasingly offered nationally-branded services with significantly \nreduced usage charges. To position it to participate in the newer, more advanced, digital wireless services, in 1995 the \nCompany entered the PCS business through an affiliation with American Personal Communications (APC), initiating \nservice along the Interstate 81 corridor from Harrisonburg, Virginia to Chambersburg, Pennsylvania. This territory was \na very close match to the Company’s fiber network, thereby providing economic integration that might not be available \nto other wireless carriers. In 1999, the Company entered a new affiliation arrangement with Sprint, the successor to \nAPC (which introduced the Company to a nationally-branded wireless service) and expanded the PCS footprint further \ninto Central Pennsylvania. The Company’s combined capital investment in 2000 and 2001 in the PCS operation was \n$45.1 million. ", + "page_start": 40, + "page_end": 40, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "In 2003, we focused on improving our distribution channels. We \n\nexpanded and relocated our stores in Harrisonburg and Winchester, \nVirginia to handle our growing customer base. At our Edinburg, \nVirginia store, we expanded both our hours and office space. We \ncontinue to increase our direct sales force to expand our base of \nbusiness customers. To make it convenient for our potential \ncustomers, we also grew the number of local third-party sales \npartners. \n\nA much publicized development in our industry was the introduction of Wireless Local Number Portability \n(WLNP) on November 24th, 2003. Starting on that day, customers in the 100 largest population centers in the \nUnited States were able to change wireless carriers while keeping their existing phone number. WLNP will be \navailable in the entire country on May 24, 2004. To date, this change has had only a minor impact on Shentel’s \ncustomer base. \n\nWe continue to work to make PCS a growth vehicle of revenue and net income for Shenandoah \n\nTelecommunications Company. ", + "page_start": 10, + "page_end": 10, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "The goal has always been to provide a useful tool for our customers. \nThe pace of change has quickened in the last few years. In 2000, for the \nfirst time, Shenandoah Telephone’s directory expanded from telephone \nlistings for only Shenandoah County and Bergton, to include business and \nresidential listings for Rockingham, Frederick, Clarke, and Warren \ncounties. In 2001, Page County listings were added. The name of our \ndirectory was changed to ShentelPages in 2002 to reflect the expanded \nlisting area. Although we included additional information in our \ndirectory, we continued to only furnish it to our local telephone \ncustomers. \n\nEarly in 2003, we conducted a customer survey to measure potential \npublic acceptance of a regional phone directory for the six-county area. The \nfindings of the survey indicated almost 60% would likely use an expanded six-county directory, with a \nfourth of all respondents saying they would use a regional directory more often than the directory they \ncurrently had in their home or business. Based on these positive results, Shentel launched an expanded \ndirectory to meet the demand. \n\nAn extensive public-awareness campaign was launched on television and radio, in a variety of daily and \n\nweekly newspapers and at regional county fairs. The campaign helped build anticipation for the directory \nand increase awareness of yellow page advertising opportunities. As a result of the added value of the \nexpanded distribution area, ShentelPages’ yellow page advertising revenues increased 21%, to $1.8 million \nfor the 2004 book. ", + "page_start": 9, + "page_end": 9, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "Income from discontinued operations was $22.4 million after taxes, an increase of $15.0 million or 202%. The income \nfrom discontinued operations in 2003 includes the sale of the partnership interest in February 2003 and results from the \ntwo months of its operations in 2003. \n\nThe Company adopted FAS 143 “Accounting for Asset Retirement Obligations.” effective January 1, 2003, and as a \nresult recorded a charge to earnings for the cumulative effect of this change in accounting of $76 thousand after taxes. \n\nNet income was $32.1 million, an increase of $27.6 million or 610%. The increase is a result of improved operating \nresults in the PCS operations, the 2002 VeriSign stock loss and the sale of the cellular operations. \n\n**DISCONTINUED OPERATIONS**\nThe Company invested $2.0 million in the Virginia 10 RSA limited partnership in the early 1990’s. The partnership’s \nlocal customer base peaked in early 2000 with nearly 12,000 subscribers, then steadily declined to 6,700 by December \n31, 2002. The decline was the result of competition with digital technologies and increased competition from national \ncarriers in the area. As a result of the decline in the subscriber base, and the need for extensive capital expenditures to \ntransform the analog network into a digital cellular network, the Company elected to sell its 66% interest in the \npartnership to one of the minority partners. The agreement was signed in November 2002, and closing was February \n28, 2003. The Company’s portion of the net income from its operations for 2003, 2002 and 2001 was $1.2 million, \n$7.4 million and $6.7 million, respectively. ", + "page_start": 50, + "page_end": 50, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**OUR BUSINESS**\n\nShenandoah Telecommunications Company is a diversified telecommunications holding company which provides \nvarious telecommunications services through its operating subsidiaries. These services include: wireline telephone \nservice, primarily in Shenandoah County and small service areas in Rockingham, Frederick, and Warren counties, all in \nVirginia; cable television service in Shenandoah County; unregulated telecommunications equipment sales and services; \nonline information and Internet access provided to the multi-state region surrounding the Northern Shenandoah Valley of \nVirginia; financing of purchases of telecommunications facilities and equipment; paging services in the Northern \nShenandoah Valley; resale of long distance services; operation and maintenance of an interstate fiber optic network; \nwireless personal communications services (PCS) and a tower network in the four-state region from Harrisonburg, \nVirginia to the Harrisburg, York and Altoona, Pennsylvania markets. \n\n**ANNUAL MEETING**\n\nThe Board of Directors extends an invitation to all shareholders to attend the Annual Meeting of Shareholders. The \nmeeting will be held at 11:00 AM (EST) on April 20, 2004 in the Auditorium of the Company’s offices at the Shentel \nCenter, 500 Mill Road, Edinburg, Virginia. ", + "page_start": 58, + "page_end": 58, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "The Company continued its efforts to successfully grow revenues and profits from other lines of business and by \nfurnishing more and newer services in our enlarged footprint extending beyond Shenandoah County. Revenues from our \ninformation access services, which includes contract work on the 511Virginia Travel Project and Internet access services, \nincreased $0.6 million, to $7.0 million during 2003. The Virginia Department of Transportation has requested proposals \nto continue the 511 project for future years, as well as to expand it to cover all the interstate highways throughout the \nCommonwealth. The success of the project to date has attracted many other bidders competing against our Company to \nwin the contracts. Our recently launched regional phone book, Shentel Pages, exceeded our initial revenue expectations. \nIt is hoped that a single source of phone listings and Yellow Page advertising, in both printed and online versions, will \nincreasingly be demanded by residents and businesses in the northern Shenandoah Valley region. \n\nWhile our 2003 results have been good, we recognize we still have many challenges to overcome in order to continue \n\nour history of profitable long-term growth. Foremost is sustaining profitability in our PCS business which is so heavily \ndependent on Sprint's decisions and overall success with PCS. Our recently announced amendment to our Sprint \nagreements will provide some cost savings and allow us greater certainty in fees paid to Sprint. The recently announced \nmerger between two of Sprint's competitors may provide some much needed consolidation in the U.S. wireless industry. ", + "page_start": 2, + "page_end": 2, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "The Company is required to participate in national and regional third party distribution programs formulated and \nnegotiated by Sprint. Sprint has entered into reseller agreements which may impact the Company. These distribution \nand reseller programs may have an adverse effect on the results of the Company. \n\nSHENANDOAH TELECOMMUNICATIONS COMPANY ■ 54 ", + "page_start": 55, + "page_end": 55, + "source_file": "NASDAQ_SHEN_2003.pdf" + } + ] + }, + { + "references": { + "source_file": "maiis-user-manual.pdf", + "query": "As a product manager, how can I reject an inventory in NAIIS ?", + "target_page": 38, + "target_passage": "Log in as PM. Click on “View Inventories Progress” under sub menu “Submission Management”. The “View Inventories Progress” screen appears. Select the appropriate inventory by clicking the Inventory name under column “Name” Press the “Reject” button ", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "**10.5.2 Rejection of an inventory**\n\n1. Log in as NFP. \n2. Click on “View Inventories Progress” under sub menu “Submission Management”. \n3. The “View Inventories Progress” screen appears. \n4. Select the appropriate inventory by clicking the Inventory name under column “Name” (figure 66). \n5. Press the “Send for Rejection” button (figure 66, b). \n\nOnce the “Send for Rejection” button was pressed, the status of the selected inventory changes to \n“awaiting_rejection” (figure 67, a). \n\n***Note: A notification email will be sent to the PM that the inventory has been rejected. Therefore, the PM \nwill be able to reject the submission. Proceed to section 10.4.2. ", + "page_start": 40, + "page_end": 40, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "**10.4.2 Rejection of an Inventory**\n\n1. Log in as PM. \n2. Click on “View Inventories Progress” under sub menu “Submission Management”. \n3. The “View Inventories Progress” screen appears. \n4. Select the appropriate inventory by clicking the Inventory name under column “Name” (figure 62, a). \n5. Press the “Reject” button (figure 62, b). \n\n***Note: A notification email will be sent to the PM, once the “Reject” button has been pressed. And the \nstatus changed to “Awaiting_rejection_check” (figure 63). ", + "page_start": 37, + "page_end": 37, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "***Figure 67. Work on Inventories screen – Rejection of an inventory - Status = rejected_approval***\n\n", + "page_start": 40, + "page_end": 40, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "***Figure 66. Work on Inventories screen – Rejection of an inventory - Status = awaiting_approval***\n\n", + "page_start": 40, + "page_end": 40, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "**10.5 Approval or Rejection of an inventory (NFP)**\n\nThis section describes how the NFP approves or rejects an inventory after being sent for approval by the PM \n(See section 10.4). \n\n**10.5.1 Approval of an inventory**\n\n1. Log in as NFP. \n2. Click on “View Inventories Progress” under sub menu “Submission Management”. \n3. The “View Inventories Progress” screen appears. \n4. Select the appropriate inventory by clicking the Inventory name under column “Name” (figure 64). \n5. Press the “Approve” button (figure 64, b). \n\nOnce the “Approve” button was pressed, the status of the selected inventory changes to “approved” (figure \n65, b). \n\n***Note: A notification email will be sent to the PM that the inventory has been approved. Therefore, the PM \nmay proceed to selecting the tables for preparing the official submission (See section 10.6). ", + "page_start": 39, + "page_end": 39, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "***Figure 62. Work on Inventories screen –Reject - Status = check***\n\n", + "page_start": 38, + "page_end": 38, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "5. Click the appropriate Inventory year on “Work on Inventories” under “Submission” (figure 56, a). \n6. Press the “Start Inventory” button to start the inventory (figure 56, b). Once pressed, the status changes to \n“started” (figure 57). \n\n***Once the “Start Inventory” button has been pressed by the NFP or PM, a notification email will be sent to all \nSE’s with the information that a new inventory was created. SE’s and PM’s can start entering their data into the \nNAIIS software. More details on how to do the data entry please see section 4.1 above. ", + "page_start": 35, + "page_end": 35, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "***Figure 63. Work on Inventories screen – Propose Rejection - Status = awaiting_rejection_check***\n\n", + "page_start": 38, + "page_end": 38, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "10.1 Workflow .......................................................................................................................... 35 \n\n10.2 Start of inventory/submission (NFP or PM) ..................................................................... 35 \n\n10.3 Send for checking (PM) .................................................................................................... 37 \n\n10.4 Send for approval/rejection of an Inventory (PM) ............................................................ 38 \n\n10.4.1 Send for approval of an Inventory .............................................................................. 38 \n\n10.4.2 Rejection of an Inventory ........................................................................................... 38 \n\n10.5 Approval or Rejection of an inventory (NFP) ................................................................... 40 \n\n10.5.1 Approval of an inventory ........................................................................................... 40 \n\n10.5.2 Rejection of an inventory ........................................................................................... 41 \n\n10.6 Submit inventory (PM) ...................................................................................................... 42 \n\n10.6.1 Submit select tables for preparing the general submission ........................................ 42 \n\nGlossary of terms and abbreviations ............................................................................................. 44 \n\nAnnex 1: Non-Annex I (NAI) Parties .......................................................................................... 45 \n\nAnnex 2: Fuel categories .............................................................................................................. 47 \n\nAnnex 3: Global Warming Potentials (GWPs) ............................................................................ 48 \n\nAnnex 4: Default values ............................................................................................................... 49 ", + "page_start": 2, + "page_end": 2, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "**10.6 Submit inventory (PM)**\n\nThis section describes on how the PM submits the inventory by selecting tables for the general submission after \nbeing approved by the NFP (See section 10.5). \n\n**10.6.1 Submit select tables for preparing the general submission**\n\n1. Log in as PM. \n2. Click on “View Inventories Progress” under sub menu “Submission Management”. \n3. The “View Inventories Progress” screen appears. \n4. Select the appropriate inventory by clicking the box under column “Working inventory” (figure 68, a). \n***Note: The selected inventory year to be submitted should be in status “approved” (figure 68, b). \n5. Click on “Work on Inventories” under Submission Management (figure 68, c). \nThis opens the Submit Inventory initial screen (figure 69). \n\n6. Click the inventory year to be submitted (figure 69, a). \n7. Press the “Generate Official Submission” button (figure 69, c). \n\n***Figure 68. View Inventories Progress screen – select inventory for the preparation for the general submission***", + "page_start": 41, + "page_end": 41, + "source_file": "maiis-user-manual.pdf" + } + ] + }, + { + "references": { + "source_file": "maiis-user-manual.pdf", + "query": "What is the global warming potential of Perfluorohexane ?", + "target_page": 48, + "target_passage": "7,400", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**The impact of 1.5 °C and 2.0 °C**\n**global warming on global maize**\n**production and trade**\n\n**OPEN**\n\n**Kuo Li1** ***, Jie Pan1, Wei Xiong2, Wei Xie3 & Tariq Ali3**", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed9.pdf" + }, + { + "text": "land surface sees an increase in annual daily maximum temperature which is similar to the global \nannual mean temperature increase. In the IPSL-driven simulations, increases in TXx substantially \nlarger than the GWL are confined to the eastern USA, Europe and part of northeast Asia. By \ncontrast, the GFDL-driven simulation shows much of the global land surface seeing increases \nin annual daily maximum temperature larger than the global mean warming. Much of the mid- \nlatitudes experience an increase in TXx of over 4°C. The very largest increases of 5°C or more \nare seen in central North America, Europe and northwestern Asia. Similar results are seen in the \nMIROC and ACCESS models. \n\nThe percentage of days exceeding the 90th percentile of daily maximum temperature increase \nmore in tropical areas (figure 3). Some areas show over 60% of days above this level at 2°C global \nwarming compared with present day, whereas in the mid-latitudes between 20% and 30% of days \nexceed this level. The global mean is between 20% and 30% in all ensemble members (table 3). ", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed11.pdf" + }, + { + "text": "**1. Introduction**\n\nThe public’s distinct understanding of the cause and effect of the global climate issue is an obstacle \nto joint mitigation actions. In addition to a diversity of views co-existing in the public discourse [1,2], \nprevious studies noticed that the public had even failed to reach an agreement on whether “climate \nchange” or “global warming” is the most appropriate definition of the global climate concern [3–5]. \nAccording to the definition provided by [6], global warming describes global climate issues as \na continuous increase in the average temperature of Earth’s surface due to anthropogenic emissions \nof greenhouse gases, whereas climate change includes not only temperature rise but also a range of \n\nInt. J. Environ. Res. Public Health**2020**, 17, 1062; doi:10.3390/ijerph17031062 www.mdpi.com/journal/ijerph ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed10.pdf" + }, + { + "text": "all members (figure 12). This is not the case for the precipitation and run-off results; for those \nquantities, there is substantial overlap in the ranges of changes at 2°C and 1.5°C, so there is not a \nconsistent picture of how much wetter or drier the world is projected to be in this ensemble, even \nthough it involves a single atmosphere model. \n\nFor TXx, the difference between 2°C and 1.5°C global warming is larger than the 0.5°C \ndifference in global mean temperature across most of the land surface in all ensemble members \n(figure 14). Although some ensemble members simulate local temperatures to be higher at 1.5°C \nglobal warming than 2°C in some small regions, these are relatively localized and most regions \nare cooler at 1.5°C global warming than 2°C. In many regions, the difference is between 0.5°C and \n1.0°C, but many other regions see larger differences. In several ensemble members, the difference \nis 1.5°C, 2°C or larger in large parts of North America, South America, Europe and China. \nFor example, over parts of Europe, where annual maximum daily temperature was projected \nto increase by over 5°C for a 2°C global warming, the local increase is limited to 3–4°C for \n1.5°C global warming. Limiting global warming by half a degree Celsius would, therefore, limit \nmaximum temperatures by three or four times as much in those areas (figure 14). ", + "page_start": 15, + "page_end": 15, + "source_file": "pubmed11.pdf" + }, + { + "text": "Changes in climate extremes, \nfresh water availability and \nvulnerability to food insecurity \nprojected at 1.5°C and 2°C \nglobal warming with a \nhigher-resolution global \nclimate model \nRichard A. Betts1,2, Lorenzo Alfieri3, Catherine \nBradshaw2, John Caesar2, Luc Feyen3, Pierre \nFriedlingstein4, Laila Gohar2, Aristeidis Koutroulis5, \nKirsty Lewis2, Catherine Morfopoulos1, Lamprini \nPapadimitriou5,6, Katy J. Richardson2, Ioannis Tsanis5 \nand Klaus Wyser7 \n\n1College of Life and Environmental Sciences, University of Exeter, \nExeter EX4 4PS, UK \n2Met Office Hadley Centre, FitzRoy Road, Exeter EX1 3PB, UK \n3European Commission – Joint Research Centre, 21027 Ispra, Italy \n4College of Engineering, Mathematics and Physical Sciences, \nUniversity of Exeter, Exeter EX4 4QE, UK \n5School of Environmental Engineering, Technical University of \nCrete—TUC, Chania 73100, Greece \n6Cranfield Water Science Institute, Cranfield University, Cranfield \nMK43 0AL, UK \n7Rossby Centre, SMHI, 601 76 Norrköping, Sweden \n\nRAB, 0000-0002-4929-0307 ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed11.pdf" + }, + { + "text": "**Simulation of climate scenarios with global warming by 1.5 °C and 2.0 °C.**\nIn this study, climate \ndata of global warming by 1.5 °C and 2.0 °C are determined according to the results of global climate models \ndriven by typical concentration paths (RCPs) of greenhouse gas emissions. Eligible data are selected from a \ntotal of 20 sets of data under four RCP scenarios of five ESMs (including GFDL-ESM2M, HadGEM2-ES, IPSL- \nCM5A-LR, MIROC-ESM-CHEM and NorESM1-M), which estimate the temperature, precipitation and sun- \nshine hours (Fig. 1). ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed9.pdf" + }, + { + "text": "Research \n\n**Cite this article:**Betts RA et al. 2018 Changes \nin climate extremes, fresh water availability \nand vulnerability to food insecurity projected \nat 1.5°C and 2°C global warming with a \nhigher-resolution global climate model. Phil. \nTrans. R. Soc. A**376**: 20160452. \nhttp://dx.doi.org/10.1098/rsta.2016.0452 \n\nAccepted: 13 February 2018 \n\nOne contribution of 20 to a theme issue ‘The \nParis Agreement: understanding the physical \nand social challenges for a warming world of \n1.5°C above pre-industrial levels’. \n\n**Subject Areas:**\nclimatology, hydrology \n\n**Keywords:**\n1.5°C, Paris Agreement, 2°C, global climate \nimpacts, water resources, terrestrial \necosystems \n\n**Author for correspondence:**\nRichard A. Betts \ne-mail: richard.betts@metoffice.gov.uk ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed11.pdf" + }, + { + "text": "meantime, the huge differences in yield changes in different regions provide a small chance for the world, espe- \ncially under global warming by 1.5 °C. In the near future, if the global temperature can be effectively controlled \nunder 1.5 °C warming scenario, there would be an increase in the potential for maize yield in the worldwide. \nAll regions and countries should take actions to reduce the yield loss risk. For the yield-increasing regions, the \npotentials of climate resources should be fully utilized to guarantee maize yield under future scenarios; for the \nyield-reducing regions, the targeted adaptation actions should be taken in advance under global warming by \n1.5 °C and 2.0 °C. \n\nMeanwhile, the risk of price fluctuations caused by global corn trade due to future climate change should be \npaid more attention to, especially for developing and undeveloped countries. In the view of supply and demand, \nthe population would go up quickly in the next 30 years; the demand for maize would increase hugely; however, \nthe supply of maize would go down in the future, especially under global warming by 2.0 °C; it would intensify \nthe contradiction between supply and demand, which would threaten the food security and sustainable develop- \nment in the whole world. ", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed9.pdf" + }, + { + "text": "this comparison of the number of ‘unprecedented’ HCVI values at 1.5°C and 2°C should be \ntreated with caution. Nevertheless, the finding that some countries see HCVI values higher at \neither or both 1.5°C and 2°C compared to the baseline may indicate that climate change has the \npotential to lead to unprecedented levels of vulnerability to food insecurity in some countries. \nMore robustly, it can be concluded that by this metric, overall worldwide vulnerability to food \ninsecurity generally increases with global warming, and for approximately three-quarters of \ncountries assessed, this increase is larger at 2°C than 1.5°C. \n\nIn the ensemble mean, changes in mean, low and high flows are generally larger at 2°C global \nwarming compared to 1.5°C (figure 20). This is often the case for both increases and decreases \nin flows—increasing the level of global warming magnifies the pattern of river flow changes, \nalthough not in all cases. \n\nThe range of projected mean run-off changes is larger for 2°C than 1.5°C in many basins, \nbut this was not always the case, with many basins showing similar or smaller ranges at \n2°C compared with 1.5°. Moreover, the ranges overlap substantially, so in terms of the set of ", + "page_start": 18, + "page_end": 18, + "source_file": "pubmed11.pdf" + }, + { + "text": "There are apparent trends of humidification in most regions under global warming by 1.5 °C and 2.0 °C; but \nthe drought risk also should be taken seriously in the other regions. Under global warming by 1.5 °C the area is \n73.6% of the whole world in which the precipitation would increase, most located in the Northern Hemisphere; \nthe area is 53.7% of the whole world in which the precipitation would increase by less than 50 mm; however, the \narea is 26.4% of whole world in which the rainfall would decrease, mainly located in the Southern Hemisphere \nand the middle regions of Northern Hemisphere. The distribution of precipitation under global warming by \n2.0 °C is similar with the situation under global warming by 1.5 °C. The drought-threatened area would increase \nby 28.5% under global warming by 2.0 °C, especially in the middle and low latitude of the Northern Hemisphere; \nthe area would expand to 26%, in which the precipitation increases more than 50 mm. In other words, the \nextreme rainfall events (such as drought, rainstorm) under global warming by 2.0 °C would be more serious than \nthose under global warming by 1.5 °C, which is what we should be pay more attention to. ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed9.pdf" + } + ] + }, + { + "references": { + "source_file": "maiis-user-manual.pdf", + "query": "How can I request access to NAIIS ?", + "target_page": 5, + "target_passage": "Requests for access to, inquiries on the use of the software, and comments on the design and functionalities of the application should be sent to the dedicated e-mail address naiisapp@unfccc.int.", + "chunk_present": { + "presence": true, + "index": 8 + } + }, + "top_chunk": [ + { + "text": "**3.2 How to access/ log out / create a GHG inventory**\n\n**3.2.1 How to access the NAIIS application**\n\nOpen any internet browser (i.e. Internet Explorer, Firefox, etc.) and type in the following URL http://unfccc.int/7627 on \nthe browser’s address bar. (figure 1 and figure 2) ", + "page_start": 5, + "page_end": 5, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "Press the ‘Enter key’ and the non-Annex I Greenhouse Gas Inventories web page appears. \n\nTo access the NAIIS application, click on the image NAIIS Web Application, the right hand side of the screen. (figure \n3, number 1) and the log-in page will be displayed. (figure 4) ", + "page_start": 6, + "page_end": 6, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "***Figure 4. Log-in page of the NAIIS Web Application***\n\n", + "page_start": 6, + "page_end": 6, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": " Click the “+” sign (figure 19a) creates a new user (figure 20 new User). \n Double click on the cell of the newly created user name and enter a new user name (must be unique and contain at \n\nleast 3 characters). \nOnce done, press the enter key and the new user name will be saved in the respective table of the NAIIS database. \n\nNote: New user name(s) will be generated by the system as default [Non-Annex I Party name] + “newUser” \n(e.g. UgandanewUser, PhilippinesnewUser, ArgentinanewUser) ", + "page_start": 13, + "page_end": 13, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "\n\nNAVWEPS 00-8OT-80 \nINDEX \n\nPsge \n305 \n192 \n196 \n300 \n294 ", + "page_start": 432, + "page_end": 432, + "source_file": "00-80T-80.pdf" + }, + { + "text": "**3 Getting started**\n\n**3.1 User Access, Roles and Privileges**\n\nThe users of the application are the members of the national team(s) of non-Annex I Parties involved in the \npreparation of their national GHG inventories, and each user is assigned a role. \n\nThe table below explains the different levels of the access rights and corresponding explanation for each role. It is \nimportant to note that the roles are not necessarily identical to a person’s title (e.g. National Focal Point) and that a \nperson can take on several roles (which may be necessary for some countries). \n\nThere are three types of access rights (roles) to the NAIIS application: ", + "page_start": 5, + "page_end": 5, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "**2 General information**\n\nThe NAIIS is a web-based application designed to enable non-Annex I Parties estimate their national GHG \ninventories according to the UNFCCC guidelines and using the IPCC methodologies, and to report the results in their \nnational communications and biennial update reports. \n\n**2.1** **System overview**\n\nThe NAIIS web application has the following functionalities: \n\n1. User management (only for the user roles NFP and PM) \n2. Submission management \n3. Data entry \n4. Key category analysis \n5. Reporting tables \n6. Data Export/Import \n7. Completeness \n8. Consistency \n\nThe NAIIS web application allows input of data through three different channels: \n\n1. Manual input into the entry grids \n2. Partial or full import of data from Excel \n3. Bulk import of data from XML \n\nThe GHG emissions totals, by gas and by sector, are automatically calculated and saved based on the values \nentered for activity data (AD), emission factors and other relevant parameters. In addition, the software facilitates the \nreporting of other category specific information, for example, the choice of the method for activity data and emission \nfactors. ", + "page_start": 3, + "page_end": 3, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "Since its release in 2005, most non-Annex I Parties have been using that software for the development of their \nnational GHG inventories. In December 2011, Parties requested the secretariat to upgrade the software and make it \navailable to non-Annex I Parties by June 2013. Pursuant to that request, the secretariat converted the current Excel- \nbased version of the software (v.1.3.2)2 into a web-based application (NAIIS) which provides greater flexibility and \nsecurity for maintaining data. ", + "page_start": 3, + "page_end": 3, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "**2.3 Contact**\n\nRequests for access to, inquiries on the use of the software, and comments on the design and functionalities of the \napplication should be sent to the dedicated e-mail address**naiisapp@unfccc.int**. ", + "page_start": 4, + "page_end": 4, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "5. Click the appropriate Inventory year on “Work on Inventories” under “Submission” (figure 56, a). \n6. Press the “Start Inventory” button to start the inventory (figure 56, b). Once pressed, the status changes to \n“started” (figure 57). \n\n***Once the “Start Inventory” button has been pressed by the NFP or PM, a notification email will be sent to all \nSE’s with the information that a new inventory was created. SE’s and PM’s can start entering their data into the \nNAIIS software. More details on how to do the data entry please see section 4.1 above. ", + "page_start": 35, + "page_end": 35, + "source_file": "maiis-user-manual.pdf" + } + ] + }, + { + "references": { + "source_file": "creative_common_ai.pdf", + "query": "What is the problem regarding the use of the Book3 dataset ?", + "target_page": 2, + "target_passage": "The Books3 dataset contains text from over 170,000 books,2 which are a mix of in-copyright and out-of-copyright works. It is believed to have been originally sourced from a website that was not authorized to distribute all of the works", + "chunk_present": { + "presence": true, + "index": 6 + } + }, + "top_chunk": [ + { + "text": "The Books3 controversy highlights a critical question at the heart of generative AI: what role \ndo books play in training AI models, and how might digitized books be made widely \naccessible for the purposes of training AI? What dataset of books could be constructed and \nunder what circumstances? \n\nIn February 2024, Creative Commons, Open Future and Proteus Strategies convened a series \nof workshops to investigate the concept of a responsibly designed, broadly accessible \ndataset of digitized books to be used in training AI models. Conducted under the Chatham \nHouse Rule, we set out to ask if there is a possible future in which a “books data commons \nfor AI training” might exist, and what such a commons might look like. The workshops \nbrought together practitioners on the front lines of building next-generation AI models, as \nwell as legal and policy scholars with expertise in the copyright and licensing challenges \nsurrounding digitized books. Our goal was also to bridge the perspective of stewards of ", + "page_start": 1, + "page_end": 1, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "***5. Examining approaches to building a books data***\n***commons***\n\nThere are many possible permutations for building a books data commons. To structure our \nexploration, we focused on two particular tracks, discussed below. We chose these tracks \nmindful of the above legal issues, and because there are already existence proofs that help \nto illuminate tradeoffs, challenges and potential paths forward for each. \n\n*5a. Public domain and permissively licensed books*\n\n**Existing Project Example : The Pile v2**\n27 \n\nIn 2020, the nonprofit research group EleutherAI constructed and released The Pile — a large, \ndiverse, open dataset for AI training. EleutherAI developed it not only to support their own \ntraining of LLMs, but also to lower the barriers for others. 28 \n\nAlong with data drawn from the web at large, The Pile included books from three datasets. \nThe first dataset was the Books3 corpus referenced at the outset of this paper. The second \nand third books datasets were smaller: BookCorpus2, which is a collection of 17,868 books \nby otherwise unpublished authors; and a 28,752 books in the public domain and published \nprior to 1919, drawn from a volunteer effort to digitize public domain works called Project \nGutenberg. ", + "page_start": 12, + "page_end": 12, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "Today, the Center’s tools are not suitable for AI training, in that they don’t allow the specific \ntypes of technical manipulation of underlying text necessary to train an AI. Nevertheless, the \nCenter demonstrates that building a books data commons for computational analysis is \npossible, and in turn points to the possibility of creating such a resource for AI training. 36 \n\n**Implications of Overall Approach**\n\nBy relying on existing limitations and exceptions in copyright law, the number of books one \ncould include in the corpus of a books data commons is far greater and more diverse. Of \ncourse, a bigger dataset doesn’t necessarily mean a higher quality dataset for all uses of AI \nmodels; as HathiTrust shows, even a multimillion book corpus can skew in various \ndirections. Still, dataset size generally remains significant to an LLM’s performance – the \nmore text one can train on, or rather the more tokens for training the model, the better, at \n 37 \nleast along a number of performance metrics. \n\nWhile holding the potential for a broader and more diverse dataset, a key limitation in \npursuing this approach is that it is only feasible where relevant copyright limitations and \nexceptions exist. Even then, legal uncertainty means that going down this path is likely to \nlitigation and regulatory \ngenerate, at a minimum, expensive and time-consuming ", + "page_start": 15, + "page_end": 15, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "*What dataset management practices are necessary?*\n\nNo matter how a books data commons gets built, it will be important to consider broader \naspects of data governance. For example: \n\n•**Dataset documentation and transparency:**Transparent documentation is important \nfor any dataset used for AI training. A datasheet is a standardized form of \ndocumentation that includes information about provenance and composition of data, \nand includes information on management practices, recommended uses or collection \nprocess. \n\n•**Quality assurance:**Above, we note the many features that make books useful for AI \ntraining, as compared with web data, for example. That said, the institution managing \na books commons dataset may still want to collect and curate the collection to meet \nthe particular purposes of its users. For instance, it may want to take steps to \nmitigate biases inherent in the dataset, by ensuring books are representative of a \nvariety of languages and geographies. \n\n•**Understanding uses:**The institution managing a books commons dataset could \nmeasure and study how the dataset is used, to inform future improvements. Such \nmonitoring may also enable accountability measures with respect to uses of the \ndataset. Introducing community norms for disclosing datasets used in AI training and \nother forms of AI research would facilitate such monitoring. ", + "page_start": 19, + "page_end": 19, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "***7. Conclusion***\n\nThis paper is a snapshot of an idea that is as underexplored as it is rooted in decades of \nexisting work. The concept of mass digitization of books, including to support text and data \nmining, of which AI is a subset, is not new. But AI training is newly of the zeitgeist, and its \ntransformative use makes questions about how we digitize, preserve, and make accessible \nknowledge and cultural heritage salient in a distinct way. \n\nAs such, efforts to build a books data commons need not start from scratch; there is much \nto glean from studying and engaging existing and previous efforts. Those learnings might \ninform substantive decisions about how to build a books data commons for AI training. For \ninstance, looking at the design decisions of HathiTrust may inform how the technical \ninfrastructure and data management practices for AI training might be designed, as well as \nhow to address challenges to building a comprehensive, diverse, and useful corpus. In \naddition, learnings might inform the process by which we get to a books data commons — \nfor example, illustrating ways to attend to the interests of those likely to be impacted by the \ndataset’s development. 41 \n\nWhile this paper does not prescribe a particular path forward, we do think finding a path (or \npaths) to extend access to books for AI training is critical. In the status quo, large swaths of \nknowledge contained in books are effectively locked up and inaccessible to most everyone. \nGoogle is an exception — it can reap the benefits of their 40 million books dataset for \nresearch, development, and deployment of AI models. Large, well-resourced entities could \ntheoretically try to replicate Google’s digitization efforts, although it would be incredibly \nexpensive, impractical, and largely duplicative for each entity to individually pursue their own \nefforts. Even then, it isn’t clear how everyone else — independent researchers, entrepreneurs, \nand smaller entities — will have access. The controversy around the Books3 dataset \ndiscussed at the outset should not, then, be an argument in favor of preserving the status \nquo. Instead, it should highlight the urgency of building a books data commons to support an \nAI ecosystem that provides broad benefits beyond the privileged few. ", + "page_start": 20, + "page_end": 20, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "•**Breadth, Diversity, and Mitigating Bias:**Books can serve a critical role in ensuring AI \nmodels are inclusive of a broad range of topics and categories that may be under- \nrepresented in other content. For all that the Internet has generated an explosion in \nhuman creativity and information sharing, it generally represents only a few decades \nof information and a small portion of the world’s creative population. A books \ndataset, by comparison, is capable of representing centuries of human knowledge. As \na result such a dataset can help ensure AI systems behavior is based on centuries of \nhistorical information from modern books. It can help ensure broad geographic and \nlinguistic diversity. What’s more, the greater breadth and diversity of high-quality \ncontent help mitigate challenges around bias and misinformation. Using a more \ndiverse pool of training data can help support the production of a model and outputs \nof the model that are more representative of that diversity. Books can be useful in \nevaluation datasets to test existing models for memorization capabilities, which can \nhelp prevent unintended reproduction of existing works. Of course, this is all \ncontingent on actual composition of the corpus; in order to have the benefits \ndescribed, the books would need to be curated and included with characteristics like \ntime, geographic and linguistic diversity. ", + "page_start": 6, + "page_end": 6, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "***1. Introduction***1 \n\nWhile the field of artificial intelligence research and technology has a long history, broad \npublic attention grew over the last year in light of the wide availability of new generative AI \nsystems, including large language models (LLMs) like GPT-4, Claude, and LLaMA-2. These \ntools are developed using machine learning and other techniques that analyze large datasets \nof written text, and they are capable of generating text in response to a user’s prompts. \n\nWhile many large language models rely on website text for training, books have also played \nan important role in developing and improving AI systems. Despite the widespread use of e- \nbooks and growth of sales in that market, books remain difficult for researchers and \nentrepreneurs to access at scale in digital form for the purposes of training AI. \n\nIn 2023, multiple news publications reported on the availability and use of a dataset of books \n The Books3 dataset contains text from over 170,000 books, \ncalled “Books3” to train LLMs. \nwhich are a mix of in-copyright and out-of-copyright works. It is believed to have been \noriginally sourced from a website that was not authorized to distribute all of the works \ncontained in the dataset. In lawsuits brought against OpenAI, Microsoft, Meta, and \nBloomberg related to their LLMs, the use of Books3 as training data was specifically cited. 3 \n\n2 ", + "page_start": 1, + "page_end": 1, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "**Implications of the The Overall Approach**\n\nStepping back from The Pile v2 specifically, or any particular existing collection of books or \ndataset built on their basis, we want to understand the implications of relying on public \ndomain works and expressly licensed works in building a books commons. \n\nThe benefits are relatively straightforward. Both categories, by definition come with express \npermission to use the books in AI training. The cost of acquiring the books for this use may \nbe effectively zero or close to it, when considering public domain and “openly” licensed \nbooks that allow redistribution and that have already been digitized. \n\nBut this approach comes with some clear limitations. First, as noted above, for many books \nin the public domain, their status as such is not always clear. And with respect to \npermissively licensed books, it is not always clear whether and how to comply with the \nlicense obligations in this context. \n\nSetting aside those challenges, the simple fact is that relying on public domain and existing \npermissively licensed books would limit the quantity and diversity of data available for \ntraining, impacting performance along different dimensions. Only a small fraction of books \never published fall into this category, and the corpus of books in this category is likely to be \nskewed heavily towards older public domain books. This skew would, in turn, impact the \n For instance, relying on books from before 1929 would not \ncontent available for AI training. \nonly incorporate outdated language patterns, but also a range of biases and misconceptions \nabout race and gender, among other things. Efforts could be made to get people to \npermissively license more material — a book drive for permissive licensing, so to speak; this \napproach would still not encompass most books, at least when it comes to past works. \n\n30 \n\n 31 ", + "page_start": 13, + "page_end": 13, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "•**Other Modalities:**Finally, books do not just contain text, they often contain images \nand captions of those images. As such, they can be an important training source for \nmulti-modal LLMs, which can receive and generate data in media other than text. \n\n**Lowering Barriers to Entry & Facilitating Competition**\n\nBroad access to books for AI training is critical to ensure powerful AI models are not \nconcentrated in the hands of only a few companies. Access to training data, in general, has \nbeen cited as a potential competitive concern \n11 \n in the AI field because of the performance \nbenefits to be gained by training on larger and larger datasets. But this competitive wedge is \neven more acute when we look specifically at access to book datasets. \n\nThe largest technology companies building commercial AI models have the resources and \ncapacity to mass digitize books for AI training. Google has scanned 40 million books, many \nof which came from digitization partnerships they formed with libraries. They may already \nuse some or all of these books to train their AI systems. \n It’s unclear to what extent other \ncompanies already have acquired books for AI training (for instance, whether Amazon’s \nlicenses with publishers or self-published authors may permit such uses); \nexisting \n\n12 ", + "page_start": 6, + "page_end": 6, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "engagement. And, at least in the U.S., it could generate billions of dollars in damages if the \nspecific design choices and technical constraints are not adequate to justify a finding of fair \nuse. \n\nThis sort of books dataset could be built by expanding use of in-copyright books that have \nalready been digitized from existing libraries and other sources. Specifically, workshop \nparticipants mentioned that the Internet Archive, HathiTrust, and Google as entities that have \ndigitized books and could repurpose their use to build a books commons, although \nchallenges with using these datasets were noted. The Internet Archive is in the midst of \nlitigation brought by book publishers for its program for lending digital books; while not \ndirectly relevant to the issue of AI training using their corpus of books, this sort of litigation \ncreates a chilling effect on organizations seeking to make new uses of these digitized books. \nMeanwhile, Google encumbered HathiTrust’s digital copies with certain contractual \nrestrictions, which would need to be addressed to develop a books dataset for AI training, \nand Google itself is unlikely to share its own copies while it provides them a competitive \nadvantage. \n\nPerhaps as a matter of public policy, these existing copies could be made more freely \navailable. For instance, to ensure robust competition around AI and advance other public \ninterests, policymakers could remove legal obstacles to the sharing of digitized book files for \nuse in AI training. Alternatively, policymakers could go further and affirmatively compel \nsharing access to these digital book files for AI training. ", + "page_start": 16, + "page_end": 16, + "source_file": "creative_common_ai.pdf" + } + ] + }, + { + "references": { + "source_file": "creative_common_ai.pdf", + "query": "In the United States, before which date is book out of copyright for sure ?", + "target_page": 9, + "target_passage": "In the United States, all books published or released before 1929 are in the public domain. While use of these books provides maximal certainty for the AI developer to train on", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "***4. Copyright, Licensing, & Access to Books for***\n***Training***\n\nEven if books can be acquired, digitized, and made technically useful for AI training, the \ndevelopment of a books data commons would necessarily need to navigate and comply with \ncopyright law. \n\n**Out-of-Copyright Books:**A minority of books are old enough to be in the public domain and \nout of copyright, and an AI developer could use them in training without securing any \ncopyright permission. In the United States, all books published or released before 1929 are in \nthe public domain. While use of these books provides maximal certainty for the AI developer \nto train on, it is worth noting that the status of whether a book is in the public domain can be \ndifficult to determine. \n For instance, books released between 1929 and 1963 in the U.S. are \nout of copyright if they were not subject to a copyright renewal; however, data on copyright \nrenewals is not easily accessible. \n\n14 \n\nWhat’s more, copyright definitions and term lengths vary among countries. Even if a work is \nin the public domain in the US, it may not be in other countries. \n Countries generally use the \nlife of the last living author + “x” years to determine the term of copyright protection. For \nmost countries, “x” is either 50 years (the minimum required by the Berne Convention) or 70 \nyears (this is the case for all member states of the European Union and for all works \npublished in the U.S. after 1978). This approach makes it difficult to determine copyright \nterms with certainty because it requires information about the date of death of each author, \nwhich is often not readily available. \n\n15 ", + "page_start": 8, + "page_end": 8, + "source_file": "creative_common_ai.pdf" + }, + { + "text": " See e.g. Heald, Paul J. “How Copyright Makes Books and Music Disappear (and How Secondary \n16 \nLiability Rules Help Resurrect Old Songs).” Illinois Program in Law, Behavior and Social Science Paper \nNo. LBSS14-07 Illinois Public Law Research Paper No. 13-54 https://doi.org/10.2139/ssrn.2290181. \nAccessed 4 Jan. 2020, at https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290181; Rosen, \nRebecca J. “Why Are so Few Books from the 20th Century Available as Ebooks?”*The Atlantic*, 18 Mar. \n2014, www.theatlantic.com/business/archive/2014/03/why-are-so-few-books-from-the-20th-century- \navailable-as-ebooks/284486/. See also “Google Book Search Settlement and Access to Out of Print \nBooks.”*Google Public Policy Blog*, publicpolicy.googleblog.com/2009/06/google-book-search- \nsettlement-and.html. Accessed 20 Mar. 2024 (discussing this issue in the context of the failed class- \naction settlement between Google, the Authors Guild, and the Association of American Publishers). \nGoogle’s final brief in the settlement proceedings notes the “prohibitive transaction costs of identifying \nand locating individual Rightsholders of these largely older, out-of-print books” — see this brief at https:// \nweb.archive.org/web/20130112060651/http://thepublicindex.org/docs/amended_settlement/ \ngoogle_final_approval_support.pdf. The Authors Guild and Association of American Publishers also \njustified the settlement’s terms in light of the fact that “the transaction costs involved in finding \ncopyright owners and clearing the rights are too high”; while they argued that most works are not truly \n“orphans,” they note that total transaction costs as a whole (including, for example, determining whether \nthe author or publisher holds the rights and then negotiating rates) are so high as to block uses of out- \nof-print works anyway — see this brief at https://web.archive.org/web/20130112060213/http:// \nthepublicindex.org/docs/amended_settlement/Supplemental_memorandum_of_law.pdf. ", + "page_start": 9, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "with. The vast majority of in-copyright books are out-of-print or out-of-commerce, and most \nare not actively managed by their rightsholders. There is no official registry of copyrighted \nworks and their owners, and existing datasets can be incomplete or erroneous. 16 \n\nAs a result, there may be no way to license the vast majority of in-copyright books, especially \nthose that have or have had limited commercial value. \n Put differently, the barrier to using \nmost books is not simply to pay publishers; even if one had significant financial resources, \nlicensing would not enable access to most works. \n\n17 \n\n**Permissively licensed works**\n\nThere are books that have been permissively licensed in an easily identifiable way, such as \nworks placed under Creative Commons (CC) licenses. Such works explicitly allow particular \nuses of works subject to various responsibilities (e.g., requiring attribution by the user in their \nfollow-on use). \n\nWhile such works could be candidates for inclusion in a books data commons, their inclusion \ndepends on whether the license’s terms can be complied with in the context of AI training. \nFor instance, in the context of CC licensed works, there are requirements for proper \nattribution across all licenses (the CC tools Public Domain Dedication (CC0) and Public \nDomain Mark (PDM) are not licenses and do not require attribution). 18 ", + "page_start": 9, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "What this means for our purposes is that even if one acquires a digital book from, for \nexample, Amazon, and it is lawful under copyright law to use that book in AI training, it can \nstill generally be unlawful to circumvent the DRM to do so, outside narrow exceptions. \n 25 \nThus, the ability to use in-copyright books encumbered by DRM — that is, most all books sold \nby major publishers — is generally limited. 26 \n\nPractically, using in-copyright books to build a books commons for AI training — while relying \non copyright’s limitations and exceptions — requires turning a physical book into digital form, \nor otherwise engaging in the laborious process of manually re-creating a book’s text (i.e., re- \ntyping the full text of the book) without circumventing the technical restrictions themselves. ", + "page_start": 11, + "page_end": 11, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "**In-Copyright Books:**The vast majority of books are in copyright, and, insofar as the training \nprocess requires making a copy of the book, the use in AI training may implicate copyright \nlaw. Our workshop covered three possible paths for incorporating such works. \n\n**Direct licensing**\n\nOne could directly license books from rightsholders. There may be some publishers who are \nwilling to license their works for this purpose, but it is hard to determine the scale of such \naccess, and, in any event, there are significant limits on this approach. Along with the \nchallenge (and expense) of reaching agreements with relevant rightsholders, there is also the \npractical difficulty of simply identifying and finding the rightsholder that one must negotiate ", + "page_start": 8, + "page_end": 8, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "**Reliance on Copyright Limitations and Exceptions**\n\nEven if a book is in copyright, it’s possible that copying books for AI training may be covered \nby existing limitations and exceptions to copyright law in particular jurisdictions. For \nexample: \n\n• In the United States, many argue using existing works to train generative AI is “fair \nuse,” consistent with existing law and legal precedents. \n This is the subject of a \nnumber of currently active court cases, and different actors and tools may yield \ndifferent results, as fair use is applied case-by-case using a flexible balancing test. \n\n19 \n\n• In the European Union, there are explicit exceptions in the law for “text and data \nmining” uses of in-copyright works, both for non-commercial research and for \ncommercial purposes. However, for commercial uses and for users outside of \nresearch and heritage institutions, they must respect the rights of rightsholders who \nchoose to “reserve their rights” (i.e., opt-out of allowing text and data mining) via \n The exception also requires that users have “lawful \nmachine readable mechanisms. \naccess” to the works. \n\n20 \n\n• Finally, Japan provides a specific text and data mining exception, without any \ncomparable opt-out requirement for commercial uses as is embedded in EU law. 21 ", + "page_start": 10, + "page_end": 10, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "**Implications of the The Overall Approach**\n\nStepping back from The Pile v2 specifically, or any particular existing collection of books or \ndataset built on their basis, we want to understand the implications of relying on public \ndomain works and expressly licensed works in building a books commons. \n\nThe benefits are relatively straightforward. Both categories, by definition come with express \npermission to use the books in AI training. The cost of acquiring the books for this use may \nbe effectively zero or close to it, when considering public domain and “openly” licensed \nbooks that allow redistribution and that have already been digitized. \n\nBut this approach comes with some clear limitations. First, as noted above, for many books \nin the public domain, their status as such is not always clear. And with respect to \npermissively licensed books, it is not always clear whether and how to comply with the \nlicense obligations in this context. \n\nSetting aside those challenges, the simple fact is that relying on public domain and existing \npermissively licensed books would limit the quantity and diversity of data available for \ntraining, impacting performance along different dimensions. Only a small fraction of books \never published fall into this category, and the corpus of books in this category is likely to be \nskewed heavily towards older public domain books. This skew would, in turn, impact the \n For instance, relying on books from before 1929 would not \ncontent available for AI training. \nonly incorporate outdated language patterns, but also a range of biases and misconceptions \nabout race and gender, among other things. Efforts could be made to get people to \npermissively license more material — a book drive for permissive licensing, so to speak; this \napproach would still not encompass most books, at least when it comes to past works. \n\n30 \n\n 31 ", + "page_start": 13, + "page_end": 13, + "source_file": "creative_common_ai.pdf" + }, + { + "text": " In the EU, the 2019 Copyright Directive introduced specific provisions on the \"use of out-of-commerce \n\n17 \nworks and other subject matter by cultural heritage institutions\" (Articles 8-11 CDSMD). These \nprovisions allow cultural heritage institutions to \"make available, for non-commercial purposes, out-of- \ncommerce works or other subject matter permanently in their collections\". The limitation to non- \ncommercial purposes means that works made available under these provisions would be of limited use \nin building a books data commons. \n\n For one assessment of the difficulties of complying with the CC licenses in this context, to the extent \n18 \nthey are applicable, see Lee, K., A. Feder Cooper, & Grimmelmann, J. (2023). Talkin’ ‘Bout AI Generation: \nCopyright and the Generative AI Supply Chain. Forthcoming,*Journal of the Copyright Society*2024. \nhttps://doi.org/10.2139/ssrn.4523551. ", + "page_start": 9, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "\n\n\"great colors of nature\" by marcostetter is published under Public Domain Mark 1.0. \n\n**About Us**", + "page_start": 1, + "page_end": 1, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "difference whether those third parties are private, for-profit corporations or even other Public \n\nAdministrations. Unless, of course, there are national laws already in place that define in advance \n\nwhat is the license of all present and future Public Data,*no matter how they were generated and by*\n\n*whom*, those data can be lost in any moment for society. In all other cases, the legal status of data \n\nwill be either officially closed and locked, or uncertain enough to prevent most or all reuses. In \n\nFebruary 2011, the news came that, even if they weren't the original copyright holders, Public \n\nEngines had been able to put together enough legal claims to convince Report See to give up. \n\nDisputes like this should not happen and would not happen if all contracts regarding collection and \n\nmanagement of PSI clearly specified that all the resulting data either go directly into the public \n\ndomain (after being anonymized if necessary, of course) or remain exclusive property of the ", + "page_start": 12, + "page_end": 12, + "source_file": "Open_Data_Report.pdf" + } + ] + }, + { + "references": { + "source_file": "creative_common_ai.pdf", + "query": "What of the main imporvement of the Pile v2 dataset in comparison to its first version ?", + "target_page": 13, + "target_passage": "Among other things, v2 would “have many more books than the original Pile had, for example, and more diverse representation of non-academic non-fiction domains.” At the same time, it would only seek to include public domain books and permissively licensed content", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "As the awareness about The Pile dataset grew, certain rightsholders began sending copyright \nnotices to have the dataset taken down from various websites. \n\nDespite the takedown requests, the importance of books to EleutherAI and the broader \ncommunity’s AI research remained. In hoping to forge a path forward EleutherAI announced \n 29 \nin 2024 that they would create a new version of the dataset, which they will call The Pile v2. \nAmong other things, v2 would “have many more books than the original Pile had, for \nexample, and more diverse representation of non-academic non-fiction domains.” At the \nsame time, it would only seek to include public domain books and permissively licensed \ncontent. As before, this corpus focuses on English language books. ", + "page_start": 12, + "page_end": 12, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "Dataset x Task \nAmazonReviewsClassification \nMasakhaNEWSClassification \nMassiveIntentClassification \nMassiveScenarioClassification \nMTOPDomainClassification \nMTOPIntentClassification \nAlloProfClusteringP2P \nAlloProfClusteringS2S \nHALClusteringS2S \nMasakhaNEWSClusteringP2P \nMasakhaNEWSClusteringS2S \nMLSUMClusteringP2P \nMLSUMClusteringS2S \nOpusparcusPC \nPawsX \nSTSBenchmarkMultilingualSTS \nSTS22 \nSICKFr \nDiaBLaBitextMining \nFloresBitextMining \nAlloprofReranking \nSyntecReranking \nAlloprofRetrieval \nBSARDRetrieval \nSyntecRetrieval \nSummEvalFr Average # tokens \n49.6 \n1398.2 \n11.4 \n11.4 \n12.5 \n12.5 \n1021.8 \n8.8 \n25.6 \n1398.1 \n21.7 \n1062.1 \n20.8 \n9.7 \n34.9 \n18.4 \n722.1 \n15.1 \n12.02 \n33.42 \n48.3 - 1179.4 - 1196.4 \n19.2 - 402.2 - 467.2 \n48.31 - 1117.91 \n144.03 - 24530.8 \n19.22 - 295.65 \n657.08 - 71.18 - 107.56 ", + "page_start": 12, + "page_end": 12, + "source_file": "arxiv4.pdf" + }, + { + "text": "correlated (see Figure 12). We preferred to propose \ndatasets even if they could introduce biases rather \nthan not address the task in the benchmark. Note \nthat each task type can be considered individually. \nWe hope additional resources will be developed \nin the French-speaking community to enrich our \ncomparison. \n\nBenchmark validity over time As with all \nbenchmarks, their reliability over time can be dis- \ncussed as the field evolves fast. The models se- \nlected for the analysis conducted in this paper are \nthose available at this time, new outperforming \nmodels will be created and shall be evaluated. Our \nwork extends MTEB and thus simplifies the ad- \ndition of new datasets for evaluation and allows \nrunning new models. With this effort, we hope \nthis will simplify the evaluation of new models pro- \nposed by the community to keep our work up to \ndate. ", + "page_start": 8, + "page_end": 8, + "source_file": "arxiv4.pdf" + }, + { + "text": "Figure 4 SSv2 fine-tuning performance vs. Samples Seen. We \nreport SSv2 fine-tuning for V-JEPA and pixel-reconstruction \nbaselines using a ViT-L/16 or Hiera-L architecture. V-JEPA \noutperforms all pixel-reconstruction methods using a ViT- \nL/16 and matches the Hiera-L performance while seeing \nsignificantly less samples during pretraining. \n\nFigure 5 SSv2 frozen-evaluation performance vs. Pretraining \nTime. Wallclock times for all methods are measured on a \nsingle GPU with a batch size of 10 clips, using the official \ncodebases for VideoMAE and VideoMAEv2, and linearly \nextrapolated assuming a global batch size of 2400 samples. \nHowever, note that the SSv2 accuracies of video pixel pre- \ndiction methods are actually obtained with small batch sizes \nand significantly longer training schedules. V-JEPA out- \nperforms pixel-reconstruction methods while training signifi- \ncantly faster. ageNet; hence, V-JEPA achieves comparable ImageNet \nperformance despite only pretraining on video. ", + "page_start": 7, + "page_end": 7, + "source_file": "arxiv3.pdf" + }, + { + "text": "*Day2Day control dataset*. To compare our findings against a control \ngroup of nonpregnant densely-sampled individuals, we used the Day- \n2Day dataset23 which offered comparable whole-brain T1 and T2 MTL \nscans for eight participants (two male) scanned 12–50 times over 2–7 \nmonths. Each participant was run through the ANTs CT and ASHS pro- \ncessing pipelines as outlined above (‘Cortical volume and thickness’ \nand ‘Hippocampal segmentation’). To note, for each participant, we \ncreated an SST based on their first two sessions for consistency with \nthe primary dataset; subfield volumes for the T2 MTL scans did not \nundergo manual retouching. Due to missing header information on \nthe publicly available diffusion scans, we were unable to benchmark \nour white matter changes with the Day2Day dataset. \n\n**Statistical analysis.**Statistical analyses were conducted using R (sMRI; \nversion 3.4.4) and DSI Studio (dMRI; Chen-2022-07-31). ", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed4.pdf" + }, + { + "text": "MasakhaNEWSClusteringP2P). Table 3 shows de- \ntails of each task data used for running the bench- \nmark. \n\n2019; Le et al., 2020). Most French models for \nsentence embeddings have been developed by the \nopen-source community2, by fine-tuning models \nlike CamemBERT(Martin et al., 2019) or Crois- \nsantLLM(Faysse et al., 2024). \n\nThis section describes the 3 new datasets we in- \ntroduce, quality checks performed and an analysis \nof the semantic similarities between datasets. \n\nBenchmarks Embedding models are generally \ncompared on specific tasks, such as information \nretrieval, STS or reranking (Thakur et al., 2021; \nAgirre et al., 2016; Wang et al., 2021). Other \nworks evaluate embedding models on multiple \ntasks (Wang et al., 2018; et al., 2022; Conneau and \nKiela, 2018) or compare meta-embeddings (García- \nFerrero et al., 2021). The most comprehensive \nbenchmark to date is MTEB (Muennighoff et al., \n2022). MTEB still has a critical limit: it mainly \nfocuses on English. Some initiatives already ex- \ntended this benchmark to other languages, such as \nChinese (Xiao et al., 2024) and German (Wehrli \net al., 2024). Our work comes with the same am- \nbition for French. It relies on the MTEB structure \nthat provides a solid basis for analysis and extends \nit to a new language. ", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv4.pdf" + }, + { + "text": "3.1.5 Similarity analysis \nWe investigate the proximity between the datasets’ \ntopics to give insights about the benchmark con- \ntents. The methodology introduced by Muen- \nnighoff et al. (2022), i.e. computing an average \nembedding of samples from each dataset, is used to \nbuild a dataset-similarity matrix (displayed in ap- \npendix Figure 3). The distances between averaged \nembedding vectors of each dataset (which range \nfrom 0.89 to 1 in Figure 3) remain hard to interpret \ninto a dataset semantic proximity. Thus, we com- \nplement this by observing the dataset’s clouds of \nembedding in a 2D plane using PCA in Figure 4. \nFigures 4 and 3 seem to correlate, showing high \nsimilarity between two datasets when the same \nunderlying data is used in different tasks. Dataset \ntopics are pretty close, with some exceptions, such \nas the Syntec dataset. As more datasets are added \nto the benchmark, this analysis will help select new \ndata that do not produce redundant results. It may \nalso help to understand the link between the results \nand the datasets’ topics. \n\n2023) where given the original human summary \nin English and its translation in French, the model \nrates the quality of the translation from 0 to 10, \nwith 0 being of very bad quality and 10 being ex- \ncellent. The prompt is available in Figure 8. Ad- \nditionally, we manually check random translations \nwith ratings between 9 and 10 to ensure the rating \nis relevant. We do the same for all translations with \na score less than 9 and correct them7 (see the rating \ndistribution in Table 6). \n\nTable 2: Average ROUGE and BLUE scores computed \nbetween machine summaries and human summaries \nfor the original English SummEval and its translation \nto French. The correlations of the individual scores \nbetween English and French are also reported. ", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv4.pdf" + }, + { + "text": "In Table 15, we evaluate V-JEPA using finetuning (separately) on K400 and SSv2. We compare V-JEPA with \nVideoMAEv2 (Wang et al., 2023a), VideoMAE (Tong et al., 2022) and MVD (Wang et al., 2023b) using a ViT-L/16 \nor a ViT-H/16 architecture. V-JEPA obtains competitive performance using a finetuning protocol. With a ViTiH/16 \narchitecture, V-JEPA outperforms by 1.2% VideoMAE and +0.3% VideoMAEv2 on the SSv2 dataset, while obtaining \ncomparable performance on K400. V-JEPA also obtains performance similar to MVD on the SSv2 dataset. The \nMVD model achieves the best performance across models on the K400 dataset, and is trained using the image \ndataset ImageNet1K, in contrast to the other methods in the table, which only use video data. Additionally MVD \nrequires the processing of significantly more samples during pretraining due to the cost of training the teacher \nencoder networks in a pre-pre-training step. ", + "page_start": 20, + "page_end": 20, + "source_file": "arxiv3.pdf" + }, + { + "text": "***5. Examining approaches to building a books data***\n***commons***\n\nThere are many possible permutations for building a books data commons. To structure our \nexploration, we focused on two particular tracks, discussed below. We chose these tracks \nmindful of the above legal issues, and because there are already existence proofs that help \nto illuminate tradeoffs, challenges and potential paths forward for each. \n\n*5a. Public domain and permissively licensed books*\n\n**Existing Project Example : The Pile v2**\n27 \n\nIn 2020, the nonprofit research group EleutherAI constructed and released The Pile — a large, \ndiverse, open dataset for AI training. EleutherAI developed it not only to support their own \ntraining of LLMs, but also to lower the barriers for others. 28 \n\nAlong with data drawn from the web at large, The Pile included books from three datasets. \nThe first dataset was the Books3 corpus referenced at the outset of this paper. The second \nand third books datasets were smaller: BookCorpus2, which is a collection of 17,868 books \nby otherwise unpublished authors; and a 28,752 books in the public domain and published \nprior to 1919, drawn from a volunteer effort to digitize public domain works called Project \nGutenberg. ", + "page_start": 12, + "page_end": 12, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "Table 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), Video- \nMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using \na ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, \niNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. \nAll models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from \nseveral spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream \ntasks, except ImageNet, where the model achieves 74.8% compared to 75.1% of an OmniMAE model trained directly on \nImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on \nSSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining. ", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + } + ] + }, + { + "references": { + "source_file": "news1.pdf", + "query": "Where will the 2024 AI + Energy summit take place ?", + "target_page": 1, + "target_passage": "The AI + Energy Summit, scheduled for September 26, 2024, in Washington, D.C.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "ARTS AND ENTERTAINMENT \n\nNew Artificial Intelligence Summit Series Begins With \nEnergy \n\n07/31/2024 \n\n (AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain \n\nAmerica’s global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative \n\nwith a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit \n\nSeries. \n\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington, \n\nD.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and \n\ntechnologists to address the challenges of AI’s energy consumption and develop solutions for a resilient and abundant \n\nenergy future. The event also aims to address the implications of AI and energy for national security and promote \n\npartnerships between AI and energy stakeholders. \n\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy \n\nefficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in \n\novercoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced \n\ncomputing, emergency response, environmental modeling, climate forecasting, and materials research. ", + "page_start": 0, + "page_end": 0, + "source_file": "news1.pdf" + }, + { + "text": "In November 2023, the first global AI Safety Summit was held in Bletchley Park in the UK to discuss the \nnear and far term risks of AI and the possibility of mandatory and voluntary regulatory frameworks.[314] \n28 countries including the United States, China, and the European Union issued a declaration at the start \nof the summit, calling for international co-operation to manage the challenges and risks of artificial \nintelligence.[315][316] In May 2024 at the AI Seoul Summit, 16 global AI tech companies agreed to safety \ncommitments on the development of AI.[317][318] ", + "page_start": 21, + "page_end": 21, + "source_file": "wikipedia3.pdf" + }, + { + "text": "FAccT ’21, March 3–10, 2021, Virtual Event, Canada \n\nAdvances in Artificial Intelligence, EAAI 2020, New York, NY, USA, February 7-12, \n2020. AAAI Press, 8968–8975. https://aaai.org/ojs/index.php/AAAI/article/ \nview/6428 ", + "page_start": 13, + "page_end": 13, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "SCSP’s recent “Action Plan for U.S. Leadership in Next-Generation Energy,” raises many issues related to AI and energy, \n\nincluding recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and \n\nother issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American \n\nadversaries could gain the upper hand in AI leadership, according to SCSP experts. \n\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP’s Next-Generation Energy Action Plan. \n\nArticle Link \n\nhttps://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with… ", + "page_start": 0, + "page_end": 0, + "source_file": "news1.pdf" + }, + { + "text": "**Power needs and environmental impacts**\n\nIn January 2024, the International Energy Agency (IEA) released*Electricity 2024, Analysis and Forecast*\n*to 2026*, forecasting electric power use.[203] This is the first IEA report to make projections for data \ncenters and power consumption for artificial intelligence and cryptocurrency. The report states that power \ndemand for these uses might double by 2026, with additional electric power usage equal to electricity \nused by the whole Japanese nation.[204] \n\nProdigious power consumption by AI is responsible for the growth of fossil fuels use, and might delay \nclosings of obsolete, carbon-emitting coal energy facilities. There is a feverish rise in the construction of \ndata centers throughout the US, making large technology firms (e.g., Microsoft, Meta, Google, Amazon) \ninto voracious consumers of electric power. Projected electric consumption is so immense that there is \nconcern that it will be fulfilled no matter the source. A ChatGPT search involves the use of 10 times the \nelectrical energy as a Google search. The large firms are in haste to find power sources – from nuclear \nenergy to geothermal to fusion. The tech firms argue that – in the long view – AI will be eventually \nkinder to the environment, but they need the energy now. AI makes the power grid more efficient and \n\"intelligent\", will assist in the growth of nuclear power, and track overall carbon emissions, according to \ntechnology firms.[205] ", + "page_start": 13, + "page_end": 13, + "source_file": "wikipedia3.pdf" + }, + { + "text": "**cc global summit**\n\nOver 300 attendees from 45 countries joined us this past October in \nMexico City for the first in-person**CC Global Summit**since 2019. The \ntheme was AI & the Commons with over 60 sessions and 180 speakers. \n**Learn more here.**\n\n**Thank you to our sponsors:**John D. and Catherine T. MacArthur \nFoundation, Microsoft Corporation, Filecoin Foundation for the \nDecentralized Web, Akin, Anthropic, Mozilla Foundation, The Michelson \n20MM Foundation, MHz Curationist, Frontiers Media, Arnold & Porter, \nand Crowell & Moring. ", + "page_start": 5, + "page_end": 5, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**Areas of Exploration**\n\n**Support for Creators in the**\n**Time of Artificial Intelligence**\n\nIn 2023, we convened hundreds via \nroundtables, community conferences \n(e.g.**MozFest**,**Wikimania**), and public \nevents (e.g. symposium on**Generative**\n**AI & Creativity**)to debate copyright law, \nthe ethics of open sharing, and other \nrelevant areas that touch AI. \n\nAt our CC Global Summit, participants \ndrafted**community-driven principles**\non AI that are a valuable input and will \nhelp inform the organization’s thinking \nas we determine CC’s exact role in the AI \nspace. ", + "page_start": 8, + "page_end": 8, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "A 2024 Goldman Sachs Research Paper,*AI Data Centers and the Coming US Power Demand Surge*, \nfound \"US power demand (is) likely to experience growth not seen in a generation....\" and forecasts that, \nby 2030, US data centers will consume 8% of US power, as opposed to 3% in 2022, presaging growth for \nthe electrical power generation industry by a variety of means.[206] Data centers' need for more and more \nelectrical power is such that they might max out the electrical grid. The Big Tech companies counter that \nAI can be used to maximize the utilization of the grid by all.[207] \n\nIn 2024, the*Wall Street Journal*reported that big AI companies have begun negotiations with the US \nnuclear power providers to provide electricity to the data centers. In March 2024 Amazon purchased a \nPennsylvania nuclear-powered data center for $650 Million (US).[208] Nvidia CEO Jen-Hsun Huang said \nnuclear power is a good option for the data centers.[209] \n\nIn September 2024, Microsoft announced an agreement with Constellation Energy to re-open the Three \nMile Island nuclear power plant to provide Microsoft with 100% of all electric power produced by the \nplant for 20 years. Reopening the plant, which suffered a partial nuclear meltdown of its Unit 2 reactor in \n1979, will require Constellation to get through strict regulatory processes which will include extensive \nsafety scrutiny from the US Nuclear Regulatory Commission. If approved (this will be the first ever US \nre-commissioning of a nuclear plant), over 835 megawatts of power – enough for 800,000 homes – of ", + "page_start": 13, + "page_end": 13, + "source_file": "wikipedia3.pdf" + }, + { + "text": "199. Wong, Matteo (24 October 2023). \"The Future of AI Is GOMA\" (https://www.theatlantic.com/t \n\nechnology/archive/2023/10/big-ai-silicon-valley-dominance/675752).*The Atlantic*. Archived \n(https://web.archive.org/web/20240105020744/https://www.theatlantic.com/technology/archi \nve/2023/10/big-ai-silicon-valley-dominance/675752) from the original on 5 January 2024. ", + "page_start": 40, + "page_end": 40, + "source_file": "wikipedia3.pdf" + }, + { + "text": "2023 was a busy year at Creative \nCommons. Our**Open Culture**program \nand**Open Climate Campaign**entered \ntheir third and second years, respectively. \nWe hosted our first in-person CC Global \nSummit since 2019 in Mexico City. We \nheld critical consultations and open \npanels on AI, copyright, and the CC \nLicenses, cultural heritage, education, \nand science; and we launched our**Open**\n**Infrastructure Circle**in an effort to \nensure the CC Licenses are funded well \ninto the future. ", + "page_start": 2, + "page_end": 2, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + } + ] + }, + { + "references": { + "source_file": "news1.pdf", + "query": "What is the United States SCSP ?", + "target_page": 1, + "target_passage": "he Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative with a goal of making recommendations to strengthen America's long-term competitiveness in AI", + "chunk_present": { + "presence": true, + "index": 5 + } + }, + "top_chunk": [ + { + "text": "\nUSA ", + "page_start": 8, + "page_end": 8, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "\nUSA ", + "page_start": 7, + "page_end": 7, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "SCSP’s recent “Action Plan for U.S. Leadership in Next-Generation Energy,” raises many issues related to AI and energy, \n\nincluding recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and \n\nother issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American \n\nadversaries could gain the upper hand in AI leadership, according to SCSP experts. \n\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP’s Next-Generation Energy Action Plan. \n\nArticle Link \n\nhttps://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with… ", + "page_start": 0, + "page_end": 0, + "source_file": "news1.pdf" + }, + { + "text": "**$**\n\n**29,905**\n**7,428**\n**4,500**\n**2,888**\nrepair, and operational needs, in the government and commercial sectors, throughout the U.S. and Canada. In August 2010, the \n**44,721**\nCompany acquired SCS Supply Group, a distributor of bearings, power transmission components, electrical components, fluid power \nproducts and industrial supplies located in Ontario, Canada. ", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "**The United States**\n**10**\n\n**SMBC GLOBAL FOUNDATION**\n\nBased in the United States, SMBC Global Foundation has \nBased in the United States, SMBC Global Foundation has \nprovided scholarships to more than 5,000 university students \nprovided scholarships to more than 5,000 university students \nin Asian countries since its establishment in 1994. In the \nin Asian countries since its establishment in 1994. In the \nUnited States, it supports educational trips to Japan \nUnited States, it supports educational trips to Japan \norganized by a high school located in Harlem, New York City, \norganized by a high school located in Harlem, New York City, \nand volunteer employees of SMBC and JRI to participate in \nand volunteer employees of SMBC and JRI to participate in \nschool beautification programs. The foundation also provides \nschool beautification programs. The foundation also provides \nmatching gifts for SMBC employees. \nmatching gifts for SMBC employees. ", + "page_start": 14, + "page_end": 14, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "ARTS AND ENTERTAINMENT \n\nNew Artificial Intelligence Summit Series Begins With \nEnergy \n\n07/31/2024 \n\n (AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain \n\nAmerica’s global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative \n\nwith a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit \n\nSeries. \n\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington, \n\nD.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and \n\ntechnologists to address the challenges of AI’s energy consumption and develop solutions for a resilient and abundant \n\nenergy future. The event also aims to address the implications of AI and energy for national security and promote \n\npartnerships between AI and energy stakeholders. \n\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy \n\nefficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in \n\novercoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced \n\ncomputing, emergency response, environmental modeling, climate forecasting, and materials research. ", + "page_start": 0, + "page_end": 0, + "source_file": "news1.pdf" + }, + { + "text": "\n\nUSCHARGE ", + "page_start": 127, + "page_end": 127, + "source_file": "00-80T-80.pdf" + }, + { + "text": "**Security Key Lifecycle Manager**\nSecurity Key Lifecycle Manager (SKLM) centralizes, simplifies, and automates the encryption \nkey management process to help minimize risk and reduce operational costs of encryption \nkey management. \n\n**Serial-attached SCSI**\nSAS is a method that is used in accessing computer peripheral devices that employs a serial \n(1 bit at a time) means of digital data transfer over thin cables. The method is specified in the \nAmerican National Standard Institute standard called SAS. In the business enterprise, SAS is \nuseful for access to mass storage devices, particularly external hard disk drives. \n\n**Service Location Protocol**\nThe Service Location Protocol (SLP) is an internet service discovery protocol that enables \ncomputers and other devices to find services in a local area network (LAN) without prior \nconfiguration. It was defined in the request for change (RFC) 2608. \n\n**Small Computer System Interface (SCSI)**\nSmall Computer System Interface (SCSI) is an ANSI-standard electronic interface with which \npersonal computers can communicate with peripheral hardware, such as disk drives, tape \ndrives, CD-ROM drives, printers, and scanners, faster and more flexibly than with previous \ninterfaces. \n\n**Snapshot**\nA snapshot is an image backup type that consists of a point-in-time view of a volume. ", + "page_start": 806, + "page_end": 806, + "source_file": "sg247938.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Year Ended June 30,201220112010
Current :
Federal$36.178$36.799$28.342
State and local5.5226.2084.123
Foreign7.7068.3384.241
Total current49.40651.34536.706
Deferred :
Federal8.5775.6481.880
State and local503169( 311 )
Foreign( 439 )( 1.033 )839
Total deferred8.6414.7842.408
Total$58.047$56.129$39.114
", + "page_start": 26, + "page_end": 26, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "Plan (SERP) which constituted a plan curtailment. As a result, we \nrate were offset by the impact of state and local taxes which \nrecognized $3.1 million in prior service costs upon curtailment of \nincreased the rate by 2.5%. \nthe plan in the second quarter of fiscal 2012. We also incurred \nIn fiscal 2011, the impact of lower effective tax rates and higher \none-time expenses associated with our CEO transition of $1.4 \nincome in foreign jurisdictions favorably reduced our rate when \nmillion in fiscal 2012. The translation impact of our foreign \ncompared to the U.S. federal statutory rate by 1.0%. Further \nsubsidiaries into U.S. dollars had an unfavorable impact of $0.5 \nreducing our rate compared to the U.S federal statutory rate is a \nmillion on SD&A in the year. \npermanent dividend deduction benefit of 0.5%. These \nOperating income increased 11.7% to $168.4 million during \nreductions compared to the U.S. federal rate were offset by the \nfiscal 2012 from $150.8 million during 2011. As a percent of ", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_AIT_2012.pdf" + } + ] + }, + { + "references": { + "source_file": "news1.pdf", + "query": "What are some example of uses AI by the US departement of energy ?", + "target_page": 1, + "target_passage": "The Department of Energy (DOE) already uses AI in several areas including advanced computing, emergency response, environmental modeling, climate forecasting, and materials research", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "ARTS AND ENTERTAINMENT \n\nNew Artificial Intelligence Summit Series Begins With \nEnergy \n\n07/31/2024 \n\n (AI) continues to transform the United States and the world. To promote and inform rapid advancements in AI and maintain \n\nAmerica’s global competitiveness, the Special Competitive Studies Project (SCSP), a nonprofit and nonpartisan initiative \n\nwith a goal of making recommendations to strengthen America's long-term competitiveness in AI, announces the AI+ Summit \n\nSeries. \n\nThe series kicks off with the topic of energy. The AI + Energy Summit, scheduled for September 26, 2024, in Washington, \n\nD.C., will bring together policy makers, energy industry leaders, top government and academic energy researchers, and \n\ntechnologists to address the challenges of AI’s energy consumption and develop solutions for a resilient and abundant \n\nenergy future. The event also aims to address the implications of AI and energy for national security and promote \n\npartnerships between AI and energy stakeholders. \n\nAI and other emerging technologies can help the United States take the lead in energy areas including maximizing energy \n\nefficiencies, discovering new materials, and enabling new forms of power generation. AI also has a role to play in \n\novercoming energy challenges. The Department of Energy (DOE) already uses AI in several areas including advanced \n\ncomputing, emergency response, environmental modeling, climate forecasting, and materials research. ", + "page_start": 0, + "page_end": 0, + "source_file": "news1.pdf" + }, + { + "text": "SCSP’s recent “Action Plan for U.S. Leadership in Next-Generation Energy,” raises many issues related to AI and energy, \n\nincluding recommendations for the government to bring America forward. The AI+ Energy Summit will highlight these and \n\nother issues, and promote collaboration to solve problems. The stakes are high; if the U.S. falls short on energy, American \n\nadversaries could gain the upper hand in AI leadership, according to SCSP experts. \n\nVisit scsp.ai to learn more about the AI+Energy Summit and the SCSP’s Next-Generation Energy Action Plan. \n\nArticle Link \n\nhttps://about.newsusa.com/new-artificial-intelligence-summit-series-begins-with… ", + "page_start": 0, + "page_end": 0, + "source_file": "news1.pdf" + }, + { + "text": "**Other industry-specific tasks**\n\nThere are also thousands of successful AI applications used to solve specific problems for specific \nindustries or institutions. In a 2017 survey, one in five companies reported having incorporated \"AI\" in \nsome offerings or processes.[178] A few examples are energy storage, medical diagnosis, military \nlogistics, applications that predict the result of judicial decisions, foreign policy, or supply chain \nmanagement. \n\nAI applications for evacuation and disaster management are growing. AI has been used to investigate if \nand how people evacuated in large scale and small scale evacuations using historical data from GPS, \nvideos or social media. Further, AI can provide real time information on the real time evacuation \nconditions.[179][180][181] \n\nIn agriculture, AI has helped farmers identify areas that need irrigation, fertilization, pesticide treatments \nor increasing yield. Agronomists use AI to conduct research and development. AI has been used to predict \nthe ripening time for crops such as tomatoes, monitor soil moisture, operate agricultural robots, conduct \npredictive analytics, classify livestock pig call emotions, automate greenhouses, detect diseases and pests, \nand save water. \n\nArtificial intelligence is used in astronomy to analyze increasing amounts of available data and \napplications, mainly for \"classification, regression, clustering, forecasting, generation, discovery, and the \ndevelopment of new scientific insights.\" For example, it is used for discovering exoplanets, forecasting \nsolar activity, and distinguishing between signals and instrumental effects in gravitational wave \nastronomy. Additionally, it could be used for activities in space, such as space exploration, including the \nanalysis of data from space missions, real-time science decisions of spacecraft, space debris avoidance, \nand more autonomous operation. ", + "page_start": 11, + "page_end": 11, + "source_file": "wikipedia3.pdf" + }, + { + "text": "As we explore for and produce clean, affordable, abundant, American \nnatural gas, we provide an important solution to our nation’s energy \nchallenges and its quest for energy independence. With at least a 200- \nyear supply of natural gas located right here in the U.S., this versatile \nfuel can be used to not only heat homes, create electricity and meet \nAmerica’s transportation needs, but also to fuel the country’s future \nby creating jobs and stimulating local and national economies through \ninvestment and taxes. \n\nenergy development should be as small and temporary as possible. \nThese practices are continually evolving and further improving as \nChesapeake and the industry develop new innovative techniques and \napproaches to business. ", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "A 2024 Goldman Sachs Research Paper,*AI Data Centers and the Coming US Power Demand Surge*, \nfound \"US power demand (is) likely to experience growth not seen in a generation....\" and forecasts that, \nby 2030, US data centers will consume 8% of US power, as opposed to 3% in 2022, presaging growth for \nthe electrical power generation industry by a variety of means.[206] Data centers' need for more and more \nelectrical power is such that they might max out the electrical grid. The Big Tech companies counter that \nAI can be used to maximize the utilization of the grid by all.[207] \n\nIn 2024, the*Wall Street Journal*reported that big AI companies have begun negotiations with the US \nnuclear power providers to provide electricity to the data centers. In March 2024 Amazon purchased a \nPennsylvania nuclear-powered data center for $650 Million (US).[208] Nvidia CEO Jen-Hsun Huang said \nnuclear power is a good option for the data centers.[209] \n\nIn September 2024, Microsoft announced an agreement with Constellation Energy to re-open the Three \nMile Island nuclear power plant to provide Microsoft with 100% of all electric power produced by the \nplant for 20 years. Reopening the plant, which suffered a partial nuclear meltdown of its Unit 2 reactor in \n1979, will require Constellation to get through strict regulatory processes which will include extensive \nsafety scrutiny from the US Nuclear Regulatory Commission. If approved (this will be the first ever US \nre-commissioning of a nuclear plant), over 835 megawatts of power – enough for 800,000 homes – of ", + "page_start": 13, + "page_end": 13, + "source_file": "wikipedia3.pdf" + }, + { + "text": "**Power needs and environmental impacts**\n\nIn January 2024, the International Energy Agency (IEA) released*Electricity 2024, Analysis and Forecast*\n*to 2026*, forecasting electric power use.[203] This is the first IEA report to make projections for data \ncenters and power consumption for artificial intelligence and cryptocurrency. The report states that power \ndemand for these uses might double by 2026, with additional electric power usage equal to electricity \nused by the whole Japanese nation.[204] \n\nProdigious power consumption by AI is responsible for the growth of fossil fuels use, and might delay \nclosings of obsolete, carbon-emitting coal energy facilities. There is a feverish rise in the construction of \ndata centers throughout the US, making large technology firms (e.g., Microsoft, Meta, Google, Amazon) \ninto voracious consumers of electric power. Projected electric consumption is so immense that there is \nconcern that it will be fulfilled no matter the source. A ChatGPT search involves the use of 10 times the \nelectrical energy as a Google search. The large firms are in haste to find power sources – from nuclear \nenergy to geothermal to fusion. The tech firms argue that – in the long view – AI will be eventually \nkinder to the environment, but they need the energy now. AI makes the power grid more efficient and \n\"intelligent\", will assist in the growth of nuclear power, and track overall carbon emissions, according to \ntechnology firms.[205] ", + "page_start": 13, + "page_end": 13, + "source_file": "wikipedia3.pdf" + }, + { + "text": "**Applications**\n\nAI and machine learning technology is used in most of the essential applications of the 2020s, including: \nsearch engines (such as Google Search), targeting online advertisements, recommendation systems \n(offered by Netflix, YouTube or Amazon), driving internet traffic, targeted advertising (AdSense, \nFacebook), virtual assistants (such as Siri or Alexa), autonomous vehicles (including drones, ADAS and \nself-driving cars), automatic language translation (Microsoft Translator, Google Translate), facial \nrecognition (Apple's Face ID or Microsoft's DeepFace and Google's FaceNet) and image labeling (used \nby Facebook, Apple's iPhoto and TikTok). The deployment of AI may be overseen by a Chief automation \nofficer (CAO). ", + "page_start": 8, + "page_end": 8, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Artificial intelligent (AI) agents are software entities designed to \nperceive their environment, make decisions, and take actions \nautonomously to achieve specific goals. These agents can interact \nwith users, their environment, or other agents. AI agents are used \nin various applications, including virtual assistants, chatbots, \nindustrial \nautonomous vehicles, game-playing systems, and \nrobotics. AI agents operate within the constraints of their \nprogramming, available computational resources, and hardware \nlimitations. This means they are restricted to performing tasks \nwithin their defined scope and have finite memory and processing \ncapabilities. In real-world applications, AI agents often face time \nconstraints for decision-making and action execution. Many AI \nagents incorporate learning algorithms, enabling them to improve \ntheir performance over time through experience or training. Using \nmachine learning, AI agents can adapt to new situations and \noptimise their behaviour for their designated tasks.[175][176][177] ", + "page_start": 11, + "page_end": 11, + "source_file": "wikipedia3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
160.Alex McFarland : 7 Best Al for Math Tools, ( https :// www. unite. asibest - or - matly - tools / Archived ( https :// web. antchive. org / web / 2024 / 3011.1255 / https :// www. unlte. ail / best - toth - tocis /) 12. Sember 2024 at the Wayback Machind
161.Mathew Finio & Amanda Doxmie : IBM Think 2024 Primer, “ What is Artificial Intelligence ( A ) in Finance?” B Dec. 2023
162.M. Nocalas, J. Firsts ' Pensions Apeticumpean Persisons massione, \" Artificial Intellipencer Ask the Industry \" May June 2224 https :// widewscips : organism - thyracer - imposatpine emergence. organism - embryone - are regulation - wit
163.Congressional Research Service ( 20.59 ). Artificial Intelligence and National Security ( https :// f as. org / sgologocra / natesec / PHS : 178 pdf ) ( PDF ). Washirgizin, DC. Congressional Research Service PD - notice
164.Styusar, Vadym ( 20.5 ), Artificial intelligence as the basis of future control networks ( Preprint ) do : L0.120.40 / R5 :- 2.2. 30247 : 50087 ( frttps :// lbth. org / 10.120.40 / K2FRG.- 2.2. 30247.5007 ).
165.Irap, Amjad ( 2April 2024 ). “ Lawender ”. The AI machine : directing torae! toombing spree in Gout.” ( http :// www. 972mag. com / laxenseler.: al - stratell - arm5 - alazal ]. + FZT. ktagazone. Retrieved 5 April 2024.
166.Davies, Hanry McKernan, Betham, Sabbagh, Dun ( 1. December 2023 ) *, “ The Gosspel?, how tissue I user A to select bombing targets in Caspase? ( fitts :// www. hhequardian. com / wwithDDD2 ) deci ( DLI ). the gozgel - how - stratem - de - b - selecta
167.Marti, 3 Werner ( 10 August 2ED4 ). Tyrohnen haben den Kneg in der Uleraine revolutionier, doch sind emphytich authorsender – denhalls tollers sleep jetch autonom operieners? ( http :// www. rtc.). Wernationalicle - autonomy
168.Newssm, Gawin ; Weber, Shirley N, ( 5 Seppenther 2023 ): \" Descuber, Crider 9 : 122 : 27 : < underline > Newssm, Gaving , Greephrelled < underline > Criterial , Greather 2013 , Greather 2013
169.Pinaya, Walter H L.; Graham, Mark S.; Kerhor, Etcr Tubosia, Petru - Dankel, Dafflum, Zesticle, Petrahadez, Vigible, Salchcle, Pedto, Work, Jilla, Bal Colsia, Pedd F, Pizel, Adhara, ZE22, T, Senerative A for Medical Imaging : extendingh
170.GAffits. Errim, Metz, Caske ( CT. Banuary 2022 ), “ Adorengic Suid to Be Cleasing In ser SDSSSMillion in Serious A. I. Funding ”, (“ Itipp2 / Alwayshess GSNSEQLEDEDEDEDEDEDEDEDEDETEDETEECTEREONSQUREREINSENSNSTINEONSTINEONSTINEON
171.Lencer, Nate : Bases : Disease, Disease, Devalen, Jackker ( LT ) March 2022 ), “ AChysed Sheet to ARscaccords and TPAMexional ”, ( Mipsychites, Minordensplaccombers and electron - biologic heart feelings ”, ( Mipsychitres, Minorehensps
", + "page_start": 38, + "page_end": 38, + "source_file": "wikipedia3.pdf" + }, + { + "text": "**Sexuality**\n\nApplications of AI in this domain include AI-enabled menstruation and fertility trackers that analyze user \ndata to offer prediction,[138] AI-integrated sex toys (e.g., teledildonics),[139] AI-generated sexual \neducation content,[140] and AI agents that simulate sexual and romantic partners (e.g., Replika).[141] AI is \nalso used for the production of non-consensual deepfake pornography, raising significant ethical and legal \nconcerns.[142] \n\nAI technologies have also been used to attempt to identify online gender-based violence and online \nsexual grooming of minors.[143][144] ", + "page_start": 9, + "page_end": 9, + "source_file": "wikipedia3.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HNI_2003.pdf", + "query": "How can I contact Investor Relations of HON industries through email ?", + "target_page": 63, + "target_passage": "E-mail: investorrelations@honi.com", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "**Dear Shareholders:**\n\nWe, the members of the HON INDUSTRIES Board of Directors, believe that integrity is central to good corporate governance. This belief is \n\nreflected in the HON INDUSTRIES vision statement (shown on the back of this annual report), adopted many years ago. Our Vision statement \n\nrepresents much more than a traditional “mission,” and it goes much deeper than company policy. The beliefs and values represented in that \n\ndocument are the very foundation of our corporate culture, and guide the attitude and actions of every member, every day. \n\nFrom its beginnings, HON INDUSTRIES has sought to implement its vision through sound policies and practices, and by maintaining \n\na strong Board composed predominantly of outside directors. We are fully committed to executing our responsibilities, and we will continue to \n\nmaintain the company’s long-standing tradition of an independent, well-informed, active, and engaged Board of Directors. \n\nOur board meetings and procedures have been developed and refined to encourage open and informed communication. The company’s \n\naccounting policies have always been conservative and straightforward. The Board’s three committees — Audit; Human Resources and \n\nCompensation; Public Policy and Corporate Governance — have consisted entirely of non-management directors for many years. \n\nDuring 2003, we have given significant attention to the newly released rules emanating from the Sarbanes-Oxley Act of 2002 and the ", + "page_start": 60, + "page_end": 60, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**Nature of Operations** date. Equity securities are classified as available-for-sale and are stated \n\nHON INDUSTRIES Inc., with its subsidiaries (the “Company”), is a at current market value with unrealized gains and losses included as a \n\nprovider of office furniture and hearth products. Both industries are separate component of equity, net of any related tax effect. Debt securi- \n\nreportable segments; however, the Company’s office furniture business ties are classified as held-to-maturity and are stated at amortized cost. \n\nis its principal line of business. Refer to the Operating Segment The specific identification method is used to determine realized gains \n\nInformation note for further information. Office furniture products are and losses on the trade date. Short-term investments include municipal \n\nsold through a national system of dealers, wholesalers, mass merchan- bonds, money market preferred stock, and U.S. treasury notes. Long- \n\ndisers, warehouse clubs, retail superstores, end-user customers, and to term investments include U.S. government securities, municipal bonds, \n\nfederal and state governments. Dealer, wholesaler, and retail super- certificates of deposit, and asset- and mortgage-backed securities. \n\nstores are the major channels based on sales. Hearth products include ", + "page_start": 42, + "page_end": 42, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "New York Stock Exchange listing requirements — rules intended to improve corporate governance across the country. It is gratifying to report that \n\nHON INDUSTRIES governance practices were already in accord with the spirit of the rules. \n\nIt is an honor to serve as directors of HON INDUSTRIES. We are very proud to represent you, the shareholder, as we oversee the man- \n\nagement of this great company. Please be assured that we intend to remain vigilant and focused on good corporate governance. ", + "page_start": 60, + "page_end": 60, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**FOR FURTHER INFORMATION,**\n**PLEASE CONTACT**\n\n**Investor Relations**\n**Nissan Motor Co., Ltd.**\nGlobal Communications, CSR and IR Division \n17-1, Ginza 6-chome, Chuo-ku \nTokyo 104-8023, Japan \nphone: +81(0)3-5565-2334 \nfax: +81(0)3-3546-2669 \ne-mail: nissan-ir@mail.nissan.co.jp ", + "page_start": 111, + "page_end": 111, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
SCHEDULE OF QUARTERLY RESULTSINVESTOR RELATIONSCOMMON STOCK
Send inquiries to :HON INDUSTRIES common stock tradesThe Company operates on a fiscal year ending
Investor Relationson the New York Stock Exchange under theon the Saturday nearest December 31. Quar -
HON INDUSTRIES Inc.symbol : HNI. Stock price quotations can beterly results are typically announced within 25
414 East Third Streetfound in major daily newspapers and Thedays after the end of each quarter, and audited
Muscatine, IA 52761Wall Street Journal.results are typically announced within 40 days
Telephone : 56 ( 3.264.7400after year - end.Fax : 563.264.7655
TRANSFER AGENTFISCAL zoo4E - mail : investorrelations @ honi. com
Shareholders may report a change of address or make inquiries by writing or calling :QUARTER - END DATESCORPORATE HEADQUARTERS
1st Quarter : Saturday, April 3HON INDUSTRIES Inc.Computershare Investor Services, LLC
2nd Quarter : Saturday, July 3414 East Third Street2 North LaSalle Street
3rd Quarter : Saturday, October 2P. O. Box 1109Chicago, IL 60602
4th Quarter : Saturday, January 1Muscatine, IA 52761 - 0071Telephone : 312.588.4991
AN NUAL MEETINGTelephone : 56 ( 3.264.7400The Company ’ s annual shareholders ’ meeting
Fax : 563.264.7217will be held at 10 : 30 a. m. on May 4.2004, atWebsite : www. honi. com
the Holiday Inn, Highways 61 & 38 North,Muscatine, Iowa. Shareholders and otherINDEPENDENT PUBLIC
interested investors are encouraged to attendPricewaterhouseCoopers LLPthe meeting.
One North Wacker DriveChicago, IL 60606
", + "page_start": 62, + "page_end": 62, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**To the Board of Directors and Shareholders, HON INDUSTRIES Inc.:**\n\nIn our opinion, the accompanying consolidated balance sheets and the related consolidated statements of income, shareholders’ equity, and cash \n\nflows present fairly, in all material respects, the financial position of HON INDUSTRIES Inc. and its subsidiaries at January 3, 2004, and \n\nDecember 28, 2002, and the results of their operations and their cash flows for the fiscal years ended January 3, 2004, and December 28, 2002, \n\nin conformity with accounting principles generally accepted in the United States of America. These financial statements are the responsibility of \n\nthe Company’s management; our responsibility is to express an opinion on these financial statements based on our audits. We conducted our \n\naudits of these statements in accordance with auditing standards generally accepted in the United States of America, which require that we plan \n\nand perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes \n\nexamining, on a test basis, evidence supporting the amounts and disclosures in the financial statements, assessing the accounting principles used \n\nand significant estimates made by management, and evaluating the overall financial statement presentation. We believe that our audits provide a ", + "page_start": 57, + "page_end": 57, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**To the Board of Directors and Shareholders of HON INDUSTRIES Inc.**\n\nWe have audited the accompanying consolidated balance sheets of HON INDUSTRIES Inc. and Subsidiaries as of December 29, 2001, \n\nDecember 30, 2000*, and January 1, 2000*, and the related consolidated statements of income, shareholders equity, and cash flows for each of \n\nthe fiscal years then ended. These financial statements are the responsibility of the Company’s management. Our responsibility is to express an \n\nopinion on these financial statements based on our audits. \n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States. Those standards require that \n\nwe plan and perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit \n\nincludes examining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing \n\nthe accounting principles used and significant estimates made by management, as well as evaluating the overall financial statement presentation. \n\nWe believe that our audits provide a reasonable basis for our opinion. \n\nIn our opinion, the consolidated financial statements referred to above present fairly, in all material respects, the financial position of \n\nHON INDUSTRIES Inc. and Subsidiaries as of December 29, 2001, December 30, 2000*, and January 1, 2000*, and the results of its operations ", + "page_start": 58, + "page_end": 58, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**INVESTOR RELATIONS INQUIRIES SHOULD** **ANNUAL REPORT ON FORM 10-K**\n\n**BE DIRECTED TO:** **The Applied Industrial Technologies, Inc.**\n**Annual Report on Form 10-K for the fiscal**\n**MARK O. EISELE**\n**year ended June 30, 2012, including the**\nVice President – Chief Financial Officer \n**financial statements and schedules thereto,**\n & Treasurer \n**is available at our website at**\nApplied Industrial Technologies \n**www.Applied.com. It is also available**\n1 Applied Plaza \n**without charge upon written request to the**\nCleveland, OH 44115-5014 \n**Vice President – Chief Financial Officer &**\nTelephone: 216/426-4000, Fax: 216/426-4845 \n**Treasurer at the address shown.**\n\n**ANNUAL MEETING**\nThe Annual Meeting of Shareholders will be held \nat 10:00 a.m., Tuesday, October 23, 2012, at the \nCorporate Headquarters of Applied Industrial \nTechnologies, 1 Applied Plaza, East 36th and \nEuclid Avenue, Cleveland, Ohio 44115. ", + "page_start": 46, + "page_end": 46, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "our rapid continuous improvement (RCI) programs, in 1992. It announced in February 2003, was an important part of \n\nis not only a process to drive out cost, it is a powerful tool to this process. \n\nengage every member every day in making choices to improve Our office furniture and hearth businesses are healthy \n\nthe value we provide to our customers. and well-positioned for growth; still we continue to face a com- \n\npetitive business environment. We are confident of our financial \n\nsecurity, and certain that our transition to becoming a market- **E N H A N C I N G C U L T U R E A N D C A P A B I L I T I E S**\n\nOur values are simple yet powerful. They are as relevant today driven, operationally excellent company will continue to en- \n\nas they were when the company was founded 60 years ago. hance shareholder value. The transformation continues. We will \n\nOur member-owner culture of shared responsibility and shared be seeking shareholder approval, in early May 2004, to change \n\nreward engages all members in the ongoing business improve- the name of HON INDUSTRIES to HNI Corporation, drawing ", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**Corporate Headquarters**\nThe Hartford Financial \nServices Group, Inc. \n690 Asylum Avenue \nHartford, Connecticut 06115 \n860-547-5000 \n\n**Internet Address**\nhttp://www.thehartford.com \n\n**Annual Meeting**\nShareholders are cordially invited to attend The Hartford’s \nAnnual Meeting of Shareholders, which will be held on \nThursday, April 18, 2002 at 9:00 a.m. in the Wallace Stevens \nTheater at The Hartford Financial Services Group, Inc.’s \nhome office at 690 Asylum Avenue, Hartford, Connecticut. \nShareholders of record as of February 28, 2002 are entitled \nto notice of, and to vote at, the Annual Meeting. \n\n**Form 10-K and Other Information**\nShareholders may receive, without charge, a copy of \nThe Hartford’s Form 10-K (without exhibits) filed with the \nSecurities and Exchange Commission for the year ended \nDecember 31, 2001 by contacting 1-888-FACT-HIG. Forms \n10-Q, press releases, and other shareholder communications \nare also available through this toll-free number. \n\n**Transfer Agent/Shareholder Records**\nFor information or assistance regarding stock records, \ndividend checks or stock certificates, please contact \nThe Hartford’s transfer agent: \n\nThe Bank of New York \nShareholder Relations Department–11E \nP.O. Box 11258 \nChurch Street Station \nNew York, NY 10286 \n800-254-2823 ", + "page_start": 37, + "page_end": 37, + "source_file": "NYSE_HIG_2001.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HNI_2003.pdf", + "query": "What explains the decrease in net sales of HON industries in 2002 ?", + "target_page": 34, + "target_passage": "The decrease in 2002 was due to the decline in the office furniture market due to unstable economic conditions and the deletion of less profitable product lines in the hearth products segment", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "‚*2002:*The economic slowdown which began in 2001 continued to negatively impact the portion of our \nbusiness servicing the manufacturing sector and non-residential construction industry during 2002. \nVolumes attributable to manufacturing and construction activity continued to weaken during 2002. \n\nThe weakness in our business attributable to the economic slowdown was partially oÅset by an increase \nin recycling commodity prices in the early part of 2002. \n\nDespite the weakness we experienced in the aspects of our business noted above, our internal growth \nfrom core operations for 2002 was 3.0%. During 2002, we secured several long-term franchise and \nmunicipal contracts. We also beneÑted from the geographic mix of our business which favors high- \ngrowth markets. \n\n‚*2005 Outlook:*We anticipate internal growth from core operations to be in the range of 4.0% to 4.5% \nduring 2005 assuming no deterioration or improvement in the overall economy from that experienced \nduring the fourth quarter of 2004. However, our price and volume growth may remain Öat or may \ndecline in 2005 depending upon economic conditions and our success in implementing pricing \ninitiatives. \n\n*Cost of Operations.*Cost of operations was $1,714.4 million, $1,605.4 million and $1,472.9 million, or, \nas a percentage of revenue, 63.3%, 63.8% and 62.3%, for the years ended December 31, 2004, 2003 and 2002, \nrespectively. ", + "page_start": 42, + "page_end": 42, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**Nature of Operations** date. Equity securities are classified as available-for-sale and are stated \n\nHON INDUSTRIES Inc., with its subsidiaries (the “Company”), is a at current market value with unrealized gains and losses included as a \n\nprovider of office furniture and hearth products. Both industries are separate component of equity, net of any related tax effect. Debt securi- \n\nreportable segments; however, the Company’s office furniture business ties are classified as held-to-maturity and are stated at amortized cost. \n\nis its principal line of business. Refer to the Operating Segment The specific identification method is used to determine realized gains \n\nInformation note for further information. Office furniture products are and losses on the trade date. Short-term investments include municipal \n\nsold through a national system of dealers, wholesalers, mass merchan- bonds, money market preferred stock, and U.S. treasury notes. Long- \n\ndisers, warehouse clubs, retail superstores, end-user customers, and to term investments include U.S. government securities, municipal bonds, \n\nfederal and state governments. Dealer, wholesaler, and retail super- certificates of deposit, and asset- and mortgage-backed securities. \n\nstores are the major channels based on sales. Hearth products include ", + "page_start": 42, + "page_end": 42, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "As we celebrate our 60th year, HON INDUSTRIES has seen leaner, more focused, and have more clearly defined brands \n\nmuch change. The industry has changed. The world has than ever before. Our challenge is to grow, aggressively and \n\nchanged. Our business has changed. What has not changed profitably, through market-driven solutions while maintain- \n\nare the culture and values on which we were founded: integ- ing focus on what we do best — operational excellence. Our ", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "*Thousands of*\n*U.S. dollars*\n2004 \n*Mar. 31, 2005*\n\n*Millions of yen*\n\n2004 \n*Mar. 31, 2005* 2003 \n*Mar. 31, 2004* 2002 \n*Mar. 31, 2003* *For the years ended*\n\nSales proceeds....................................................................................................................................................................... ¥2,032 \n1,225 \nAggregate gain....................................................................................................................................................................... \n(13) \nAggregate loss ....................................................................................................................................................................... \n$18,991 \n11,449 \n(121) \n¥4,048 \n1,500 \n(32) ¥12,770 \n3,446 \n(3,167) \n\nc) The redemption schedule for securities with maturity dates classified as other securities and held-to-maturity debt securities as of March 31, ", + "page_start": 89, + "page_end": 89, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**To the Board of Directors and Shareholders, HON INDUSTRIES Inc.:**\n\nIn our opinion, the accompanying consolidated balance sheets and the related consolidated statements of income, shareholders’ equity, and cash \n\nflows present fairly, in all material respects, the financial position of HON INDUSTRIES Inc. and its subsidiaries at January 3, 2004, and \n\nDecember 28, 2002, and the results of their operations and their cash flows for the fiscal years ended January 3, 2004, and December 28, 2002, \n\nin conformity with accounting principles generally accepted in the United States of America. These financial statements are the responsibility of \n\nthe Company’s management; our responsibility is to express an opinion on these financial statements based on our audits. We conducted our \n\naudits of these statements in accordance with auditing standards generally accepted in the United States of America, which require that we plan \n\nand perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes \n\nexamining, on a test basis, evidence supporting the amounts and disclosures in the financial statements, assessing the accounting principles used \n\nand significant estimates made by management, and evaluating the overall financial statement presentation. We believe that our audits provide a ", + "page_start": 57, + "page_end": 57, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**Net Income**\n\nNet non-operating expenses totaled ¥5.5 billion, ¥9.7 \n\nbillion lower than last year. This was primarily due to a ¥5.3 \n\nbillion decrease in financial costs and a ¥5.3 billion \n\nincrease in equity in earnings of unconsolidated \n\nsubsidiaries and affiliates, thanks mainly to Renault. Net \n\nextraordinary losses totaled ¥62.5 billion, ¥10.7 billion \n\nlower than last year, mainly due to the sale of the site of \n\nthe former Murayama plant. Net income before taxes came \n\nto ¥793.2 billion. Income taxes totaled ¥258.0 billion, with \n\nan effective consolidated tax rate of 33 percent. Minority \n\ninterests amounted to ¥22.9 billion, mainly from Yulon \n\nNissan Motor. As a result, net income reached ¥512.3 \n\nbillion, an increase of ¥8.6 billion. ", + "page_start": 14, + "page_end": 14, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "*Millions of yen*\n\nSales \nFiscal year 2003*(For the year ended Mar. 31, 2004)*\nFinancing \nNet sales.................................................................................... ¥7,063,230 ¥365,989 \nCost of sales........................................................................... \n212,116 \nGross profit .............................................................................. \n153,873 \nOperating income............................................................... \n64,810 \nOperating income as a percentage of net sales......... \n17.7% \nNet financial cost................................................................ \n(30) \nIncome before income taxes and \nminority interests.............................................................. \n64,984 \nNet income............................................................................... ¥ 465,329 ¥ 38,338 \nTotal net financial cost ................................................... ¥ (15,669) ¥ \n\nAutomobile and \nEliminations Consolidated \ntotal \n\n¥7,429,219 \n5,310,172 \n2,119,047 \n824,855 \n11.1% \n(15,699) 5,098,056 \n1,965,174 \n760,045 \n10.8% \n(15,669) \n\n671,513 \n\n736,497 \n¥ 503,667 \n(30) ¥ (15,699) \n\nInterest on lease obligation ........................................ \nIntersegment elimination.............................................. \nNet financial cost for segment ................................ (4,603) \n(5,322) \n(5,744) (20) \n— \n(10) (4,623) \n(5,322) \n(5,754) ", + "page_start": 98, + "page_end": 98, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "higher sales levels without a commensurate increase in SD&A \n\n(representing 0.2% of the improvement). \n\nThe Fluid Power Businesses segment operating income decreased \n\nslightly to 9.2% in fiscal 2012 from 9.5% in fiscal 2011. This \n\nreduction is attributable to lower net gross profit margins \n\nprimarily from one vertical market within one of our Fluid Power \n\nBusinesses (representing 0.5% of the reduction). Lower SD&A ", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "**To the Board of Directors and Shareholders of HON INDUSTRIES Inc.**\n\nWe have audited the accompanying consolidated balance sheets of HON INDUSTRIES Inc. and Subsidiaries as of December 29, 2001, \n\nDecember 30, 2000*, and January 1, 2000*, and the related consolidated statements of income, shareholders equity, and cash flows for each of \n\nthe fiscal years then ended. These financial statements are the responsibility of the Company’s management. Our responsibility is to express an \n\nopinion on these financial statements based on our audits. \n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States. Those standards require that \n\nwe plan and perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit \n\nincludes examining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing \n\nthe accounting principles used and significant estimates made by management, as well as evaluating the overall financial statement presentation. \n\nWe believe that our audits provide a reasonable basis for our opinion. \n\nIn our opinion, the consolidated financial statements referred to above present fairly, in all material respects, the financial position of \n\nHON INDUSTRIES Inc. and Subsidiaries as of December 29, 2001, December 30, 2000*, and January 1, 2000*, and the results of its operations ", + "page_start": 58, + "page_end": 58, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "our rapid continuous improvement (RCI) programs, in 1992. It announced in February 2003, was an important part of \n\nis not only a process to drive out cost, it is a powerful tool to this process. \n\nengage every member every day in making choices to improve Our office furniture and hearth businesses are healthy \n\nthe value we provide to our customers. and well-positioned for growth; still we continue to face a com- \n\npetitive business environment. We are confident of our financial \n\nsecurity, and certain that our transition to becoming a market- **E N H A N C I N G C U L T U R E A N D C A P A B I L I T I E S**\n\nOur values are simple yet powerful. They are as relevant today driven, operationally excellent company will continue to en- \n\nas they were when the company was founded 60 years ago. hance shareholder value. The transformation continues. We will \n\nOur member-owner culture of shared responsibility and shared be seeking shareholder approval, in early May 2004, to change \n\nreward engages all members in the ongoing business improve- the name of HON INDUSTRIES to HNI Corporation, drawing ", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_HNI_2003.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_ATRI_2003.pdf", + "query": "What operations were discontinued in 1997 by Atrion Corp ?", + "target_page": 17, + "target_passage": "During 1997, the Company sold all of its natural gas operations. ", + "chunk_present": { + "presence": true, + "index": 7 + } + }, + "top_chunk": [ + { + "text": "**C o r p o r a t e O f f i c e :**\nAtrion Corporation \nOne Allentown Parkway \nAllen, Texas 75002 \n(972) 390-9800 \nwww.atrioncorp.com \n\n**R e g i s t r a r a n d T r a n s f e r A g e n t**\nAmerican Stock Transfer and Trust Company \n59 Maiden Lane \nNew York, New York 10007 \n\n**F o r m 1 0 - K**\nA copy of the Company’s 2003 Annual Report on Form 10-K, as filed with the Securities and Exchange \nCommission, may be obtained by any stockholder without charge by written request to: \n\n*Corporate Secretary*\n*Atrion Corporation*\n*One Allentown Parkway*\n*Allen, Texas 75002*", + "page_start": 30, + "page_end": 30, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "S U M M A R Y O F S I G N I F I C A N T A C C O U N T I N G P O L I C I E S 1 \n\nAtrion Corporation designs, develops, manufactures and markets products primarily for the medical and health care industry. The Company markets its \nproducts throughout the United States and internationally. The Company’s customers include hospitals, distributors, and other manufacturers. As of \nDecember 31, 2003, the principal subsidiaries of the Company through which it conducted its operations were Atrion Medical Products, Inc. (“Atrion \nMedical Products”), Halkey-Roberts Corporation (“Halkey-Roberts”) and Quest Medical, Inc. (“Quest Medical”). \n\n**P R I N C I P L E S O F C O N S O L I D A T I O N**\nThe consolidated financial statements include the accounts of Atrion Corporation and its subsidiaries (the “Company”). All significant intercompany \ntransactions and balances have been eliminated in consolidation. \n\n**F A I R V A L U E**\nThe carrying amounts of cash and cash equivalents, accounts receivable and accounts payable approximate fair value due to the short-term nature of these \nitems. The carrying amount of debt approximates fair value as the interest rate is tied to market rates. ", + "page_start": 13, + "page_end": 13, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "**Discontinued Operations**\nA discontinued operation is a component of our business that has \noperations and cash flows that are clearly distinguished from the rest of \nRogers and: \n(cid:129) represents a separate major line of business \n(cid:129) is part of a single coordinated plan to dispose of a separate major \nline of business, or \n(cid:129) is a subsidiary we have acquired with the intention to re-sell. \n\nWhen we classify a component as a discontinued operation, we restate \nour comparative income and comprehensive income as though the \noperation had been discontinued from the start of the comparative \nyear. \n\nSee note 6 for information about discontinued operations. \n\n**New Accounting Pronouncements Effective in 2013**\nWe adopted the following accounting changes \nconsolidated financial statements on January 1, 2013. \n(cid:129) IFRS 10, Consolidated Financial Statements \n(cid:129) IFRS 11, Joint Arrangements \n(cid:129) IFRS 12, Disclosure of Interest in Other Entities \n(cid:129) IFRS 13, Fair Value Measurement \n(cid:129) IAS 19, Employee Benefits (2011) \n(cid:129) IAS 28, Investments in Associates and Joint Ventures \n(cid:129) IAS 36, Impairment of Assets \n\nfor our 2013 ", + "page_start": 104, + "page_end": 104, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "To the Stockholders and the Board of Directors of Atrion Corporation: \n\nWe have audited the accompanying consolidated balance sheets of Atrion Corporation (a Delaware corporation) and Subsidiaries as of December 31, 2003 \nand 2002, and the related consolidated statements of income, changes in stockholders’ equity and cash flows for the years then ended. These financial \nstatements are the responsibility of the Company’s management. Our responsibility is to express an opinion on these financial statements based on our audit. \nThe financial statements of Atrion Corporation and Subsidiaries as of and for the year in the period ended December 31, 2001, were audited by other auditors \nwho have ceased operations. Those auditors expressed an unqualified opinion on those financial statements in their report dated February 25, 2002. \n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States of America. Those standards require that we plan \nand perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes \nexamining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting \nprinciples used and significant estimates made by management as well as evaluating the overall financial statement presentation. We believe that our audits \nprovide a reasonable basis for our opinion. ", + "page_start": 24, + "page_end": 24, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "**D I S C O N T I N U E D O P E R A T I O N S**\nDuring 1997, the Company sold all of its natural gas operations. The financial statements presented herein reflect the Company’s natural gas operations as \ndiscontinued operations for all periods presented. The financial statements also reflect an after-tax gain on disposal of these discontinued operations of \n$ .2 million, or $ .10 per basic and $ .09 per diluted share, in both 2003 and 2002, and $5.5 million, or $2.70 per basic and $2.42 per diluted share, in 2001. \n\nIn addition to the initial consideration received in 1997 upon the sale of the natural gas operations, certain annual contingent deferred payments of up to \n$250,000 per year were to be paid to the Company over an eight-year period which began in 1999, with the amount paid each year to be dependent upon \nrevenues received by the purchaser from certain gas transportation contracts. The Company received deferred payments of $250,000 each, before tax, from \nthe purchaser in April 2003, 2002 and 2001 which are reflected in each year as a gain from discontinued operations of $165,000, net of tax. The 2001 \ngain also includes a $5,327,000 non-cash gain from reversal of a reserve established when the Company disposed of its natural gas operations in 1997. \nThis reversal in the third quarter of 2001 followed the resolution of an outstanding contingency related to the sale of those assets. ", + "page_start": 26, + "page_end": 26, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "1,868 \n998 \n477 \nNOTE 6: DISCONTINUED OPERATIONS \n\nOperating revenue \nOperating costs \nRestructuring, acquisition and other expenses \n3,343 \n15 \n\n3,358 \n\nLoss before income taxes \nIncome tax recovery \n162 \n183 \nLoss from discontinued operations for the year \n\n345 \n6 \n\nWe discontinued our Video segment in the second quarter of 2012 and \nreported the Video results of operations as discontinued operations at \nthat time. \n351 \n\n784 \n264 \n276 \n296 \n\nThe Video segment did not have any results from discontinued \noperations \nliabilities as at \nDecember 31, 2013 and 2012. Cash flows from operating activities for \nthe segment for 2013 were nil (2012 – $2 million). The Video segment \ndid not have any cash flows from investing or financing activities for the \nyears ended December 31, 2013 and 2012. \n\n1,620 \nin 2013 or any significant assets or \n**(117)** (123) \n\n**$ 12,706** $ 12,486 \n\n**2013** 2012 \n\n**$ 1,541**\n**190**\n**4,126** $ 1,605 \n173 \n4,138 ", + "page_start": 106, + "page_end": 106, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "As discussed above, the financial statements of Atrion Corporation and Subsidiaries as of December 31, 2001, and for the year then ended were audited by \nother auditors who have ceased operations. As described in Note 2, these financial statements have been revised to include the transitional disclosures required \nby Statement of Financial Accounting Standards No. 142, Goodwill and Other Intangible Assets, which was adopted by the Company as of January 1, 2002. Our \naudit procedures with respect to the disclosures in Note 2 with respect to 2001 included agreeing the previously reported net income to the previously issued \nfinancial statements and the adjustments to reported net income representing amortization expense (including any related tax effects) recognized in those \nperiods related to goodwill to the Company’s underlying records obtained from management. We also tested the mathematical accuracy of the reconciliation \nof adjusted net income to reported net income, and the related income-per-share amounts. In our opinion, the disclosures for 2001 in Note 2 are appropriate. \nHowever, we were not engaged to audit, review, or apply any procedures to the 2001 financial statements of the Company other than with respect to such \ndisclosures and, accordingly, we do not express an opinion or any other form of assurance on the 2001 financial statements taken as a whole. ", + "page_start": 24, + "page_end": 24, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "3 D I S C O N T I N U E D O P E R A T I O N S \n\nDuring 1997, the Company sold all of its natural gas operations. The consolidated financial statements presented herein reflect the Company’s natural gas \noperations as discontinued operations for all periods presented. The consolidated financial statements reflect a gain on disposal of these discontinued \noperations of $165,000 in 2003 and 2002, and $5.5 million in 2001. These amounts are net of income tax expense of $85,000 in 2003 and 2002, and \ninclude an income tax benefit of $5.1 million in 2001. \n\nIn addition to the initial consideration received in 1997 upon the sale of the natural gas operations, certain annual contingent deferred payments of up to \n$250,000 per year were to be paid to the Company over an eight-year period which began in 1999, with the amount paid each year to be dependent upon \nrevenues received by the purchaser from certain gas transportation contracts. The Company received deferred payments of $250,000 each, before tax, from \nthe purchaser in April 2003, 2002 and 2001 which are reflected in each year as a gain from discontinued operations of $165,000, net of tax. The 2001 \ngain also includes a $5.3 million non-cash gain from reversal of a reserve established when the Company disposed of its natural gas operations in 1997. \nThis reversal in the third quarter of 2001 followed the resolution of an outstanding contingency related to the sale of those assets. ", + "page_start": 16, + "page_end": 16, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "**B O A R D O F D I R E C T O R S**\n\nEmile A. Battat \n*Chairman of the Board and President*\n*Atrion Corporation*\n\nRichard O. Jacobson \n*Chairman of the Board*\n*Jacobson Companies*\n*Des Moines, Iowa*\n\nJohn H. P. Maley \n*Chairman of the Board*\n*Compex Technologies, Inc.*\n*Minneapolis, Minnesota*\n\nHugh J. Morgan, Jr. \n*Private Investor, Former Chairman of the Board*\n*National Bank of Commerce of Birmingham*\n*Birmingham, Alabama*\n\nRoger F. Stebbing \n*President and Chief Executive Officer*\n*Stebbing and Associates, Inc.*\n*Signal Mountain, Tennessee*\n\nJohn P. Stupp, Jr. \n*President*\n*Stupp Bros., Inc.*\n*St. Louis, Missouri*", + "page_start": 29, + "page_end": 29, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "The results of the Golden Nugget Subsidiaries, Online and MGM Grand Australia \nare classified as discontinued operations in the accompanying consolidated \nstatements of income for all periods presented. Net revenues of discontinued \noperations were $45 million, $231 million and $222 million, respectively, for the \nyears ended December 31, 2004, 2003 and 2002. Included in income from \ndiscontinued operations is an allocation of interest expense based on the ratio of the \nnet assets of the discontinued operations to the total consolidated net assets and \ndebt of the Company. Interest allocated to discontinued operations was $2 million, \n$9 million and $9 million for the years ended December 31, 2004, 2003 and 2002, \nrespectively. Included in discontinued operations for the year ended December 31, \n2003 is a loss on disposal of Online of $7 million relating primarily to \nunrecoverable costs of computer hardware and software. Included in the tax benefit \nfrom discontinued operations for the year ended December 31, 2003 is $2 million \nof previously unrecognized tax benefits relating to prior year operating losses of \nOnline. Included in discontinued operations for the year ended December 31, \n2004 is a gain on the sale of the Golden Nugget Subsidiaries of $8 million and a \ngain on sale of the MGM Grand Australia Subsidiaries of $74 million. ", + "page_start": 62, + "page_end": 62, + "source_file": "NYSE_MGM_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_ATRI_2003.pdf", + "query": "How much share of Atrion's revenues did its major customer representin in 2003 ? ", + "target_page": 21, + "target_passage": "The Company had one major customer which represented approximately $9.1 million (14.4 percent", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "Our financial performance earned recognition from*Investors Business Daily*, which ranked Atrion sixth \n\non its list of Market-Leading Medical Stocks in November 2003. During the year, our stock price more than \n\ndoubled, ending the year at $45.44, up from $22.50 at year-end 2002. Over the last five years, our stock price \n\nhas increased by 468 percent. ", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "S U M M A R Y O F S I G N I F I C A N T A C C O U N T I N G P O L I C I E S 1 \n\nAtrion Corporation designs, develops, manufactures and markets products primarily for the medical and health care industry. The Company markets its \nproducts throughout the United States and internationally. The Company’s customers include hospitals, distributors, and other manufacturers. As of \nDecember 31, 2003, the principal subsidiaries of the Company through which it conducted its operations were Atrion Medical Products, Inc. (“Atrion \nMedical Products”), Halkey-Roberts Corporation (“Halkey-Roberts”) and Quest Medical, Inc. (“Quest Medical”). \n\n**P R I N C I P L E S O F C O N S O L I D A T I O N**\nThe consolidated financial statements include the accounts of Atrion Corporation and its subsidiaries (the “Company”). All significant intercompany \ntransactions and balances have been eliminated in consolidation. \n\n**F A I R V A L U E**\nThe carrying amounts of cash and cash equivalents, accounts receivable and accounts payable approximate fair value due to the short-term nature of these \nitems. The carrying amount of debt approximates fair value as the interest rate is tied to market rates. ", + "page_start": 13, + "page_end": 13, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "**We manage our assets and resources carefully.**\n\nOur financial strategy centers on building the strength and stability that will position our company for \n\nongoing growth. We approach the management of our resources with discipline and diligence, striking the \n\nbalance that allows us to accomplish our objectives: Funding the current needs of the business, maintaining a \n\nEBITDA Per Diluted Share From \nContinuing Operations(a) strong financial foundation, and investing in the resources, technology and assets that will ensure operating \n\nefficiency and fuel future growth. The soundness of this strategy was reflected once again in our financial \n\nresults for 2003. \n\nFor the fifth consecutive year, Atrion’s earnings per diluted share from continuing operations increased \n$7 \n\nby more than 15 percent, rising from $2.18 in 2002 to $2.66 in 2003, a 22 percent improvement. In light of \n6 \nthe economic pressures which have challenged virtually every business in recent years, we view five \n5 \nconsecutive years of EPS growth—ranging from 16 percent to over 50 percent—as a sign of solid financial \n\n4 strength and a testament to the viability of our strategy. Including a gain from discontinued operations of $ .09 \n\nper share, net income totaled $2.75 per diluted share for 2003. \n3 \n$2.70 \nRevenues for 2003 increased five percent to $62.8 million, from $59.5 million in the prior year. Return \n2 \n\n1 ", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "R E V E N U E S F R O M M A J O R C U S T O M E R S 9 \n\nThe Company had one major customer which represented approximately $9.1 million (14.4 percent), $7.4 million (12.4 percent) and $11.0 million \n(19.1 percent) of the Company’s operating revenues during the years 2003, 2002 and 2001, respectively. ", + "page_start": 20, + "page_end": 20, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "**C o r p o r a t e O f f i c e :**\nAtrion Corporation \nOne Allentown Parkway \nAllen, Texas 75002 \n(972) 390-9800 \nwww.atrioncorp.com \n\n**R e g i s t r a r a n d T r a n s f e r A g e n t**\nAmerican Stock Transfer and Trust Company \n59 Maiden Lane \nNew York, New York 10007 \n\n**F o r m 1 0 - K**\nA copy of the Company’s 2003 Annual Report on Form 10-K, as filed with the Securities and Exchange \nCommission, may be obtained by any stockholder without charge by written request to: \n\n*Corporate Secretary*\n*Atrion Corporation*\n*One Allentown Parkway*\n*Allen, Texas 75002*", + "page_start": 30, + "page_end": 30, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "To the Stockholders and the Board of Directors of Atrion Corporation: \n\nWe have audited the accompanying consolidated balance sheets of Atrion Corporation (a Delaware corporation) and Subsidiaries as of December 31, 2003 \nand 2002, and the related consolidated statements of income, changes in stockholders’ equity and cash flows for the years then ended. These financial \nstatements are the responsibility of the Company’s management. Our responsibility is to express an opinion on these financial statements based on our audit. \nThe financial statements of Atrion Corporation and Subsidiaries as of and for the year in the period ended December 31, 2001, were audited by other auditors \nwho have ceased operations. Those auditors expressed an unqualified opinion on those financial statements in their report dated February 25, 2002. \n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States of America. Those standards require that we plan \nand perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes \nexamining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting \nprinciples used and significant estimates made by management as well as evaluating the overall financial statement presentation. We believe that our audits \nprovide a reasonable basis for our opinion. ", + "page_start": 24, + "page_end": 24, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "**Note 11. Major Customers**\n\nThe Company has one major customer and relationship that is a significant source of revenue. In 2003, as during the \npast number of years, the Company's relationship with Sprint continued to increase, due to growth in the PCS business \nsegment. Approximately 61.2% of total revenues in 2003 were generated by or through Sprint and its customers using \nthe Company's portion of Sprint’s nationwide PCS network. This was compared to 57.6% in 2002, and 47.1% of total \nrevenue in 2001. No other customer relationship on a stand-alone basis generates more than 2.5% of the Company’s \ntotal revenue for 2003, 2002 and 2001. ", + "page_start": 34, + "page_end": 34, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "In recent years, the economic climate has presented significant \nchallenges to growth—and, in some cases, survival—for American \nbusinesses. The companies that have fared well are those with solid \nfinancial foundations and sound growth strategies that provide a \nmeasure of protection against the changing winds of the economy. \nAtrion is one of those companies. For the past five years, we have \nproduced earnings per share growth of more than 15 percent each \nyear. Despite fluctuations in our markets and product demand, we \nhave continued to return value to our stockholders through strong \nearnings growth, year after year. As a leading provider of medical \ndevices and components to niche markets in the health care \nindustry, we are committed to doing everything we can to continue \nthat level of performance. ", + "page_start": 1, + "page_end": 1, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "*Revenue.*Revenue was $2,708.1 million, $2,517.8 million and $2,365.1 million for the years ended \nDecember 31, 2004, 2003 and 2002, respectively. Revenue increased by $190.3 million, or 7.6%, from 2003 to ", + "page_start": 41, + "page_end": 41, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "Gross profit was $22.2 million in 2003, compared with $20.3 million in 2002 and $21.8 million in 2001. The Company’s gross profit in 2003 was 35 \npercent of revenues compared with 34 percent of revenues in 2002 and 38 percent of revenues in 2001. The increase in gross profit percentage in 2003 ", + "page_start": 25, + "page_end": 25, + "source_file": "NASDAQ_ATRI_2003.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_ATRI_2003.pdf", + "query": "What was Atrion's gross profit in 2003 (in thousands) ? ", + "target_page": 10, + "target_passage": "Gross Profit 22,239", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Gross profit was $22.2 million in 2003, compared with $20.3 million in 2002 and $21.8 million in 2001. The Company’s gross profit in 2003 was 35 \npercent of revenues compared with 34 percent of revenues in 2002 and 38 percent of revenues in 2001. The increase in gross profit percentage in 2003 ", + "page_start": 25, + "page_end": 25, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "Our financial performance earned recognition from*Investors Business Daily*, which ranked Atrion sixth \n\non its list of Market-Leading Medical Stocks in November 2003. During the year, our stock price more than \n\ndoubled, ending the year at $45.44, up from $22.50 at year-end 2002. Over the last five years, our stock price \n\nhas increased by 468 percent. ", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "**We manage our assets and resources carefully.**\n\nOur financial strategy centers on building the strength and stability that will position our company for \n\nongoing growth. We approach the management of our resources with discipline and diligence, striking the \n\nbalance that allows us to accomplish our objectives: Funding the current needs of the business, maintaining a \n\nEBITDA Per Diluted Share From \nContinuing Operations(a) strong financial foundation, and investing in the resources, technology and assets that will ensure operating \n\nefficiency and fuel future growth. The soundness of this strategy was reflected once again in our financial \n\nresults for 2003. \n\nFor the fifth consecutive year, Atrion’s earnings per diluted share from continuing operations increased \n$7 \n\nby more than 15 percent, rising from $2.18 in 2002 to $2.66 in 2003, a 22 percent improvement. In light of \n6 \nthe economic pressures which have challenged virtually every business in recent years, we view five \n5 \nconsecutive years of EPS growth—ranging from 16 percent to over 50 percent—as a sign of solid financial \n\n4 strength and a testament to the viability of our strategy. Including a gain from discontinued operations of $ .09 \n\nper share, net income totaled $2.75 per diluted share for 2003. \n3 \n$2.70 \nRevenues for 2003 increased five percent to $62.8 million, from $59.5 million in the prior year. Return \n2 \n\n1 ", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "**C o r p o r a t e O f f i c e :**\nAtrion Corporation \nOne Allentown Parkway \nAllen, Texas 75002 \n(972) 390-9800 \nwww.atrioncorp.com \n\n**R e g i s t r a r a n d T r a n s f e r A g e n t**\nAmerican Stock Transfer and Trust Company \n59 Maiden Lane \nNew York, New York 10007 \n\n**F o r m 1 0 - K**\nA copy of the Company’s 2003 Annual Report on Form 10-K, as filed with the Securities and Exchange \nCommission, may be obtained by any stockholder without charge by written request to: \n\n*Corporate Secretary*\n*Atrion Corporation*\n*One Allentown Parkway*\n*Allen, Texas 75002*", + "page_start": 30, + "page_end": 30, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "S U M M A R Y O F S I G N I F I C A N T A C C O U N T I N G P O L I C I E S 1 \n\nAtrion Corporation designs, develops, manufactures and markets products primarily for the medical and health care industry. The Company markets its \nproducts throughout the United States and internationally. The Company’s customers include hospitals, distributors, and other manufacturers. As of \nDecember 31, 2003, the principal subsidiaries of the Company through which it conducted its operations were Atrion Medical Products, Inc. (“Atrion \nMedical Products”), Halkey-Roberts Corporation (“Halkey-Roberts”) and Quest Medical, Inc. (“Quest Medical”). \n\n**P R I N C I P L E S O F C O N S O L I D A T I O N**\nThe consolidated financial statements include the accounts of Atrion Corporation and its subsidiaries (the “Company”). All significant intercompany \ntransactions and balances have been eliminated in consolidation. \n\n**F A I R V A L U E**\nThe carrying amounts of cash and cash equivalents, accounts receivable and accounts payable approximate fair value due to the short-term nature of these \nitems. The carrying amount of debt approximates fair value as the interest rate is tied to market rates. ", + "page_start": 13, + "page_end": 13, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "To the Stockholders and the Board of Directors of Atrion Corporation: \n\nWe have audited the accompanying consolidated balance sheets of Atrion Corporation (a Delaware corporation) and Subsidiaries as of December 31, 2003 \nand 2002, and the related consolidated statements of income, changes in stockholders’ equity and cash flows for the years then ended. These financial \nstatements are the responsibility of the Company’s management. Our responsibility is to express an opinion on these financial statements based on our audit. \nThe financial statements of Atrion Corporation and Subsidiaries as of and for the year in the period ended December 31, 2001, were audited by other auditors \nwho have ceased operations. Those auditors expressed an unqualified opinion on those financial statements in their report dated February 25, 2002. \n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States of America. Those standards require that we plan \nand perform the audit to obtain reasonable assurance about whether the financial statements are free of material misstatement. An audit includes \nexamining, on a test basis, evidence supporting the amounts and disclosures in the financial statements. An audit also includes assessing the accounting \nprinciples used and significant estimates made by management as well as evaluating the overall financial statement presentation. We believe that our audits \nprovide a reasonable basis for our opinion. ", + "page_start": 24, + "page_end": 24, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "For the year ended December 31, 2003, the Company reported revenues of $62.8 million, income from continuing operations of $4.9 million and net \nincome of $5.1 million, up 5 percent, 20 percent and 95 percent, respectively, from 2002. ", + "page_start": 25, + "page_end": 25, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "(In thousands, except per share amount) \n\nYear Ended December 31 2003 **2004**\n\nNet income \n\nAs reported . . . . . . . . . . . . . . . . . . . . . . . . . . . . .**$ 412,332** 243,697 \n\nStock-based compensation under SFAS 123 . . . . (43,310) **(22,963)**\n\nPro forma . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .**$ 389,369** $ 200,387 \n\nBasic earnings per share \n\nAs reported . . . . . . . . . . . . . . . . . . . . . . . . . . . . .**$** **2.95**\n\nStock-based compensation under SFAS 123 . . . . **(0.16)**\n\nPro forma . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .**$** **2.79**\n\nDiluted earnings per share \n\nAs reported . . . . . . . . . . . . . . . . . . . . . . . . . . . . .**$** $ 1.61 \n\n(0.29) \n\n$ 1.32 ", + "page_start": 61, + "page_end": 61, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "*Revenue.*Revenue was $2,708.1 million, $2,517.8 million and $2,365.1 million for the years ended \nDecember 31, 2004, 2003 and 2002, respectively. Revenue increased by $190.3 million, or 7.6%, from 2003 to ", + "page_start": 41, + "page_end": 41, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "In recent years, the economic climate has presented significant \nchallenges to growth—and, in some cases, survival—for American \nbusinesses. The companies that have fared well are those with solid \nfinancial foundations and sound growth strategies that provide a \nmeasure of protection against the changing winds of the economy. \nAtrion is one of those companies. For the past five years, we have \nproduced earnings per share growth of more than 15 percent each \nyear. Despite fluctuations in our markets and product demand, we \nhave continued to return value to our stockholders through strong \nearnings growth, year after year. As a leading provider of medical \ndevices and components to niche markets in the health care \nindustry, we are committed to doing everything we can to continue \nthat level of performance. ", + "page_start": 1, + "page_end": 1, + "source_file": "NASDAQ_ATRI_2003.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_EEFT_2000.pdf", + "query": "What the name of the first bridge buildt over Danube ?", + "target_page": 16, + "target_passage": "he Chain Bridge was the first bridge over the Danube", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**CHAIN BRIDGE, Budapest**\n\nThe Chain Bridge, built from 1839 to 1849, was the \n\nfirst bridge over the Danube, linking the cities \n\nBuda and Pest. Measuring 380 meters long and \n\n15.7 meters wide, it is supported by pillars \n\nshaped like antique triumphal arches. ", + "page_start": 15, + "page_end": 15, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "**CHARLES BRIDGE, Prague**\n\nDating back to the 14th century, the Charles \n\nBridge is one of the jewels of Gothic architecture. \n\nThis stone bridge, built by Charles IV, the Czech \n\nKing and Holy Roman Emperor, created a reliable \n\nconnection between the Lesser and the Old Town \n\nand gave way to the merging of life of both banks. ", + "page_start": 24, + "page_end": 24, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "**RIVER TYNE BRIDGES, Newcastle**\n\nSix bridges dominate the Tyne between Newcastle \n\nand Gateshead, enabling innovative railway and \n\nroadway advances over the past two centuries. At \n\nthe time of its completion in 1929, the Tyne Bridge \n\nwas the world’s longest single span bridge. ", + "page_start": 27, + "page_end": 27, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "**B R O O K LYN BRIDGE, New Yo r k**\n\nThe Brooklyn Bridge, proudly standing over the East River and \n\nconnecting the boroughs of Brooklyn and Manhattan, endures as \n\none of the most famous bridges in America. When completed in \n\nMay 1883, the 5989-foot-long Brooklyn Bridge was the largest \n\nsuspension bridge in the world. ", + "page_start": 28, + "page_end": 28, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "**SYDNEY HARBOUR BRIDGE, Sydney**\n\nSince its opening in March 1932, the Sydney Harbour Bridge \n\nhas held a special place for immigrants upon their arrival to \n\nAustralia. This grand arch remains a distinctive landmark \n\nfor what many consider to be the most beautiful harbour \n\nin the world. ", + "page_start": 26, + "page_end": 26, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "Lyon has two major railway stations: Lyon-Part-Dieu, which was built to \naccommodate the TGV, and Lyon Perrache, an older station that now provides mostly \nregional service. Smaller railway stations include Gorge-de-Loup, Vaise, Saint-Paul \nand Jean Macé. Lyon was the first city to be connected to Paris by the TGV in \n1981.[76] Since that time the TGV train network has expanded and links Lyon directly \nto Perpignan, Toulouse, Nice, Marseille, Strasbourg, Nantes and Lille. International \ntrains operate directly to Madrid, Barcelona, Milan, Turin, Geneva, Frankfurt, \nLuxembourg, Brussels and London. \n\nThe city is at the heart of a dense road network and is located at the meeting point of \nseveral highways: A6 to Paris, A7 Marseille, A42 to Geneva, and A43 to Grenoble. \nThe city is now bypassed by the A46. A double motorway tunnel passes under \nFourvière, connecting the A6 and the A7 autoroutes, both forming the \"Autoroute du \nSoleil\". \n\nT1 tramway on the Raymond Barre \nbridge ", + "page_start": 18, + "page_end": 18, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Anatolia EBA \nAustria_Klosterneuburg_Roman \nBaiuvarii_EMED \nBritain.lronRoman \nCentraIEurope.lronRoman(l) \nCentraIEurope.lronRoman(lI) \nCentraIEurope.IronRoman(lII) \nCordedWare_EBA \nCroatia.lronRoman_oNorthEurope \nDenmark_BA \nDenmark_EVA \nDenmark_IA \nEngland_Saxon_highCNE \nEngland_Saxon_lowCNE \nEngland_Saxon_midCNE \nEngland.Roman.Gladiator.Scandinavia \nHungary_EM(I) \nHungary_EM(II) \nHungarySlovakia.lronRoman \nAll SNPs \nIrelandOrkney_BA \nItaly.lmperial(l) \nltaly.lmperial(lI) \nltaly.lronRepublic \nTwigstats 1,000 \nKyrgyzstan_TianShanHun \nLithuania.lronRoman \nLongobard_EMED(I) \nLongobard_EMED(II) \nMontenegro_EM \nNetherlands_Friesland_Saxon \nPoland_BA \nFaroes \nPoland_Middle_Ages(I) \nPoland_Middle_Ages(II) ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed3.pdf" + }, + { + "text": "Scandinavian_Peninsula_EIA(I) \nScandinavian_Peninsula_EIA(II) \nSlovakia_Zohor_Germanic_Roman \nSlovakia_earlyMED \nSlovenia.lronRoman \nSlovenia.Roman.oNorthEurope ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed3.pdf" + }, + { + "text": "Cities and territories, such as Luxembourg and Casale, were prized for their strategic \npositions on the frontier and access to important waterways. Louis also sought \nStrasbourg, an important strategic crossing on the left bank of the Rhine and theretofore \na Free Imperial City of the Holy Roman Empire, annexing it and other territories in \n1681. Although a part of Alsace, Strasbourg was not part of Habsburg-ruled Alsace and \nwas thus not ceded to France in the Peace of Westphalia. \n\n**Silver coin of Louis XIV, dated**\n**1674**", + "page_start": 7, + "page_end": 7, + "source_file": "wikipedia5.pdf" + }, + { + "text": "***Geography portal***\n\n***Europe portal***\n\n***European Union***\n***portal***\n\n***France portal***\n\nList of films set in Lyon \nList of streets and squares in Lyon \nMères of France \nMontchat \nOccupation of Saint-Nizier church by Lyon prostitutes \n\n**Notes**\n\na. A war cry from 1269, spelt in modern Franco-Provençal as*Avant, Avant, Liyon lo mèlyor*. \nb. Quote from a letter of Cicero to Lucius Munatius Plancus, founder of the city.[1] \nc. Pronunciation: UK: /ˈliːɒ̃/,[8][9] US: /liˈoʊn/*lee-OHN*;[10][11] French: [ljɔ̃] ⓘ; formerly spelled in English as \n\n*Lyons*(/ˈlaɪənz/*LY-*ə*nz*).[11][12] Arpitan:*Liyon*[ʎjɔ̃]; Occitan:*Lion*, hist.*Lionés*.[13] \n\nd. Constant PPP US dollars, base year 2015. ", + "page_start": 20, + "page_end": 20, + "source_file": "wikipedia4.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_EEFT_2000.pdf", + "query": "What was the total amount of operating expenses of 2000 by Network Wordwide in 2000 ?", + "target_page": 17, + "target_passage": "Total operating expenses increased to $88.1 million for the year ended December 31, 2000", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Operating Expenses**Total operating expenses increased to $88.1 million for the year ended \nDecember 31, 2000 from $68.3 million for the year ended December 31, 1999 and from $34.5 \nmillion for the year ended December 31, 1998. The increase from 1999 to 2000 can be broken down \nby segment as follows: (1) a $3.5 million increase in Network Services Segment operating costs due to growth in the size of the network \noperations; (2) a $15.2 million increase in Software Services Segment due to write down of intangibles of $11.2 million and investment in \npersonnel and re s o u rces; and (3) a $1.1 million increase in Corporate Services Segment operating costs due to the expended operations. The \ni n c rease from 1998 to 1999 can be broken down by segment as follows: (1) a $13.0 million increase in Network Services Segment operating costs, \n(2) the addition of $19.6 million of Software Solutions Segment operating costs, and (3) a $1.2 million increase in Corporate Services Segment \noperating costs. Operating expenses for the years ended December 31, 2000 and 1999 are discussed more fully in the Segment Results of \nOperations sections below. \n\n**1995 1996 1997 1998 1999 2000**", + "page_start": 16, + "page_end": 16, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "10 \n\n0 \n2000 1999 2001 2002 \n\n44 \n\n**Capital Expenditures**\n**($ millions)**\n\n80 \n29 \n\n23 \n60 \n\n16 \n40 \n12 \n\n20 \n\n0 \n0 \n2003 1999 2001 2002 2000 \n\nSHENANDOAH TELECOMMUNICATIONS COMPANY ■ 6 ", + "page_start": 7, + "page_end": 7, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "The following tables present the segment results of the Company’s operations for the years ended December 31, 2000, 1999 and 1998. \n\nYear Ended December 31, 2000 \nNetwork Serv i c e s \n\nCentral \nE u rope We s t e rn \nE u rope S o f t w a re \nSolutions C o r p o r a t e \nS e rvices To t a l \n\nTotal Revenues \nTotal operating expenses $ 1 8 , 5 9 9. \n( 2 1 , 6 6 9 ) \n$ 1 6 , 0 0 6. $ \n\nOperating loss. \nI n t e rest income \nI n t e rest expense \nF o reign exchange (loss)/gain, net \n\nNet loss before income taxes $ ( 4 , 4 1 3 ) $ ( 2 , 8 8 3 ) $ ( 8 2 4 ) \n\nSegment assets \nFixed assets \nD e p reciation and amort i z a t i o n \nAsset write down $ 2 5 , 6 9 7. \n1 7 , 1 4 5. \n3 , 9 7 7. \n6 6 8. $ 1 6 , 7 5 5 \n1 1 , 7 0 7. \n2 , 8 8 4. \n1 1 0. \n\n$ ", + "page_start": 42, + "page_end": 42, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "D i rect operating costs in the Network Services Segment consist primarily of: ATM installation costs; ATM site rentals; and costs associated with \nmaintaining ATMs, ATM telecommunications, interest on network cash and cash delivery and security services to ATMs. Such costs increased to \n$24.4 million for the year ended December 31, 2000 from $21.9 million for the year ended December 31, 1999. The increase in direct operating \ncosts is primarily attributable to costs associated with operating the increased number of ATMs in the network during the periods. Also, \ni n t e rcompany allocations were made to charge the ATM operations with transaction switching and bank connection fees associated with the \noperations central processing center in Budapest. These allocations totalled $3.5 million and $2.9 million for the years ended December 31, 2000 \nand 1999, re s p e c t i v e l y. Direct operating costs for 2000 include a one-time gain of $1.2 million due to a change in Hungarian law that eliminates a \nmajor portion of the Company’s liability for import taxes on ATM hard w a re. Direct operating costs also include a $657,000 gain realized in 1999 \nf rom the sale of the Croatian network assets. The components of direct operating costs for the years ended December 31, 2000 and 1999 were: ", + "page_start": 18, + "page_end": 18, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "**Operating Loss**The Company generated an operating loss of $35.4 million for the year ended December 31, 2000 compared to $26.8 million \nfor the year ended December 31, 1999 and $22.6 million for the year ended December 31, 1998. The increased operating loss from 1999 to 2000 \nis due to the net effect of three factors: (1) a $6.8 million decrease in the operating loss from the Company’s Network Services Segment; (2) a \n$14.3 million increase in the operating loss from the Company’s Software Solutions Segment; and (3) a $1.1 million increase in the operating loss \nf rom the Company’s Corporate Services Segment. The increased operating loss from 1998 to 1999 is due to the net effect of three factors: (1) a \n$1.9 million decrease in operating losses from the Company’s Network Services Segment; (2) the addition of $4.8 million in operating losses fro m \nthe Company’s Software Solutions Segment; and (3) a $1.3 million increase in operating losses from the Company’s Corporate Services Segment. ", + "page_start": 16, + "page_end": 16, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "T h e re can be no assurance that the contracts included in backlog will actually generate the specified revenues or that the revenues will be \ngenerated within the one-year period. \n\n**Operating Expenses**S o f t w a re Solutions Segment operating expenses consist primarily of salaries and benefits, selling, general and \nadministrative, and depreciation and amortization. In addition, the Company re c o rded a $11.2 million one-time write down of goodwill and other \nidentifiable intangible assets associated with the Company’s purchase of Euronet USA in December 1998 (see Note 10 to Consolidated Financial \nStatements – Asset Write Down). Total segment operating expenses increased to $37.5 million for the year ended December 31, 2000 from $22.3 \nmillion for the year ended December 31, 1999. The components of software solutions operating costs for the years ended December 31, 2000 and \n1999 were: ", + "page_start": 19, + "page_end": 19, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "**Revenues**The Company’s total revenues increased to $52.7 million for the year ended December \n31, 2000 from $41.5 million for the year ended December 31, 1999 and $11.9 million for the year \nended December 31, 1998. The increase in revenues from 1999 to 2000 is primarily due to two \nfactors: (1) a $10.4 million increase in Network Services Segment revenues resulting from the \ni n c rease in transaction volumes in the Company owned ATMs and an increase in the number of AT M s \noperated by the Company during this period; and (2) an increase of $800,000 in Software Solutions \nSegment revenues. The increase in revenues from 1998 to 1999 is primarily due to two factors: (1) a \n$15.0 million increase in Network Services Segment revenues resulting from the increase in \ntransaction volume attributable to an increase in the number of ATMs operated by the Company \nduring this period; and (2) the addition of $14.6 million of Software Solutions Segment re v e n u e s . \nRevenues for the years ended December 31, 2000 and 1999 are discussed more fully in the Segment \nResults of Operations sections below. \n\n**1 1 . 9**\n\n**5 . 3**\n\n**1 . 3**\n**0 . 1**", + "page_start": 16, + "page_end": 16, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "**Q1 Q2 Q3 Q4**\n\nThe operating expenses for the We s t e rn European Sub-segment totaled $18.9 million for the year \nended December 31, 2000 as compared to $16.5 million for the year ended December 31, 1999, an increase of 15%. The increase in operating \nexpenses is largely the result of an increase in the number of ATMs operated by the Company from 621 at December 31, 1999 to 787 at \nDecember 31, 2000, and increased transaction volumes. \n\nThe operating expenses for the Other ATM Operations Sub-segment were $2.4 million for the year ended December 31, 2000 as compared to \n$2.2 million for the year ended December 31, 1999, an increase of 9%. The operating expenses from this segment are the result of the acquisition \nof the Dash network located in the United States in August 1999 and the unallocated costs associated with the Company's processing facilities. ", + "page_start": 18, + "page_end": 18, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "The Company’s re s e a rch and development costs incurred for computer products to be sold, leased or otherwise marketed totaled $6.7 \nmillion, $3.2 million and $153,000 for the years ended December 31, 2000, 1999 and 1998, re s p e c t i v e l y. In 2000, $1.0 million was \ncapitalized and appears on the Company’s balance sheet in prepaid expenses and other assets, net of accumulated amortization of $137,000. \nIn 1999, $322,000 was capitalized, net of accumulated amortization of $70,000. ", + "page_start": 45, + "page_end": 45, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "Selling, general and administrative costs allocated to the Network Services Segment decreased to $2.4 million for the year ended December 31, \n2000 from $2.9 million for the year ended December 31, 1999. The $500,000 cost decrease for the year ended December 31, 2000 results fro m \nthe net effect of (1) a $600,000 increase in the allocation of costs from the selling, general and administrative line of the Budapest pro c e s s i n g \ncenter to the operating cost line, as discussed above, from $2.9 million for the year ended December 31, 1999 to $3.5 for the year ended \nDecember 31, 2000 and (2) a $100,000 increase in costs associated with the expansion of the Company’s network operations. \n\nD e p reciation and amortization increased to $8.0 million for the year ended December 31, 2000 from $7.4 million for the year ended December \n31, 1999. The increases are due primarily to the increase in the number of owned ATMs as discussed pre v i o u s l y. The Company also re c o rded an \n$800,000 write-down of certain ATM hard w a re assets for the year ended December 31, 2000, as previously discussed. ", + "page_start": 18, + "page_end": 18, + "source_file": "NASDAQ_EEFT_2000.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_EEFT_2000.pdf", + "query": "What was the share of revenues of Netwrok Wordwide made in Poland and Hungary in 2000 ?", + "target_page": 24, + "target_passage": "In 2000, 30% of the Company’s revenues were generated in Poland and Hungary", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Foreign Exchange Exposure**\n\nIn 2000, 30% of the Company’s revenues were generated in Poland and Hungary, as compared to 27% in 1999 and 73% in 1998. The 2000 \nf i g u re has increased due to the increase in revenues for the Polish operations. In Hungary the majority of revenues received are denominated in \nHungarian Forint and in Poland, the majority of revenues are denominated in Polish Zloty. However the majority of these foreign curre n c y \ndenominated contracts are linked either to inflation or the retail price index. While it remains the case that a significant portion of the Company’s \ne x p e n d i t u res are made in or are denominated in U.S. Dollars the Company is also striving to achieve more of its expenses in local currencies to \nmatch its revenues. \n\nThe Company estimates that a further 10% depreciation in foreign exchange rates of the Deutsche Mark, Hungarian Forint, Polish Zloty and the \nBritish Pound Sterling against the U.S. dollar, would have the combined effect of a $7.1 million decrease in the re p o rted net loss. This was \nestimated using 10% of the Company’s net losses after adjusting for unusual impairment and other items including U.S. dollar denominated or \nindexed expenses. The Company believes that this quantitative measure has inherent limitations. It does not take into account any govern m e n t a l \nactions or changes in either customer purchasing patterns or the Company’s financing or operating strategies. ", + "page_start": 23, + "page_end": 23, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "**Network Services: Revenue**\n39% increase for full year 2000 over 1999 \n\nRevenues for the Central European Sub-segment totaled $18.6 million for the year ended December \n31, 2000 as compared to $12.7 million for the year ended December 31, 1999, an increase of 47%. \nThe increase in revenues is largely the result of an increase in the number of ATMs operated by the \nCompany from 1,203 at December 31, 1999 to 1,391 at December 31, 2000, and incre a s e d \ntransaction volumes. \n\n**3 6 . 9**\n\n**2 6 . 5**\n\nRevenues for the We s t e rn European Sub-segment totaled $16.6 million for the year ended December \n31, 2000 as compared to $12.6 million for the year ended December 31, 1999, an increase of 31%. \nThe increase in revenues is largely the result of an increase in the number of ATMs operated by the \nCompany from 621 at December 31, 1999 to 787 at December 31, 2000, and increased transaction \nvolumes. \n\n**1 1 . 5**\n\n**5 . 3**\n\n**1 . 3**\n**0 . 1**", + "page_start": 17, + "page_end": 17, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "Taken together, our transaction growth and expanding number of consumer touchpoints \n\ntranslated into an accelerating and recurring revenue stream, which greatly improved our \n\nbottom line. Our 2000 revenue of $52.7 million represented a 27% increase over the \n\ncompany’s 1999 revenue of $41.5 million. Euronet’s 2000 EBITDA also improved \n\n$2.4 million, or 14.5%, over 1999. ", + "page_start": 2, + "page_end": 2, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "On Febru a ry 25, 2000 the Company entered into two subscription agreements for the sale of an aggregate of 650,000 new common shares of the \nC o m p a n y. Closing under those agreements took place on March 13, 2000. These agreements were signed with certain accredited investors in \ntransactions exempt from registration under the exemptions provided in Section 4(2) and Regulation D of the Act. The purchase price of each \ns h a re was $6.615, which re p resents ninety percent of the average closing price for the ten trading days prior to and including Febru a ry 15, 2000. \nThe aggregate amount of proceeds to the Company from the private placement was $4.3 million. Under each of the agreements, for each two \ns h a res of common stock purchased in the private placement, the purchasers were issued one warrant to purchase a share of Euronet common \nstock at an exercise price of $11.615, expiring in each case on the one year anniversary date of the subscription agreement. \n\nIn April 2000 the Company entered into two separate subscription agreements for the sale of an aggregate of 354,777 new common shares of the \nC o m p a n y. Of the total new shares, closing with respect to 254,777 shares took place on April 10, 2000, and closing with respect to 100,000 share s \ntook place on May 4, 2000. These agreements were signed with certain foreign persons in transactions exempt from registration under the \nexemption provided in Regulation S of the Act. The weighted average purchase price of each share was $7.50. The aggregate amount of pro c e e d s \nto the Company from the private placement was $2.7 million. Under each of the agreements, for each two shares of common stock purchased in \nthe private placement, the purchaser was issued one warrant to purchase a share of Euronet common stock at a weighted average exercise price of \n$12.50, expiring in each case on the one year anniversary date of the subscription agreement. ", + "page_start": 21, + "page_end": 21, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "Britain \nEastern Europe \n1 \n0 \n\nn \no \ns \nn \ne \nm \nD \n\nCentral Europe \ni \nHungary and Slovakia \n\nPortugal \n\n–0.002 \n\nItaly \n\nTwigstats f3-statistics \n–0.004 \n–0.002 –0.001 0 \n0.001 \nDimension 2 \n0.002 0.003 0.004 \n\nb ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed3.pdf" + }, + { + "text": "**Current Liabilities**C u rrent liabilities decreased to $20.5 million at December 31, 2000 from $26.9 million at December 31, 1999. This decre a s e \nis due primarily to decreases in accrued expenses, billings in excess of costs and estimated earnings on software installation costs and settlement of \nthe forw a rd foreign exchange contracts. \n\n**Capital Lease**Total capital lease obligations including current installments increased to $11.5 million at December 31, 2000 from $10.6 million \nat December 31, 1999. This increase is due primarily to additional capital leases resulting from the Company's purchase of Budapest Bank’s AT M \nnetwork, consisting of 147 ATMs on May 1, 2000. \n\n**Notes Payable**Notes payable increased to $77.2 million at December 31, 2000 from $72.8 million at December 31, 1999. This is the result of \nseveral transactions as follows: \n\n*(in millions)*\n7 2 . 8. \n(4.4) \n8 . 8. Balance at December 31, 1999 \nU n realized foreign exchange gain (DEM vs. US$) \nA c c retion of bond intere s t \n\n$ \n\nBalance at December 31, 2000 $ 7 7 . 2. ", + "page_start": 22, + "page_end": 22, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "In Febru a ry 2000, the Company entered into two subscription agreements for the sale of an aggregate of 650,000 new common shares of the \nC o m p a n y. Closing under these agreements took place on March 13, 2000. These agreements were signed with certain accredited investors in \ntransactions exempt from registration pursuant to the exemptions provided in Section 4(2) and Regulation D of the Act. The purchase price \nof each share was $6.615, which re p resents 90% of the average closing price for the ten trading days prior to and including Febru a ry 15, \n2000. The aggregate amount of proceeds to the Company from the private placement was $4.3 million. Under each of the agreements, for \neach two shares of common stock purchased in the private placement, the purchasers were issued one warrant to purchase a share of Euro n e t \ncommon stock at an exercise price of $11.615, expiring in each case on the one year anniversary date of the subscription agreement. ", + "page_start": 36, + "page_end": 36, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "The figure below illustrates country differences, based on data from the EWCS 2015: the values of \nIreland (green), the EU28 level (blue) with numbers, and the values of Poland (orange). Poland had a \nrelatively high share of employment in industry of 24%, for which Ireland has a share of 12%. The impact \non working conditions can be seen in the share of workers reporting exposures to vibrations (Poland \n27%, Ireland 16%) and loud noise (Poland 35%, Ireland 25%). ", + "page_start": 41, + "page_end": 41, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "The subsidiaries of Euronet Services Inc., all of which are, directly or indire c t l y, wholly owned are: \n\n- EFT Services Holding B.V., incorporated in the Netherlands \n- Euronet Banktechnikai Szolgaltato Kft. (“Bank Tech”), incorporated in Hungary \n- Euronet Adminisztracios Szolgaltato Kft. (“Administrative Services”) (formerly SatComNet), incorporated in Hungary \n- Bankomat 24/Euronet Sp. z o.o. (“Bankomat”), incorporated in Poland \n- EFT-Usluge d o.o., incorporated in Croatia \n- Euronet Services GmbH, incorporated in Germany \n- EFT Services France SAS, incorporated in France \n- Euronet Services spol. s.r.o., incorporated in the Czech Republic \n- Euronet Services SRL, incorporated in Romania \n- Euronet Services (UK) Limited, incorporated in the United Kingdom \n- Euronet USA Inc. (formerly Arkansas Systems, Inc.) (“Euronet USA”) incorporated in Arkansas, United States of America \n- EFT Network Services LLC (“Dash”), incorporated in Arkansas, United States of America \n- Euronet Holding N.V., incorporated in the Netherlands Antilles (in liquidation) \n- Euronet Eft Services Hellas, incorporated in Greece ", + "page_start": 30, + "page_end": 30, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "**Inflation and Functional Currencies**\n\nIn recent years, Hungary, Poland and the Czech Republic have experienced high levels of inflation. Consequently, these countries’ currencies have \ncontinued to decline in value against the major currencies of the OECD over this time period. However, due to the significant reduction in the \ninflation rate of these countries in recent years, none of these countries are considered to have a hyper- i n f l a t i o n a ry economy. Furt h e r, the majority \nof all three subsidiaries’ revenues are denominated in the local curre n c y. Thus all three subsidiaries use their local currency as the functional \nc u rre n c y. The Polish and Czech subsidiaries changed their functional currency to the respective local currency as of January 1, 1998 and January \n1, 1999, re s p e c t i v e l y, and the Hungarian subsidiary changed as of July 1, 1999. \n\nG e rm a n y, France and the United Kingdom have experienced relatively low and stable inflation rates in recent years. There f o re, the local curre n c y \nin each of these markets is the functional curre n c y. Although Croatia, like Germany and France, has maintained relatively stable inflation and \nexchange rates, the functional currency of the Croatian company is the U.S. dollar due to the significant level of U.S. dollar denominated re v e n u e s \nand expenses. Due to the factors mentioned above, the Company does not believe that inflation will have a significant effect on results of operations \nor financial condition. The Company continually reviews inflation and the functional currency in each of the countries that it operates in. ", + "page_start": 23, + "page_end": 23, + "source_file": "NASDAQ_EEFT_2000.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_AIT_2012.pdf", + "query": "Under which name was the Applied company initially fouded ?", + "target_page": 6, + "target_passage": "The Company was founded in 1923 by Joseph M. Bruening as The Ohio Ball Bearing Company", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "management solutions that provide added value to its customers. \n\nWe have a long tradition of growth dating back to 1923, the year \n\nYEAR ENDED JUNE 30, 2012 vs. 2011 \nThe following table is included to aid in review of Applied’s \nour business was founded in Cleveland, Ohio. At June 30, 2012, \n\nbusiness was conducted in the United States, Canada, Mexico \nstatements of consolidated income. \nand Puerto Rico from 476 facilities. \n\nWhen reviewing the discussion and analysis set forth below, \n\nplease note that the majority of SKUs we sell in any given year \n\nwere not sold in the prior year, resulting in the inability to \n\nquantify certain commonly used comparative metrics analyzing \n\nsales, such as changes in product mix and volume. \n\nOur fiscal 2012 sales were $2.4 billion, an increase of $162.6 \n\nmillion or 7.3% compared to the prior year. Net sales from \n\nacquired businesses added $16.6 million or 0.7% to the current \n\nyear. Gross margin of 27.6% compares to 27.7% in the prior \n\nyear. Our operating margin increased to 7.1% compared to the ", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "management solutions that provide added value to its customers. \n\nWe have a long tradition of growth dating back to 1923, the year \nYEAR ENDED JUNE 30, 2012 vs. 2011 \nour business was founded in Cleveland, Ohio. At June 30, 2012, \nThe following table is included to aid in review of Applied’s \nbusiness was conducted in the United States, Canada, Mexico \nstatements of consolidated income. \nand Puerto Rico from 476 facilities. \n\nWhen reviewing the discussion and analysis set forth below, \nChange in \nplease note that the majority of SKUs we sell in any given year Year Ended June 30, $'s Versus \nAs a % of Net Sales Prior Period \nwere not sold in the prior year, resulting in the inability to \n\n**2012** 2011 % Increase quantify certain commonly used comparative metrics analyzing \n\nsales, such as changes in product mix and volume. Net Sales **100.0 %**100.0 % 7.3 % \n\nGross Profit **27.6 %** 27.7 % 6.7 % Our fiscal 2012 sales were $2.4 billion, an increase of $162.6 ", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "In January 2013, Applied \n\nIndustrial Technologies \n\nwill celebrate its 90th \n\nanniversary. The Company \n\nwas founded in 1923 by \n\nJoseph M. Bruening as \n\nThe Ohio Ball Bearing \n\nCompany, a distributor \n\nof bearings to customers \n\nin Cleveland, Ohio. Over \n\nthe years, the Company \n\ngrew to become a regional \n\ndistributor of bearings, \n\nthen an international \n\ndistributor of a wide range \n\nof industrial technologies \n\nand components. Today, \n\nnearly 90 years since our \n\nbeginning, customers \n\nserved by Applied \n\nbenefit from our years of \n\naccumulated experience, \n\nexpertise and exceptional \n\nability to improve our \n\ncustomers’ operations. ", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "NOTE 15: SUBSEQUENT EVENT \n\nOn August 1, 2012, the Company acquired SKF's company-owned distribution businesses in Australia and New Zealand for cash \nconsideration. These businesses will expand Applied's global capabilities and are part of the Service Center Based Distribution \nsegment. The Company funded the acquisition from its available cash and existing revolving credit facilities. Results of operations \nacquired will be included in the Company's results of operations from the date of closing. ", + "page_start": 38, + "page_end": 38, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "NOTE 1: BUSINESS AND ACCOUNTING POLICIES \n\nBusiness \n\nApplied Industrial Technologies, Inc. and subsidiaries (the “Company” or “Applied”) is a leading industrial distributor serving \nMaintenance Repair Operations (MRO) and Original Equipment Manufacturing (OEM) customers in virtually every industry. In \naddition, Applied provides engineering, design and systems integration for industrial and fluid power applications, as well as \ncustomized mechanical, fabricated rubber and fluid power shop services. Applied also offers maintenance training and inventory \nmanagement solutions that provide added value to its customers. Although the Company does not generally manufacture the \nproducts it sells, it does assemble and repair certain products and systems. \n\nConsolidation \n\nThe consolidated financial statements include the accounts of Applied Industrial Technologies, Inc. and its subsidiaries. \nIntercompany transactions and balances have been eliminated in consolidation. The financial results of the Company’s Canadian \nand Mexican subsidiaries are included in the consolidated financial statements for the twelve months ended May 31. \n\nStatements of Consolidated Comprehensive Income \n\nAccounting Standards Codification (ASC) Topic 220 \"Comprehensive Income\" requires the reporting of comprehensive income in \naddition to net income. Effective for fiscal 2012 and retrospective for fiscal 2011 and 2010, the Company has elected to include a ", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "\nis applied. ", + "page_start": 330, + "page_end": 330, + "source_file": "00-80T-80.pdf" + }, + { + "text": "**INVESTOR RELATIONS INQUIRIES SHOULD** **ANNUAL REPORT ON FORM 10-K**\n\n**BE DIRECTED TO:** **The Applied Industrial Technologies, Inc.**\n**Annual Report on Form 10-K for the fiscal**\n**MARK O. EISELE**\n**year ended June 30, 2012, including the**\nVice President – Chief Financial Officer \n**financial statements and schedules thereto,**\n & Treasurer \n**is available at our website at**\nApplied Industrial Technologies \n**www.Applied.com. It is also available**\n1 Applied Plaza \n**without charge upon written request to the**\nCleveland, OH 44115-5014 \n**Vice President – Chief Financial Officer &**\nTelephone: 216/426-4000, Fax: 216/426-4845 \n**Treasurer at the address shown.**\n\n**ANNUAL MEETING**\nThe Annual Meeting of Shareholders will be held \nat 10:00 a.m., Tuesday, October 23, 2012, at the \nCorporate Headquarters of Applied Industrial \nTechnologies, 1 Applied Plaza, East 36th and \nEuclid Avenue, Cleveland, Ohio 44115. ", + "page_start": 46, + "page_end": 46, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "**SHAREHOLDER INFORMATION**\n\nApplied Industrial Technologies, Inc. common stock is listed on the New York Stock Exchange under the symbol AIT. The Company is identified in most \nfinancial listings as “AppliedIndlTch.” \n\n**RESEARCH ON APPLIED INDUSTRIAL TECHNOLOGIES IS AVAILABLE THROUGH:**\n\n**BB&T CAPITAL MARKETS** **KEYBANC CAPITAL MARKETS** **STEPHENS INC.**\nHolden Lewis, 703/471-3894 Jeffrey D. Hammond, 216/689-0236 Matt Duncan, 501/377-3723 \n\n**CJS SECURITIES** **SIDOTI & CO.** **WELLS FARGO SECURITIES, LLC**\nJonathan Tanwanteng, 914/287-7600 Joseph Mondillo, 212/894-3339 Allison Poliniak-Cusic, 212/214-5062 \n\n**CLEVELAND RESEARCH COMPANY** **GREAT LAKES REVIEW – Division of** **WUNDERLICH SECURITIES**\nAdam Uhlman, 216/649-7241 **Wellington Shields & Co.** Brent D. Rakers, 901/251-2236 \nElliott Schlang, 216/767-1340 ", + "page_start": 46, + "page_end": 46, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "**SHAREHOLDER INQUIRIES**\n\nRequests to transfer Applied Industrial \nTechnologies, Inc. shares and all \ncorrespondence regarding address change \ninformation, duplicate mailings, missing \ncertificates, failure to receive dividend \nchecks in a timely manner or to participate \nin the Company’s direct stock purchase \nprogram should be directed to the \nCompany’s transfer agent and registrar: \n\n**COMPUTERSHARE TRUST COMPANY, N.A.**\n250 Royall Street \nCanton, MA 02021 \n800/988-5291 ", + "page_start": 46, + "page_end": 46, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "**COMPARISON OF FIVE-YEAR CUMULATIVE TOTAL RETURN**\n\nApplied Industrial Technologies, Inc., Standard & Poor’s 500, and Peer Group \n\n(Performance Results from 7/1/2007 through 6/30/2012) \n\nAssumes $100 invested at the close of trading 6/30/07 in \nApplied Industrial Technologies, Inc. common stock, Standard \n& Poor’s 500, and Peer Group. \n\nCumulative total return assumes reinvestment of dividends. \n\nThe returns of the companies in the Peer Group are weighted \nbased on the companies’ relative stock market capitalization. \n\nPeer Group companies selected on a line-of-business basis \ninclude: DXP Enterprises, Inc.; Fastenal Company; Genuine \nParts Company; W. W. Grainger, Inc.; Kaman Corporation; \nLawson Products, Inc.; MSC Industrial Direct Co., Inc.; and \nWESCO International, Inc. ", + "page_start": 46, + "page_end": 46, + "source_file": "NYSE_AIT_2012.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_AIT_2012.pdf", + "query": "By how much does Applied company plan to contribute to its pension benefits between 2018 and 2022 ?", + "target_page": 36, + "target_passage": "2018 through 2022 15,200", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": " Fiscal 2004 \n Fiscal 2005 \n Fiscal 2006 \n Fiscal 2007 \n Fiscal 2008 \n Fiscal 2009 – 2013 1,133 \n1,189 \n1,195 \n1,217 \n 1,265 \n 6,874 \nies. The Company’s funding policy is generally to contribute annually \n\n*Expected Contributions During Fiscal 2004*\n Total $ 12,873 \nthe minimum actuarially computed amount. Net pension costs relating \n\nto these plans were $176,000; $0; and $0 for 2003, 2002, and 2001, \nPlan Assets – Percentage of Fair Value by Category \n**2003**\nrespectively. The actuarial present value of obligations, less related plan \n\n Equity \n Debit \n Other **0%**\n**0%**\n**100%**\n\nassets at fair value, is not significant. \n\nThe Company also participates in a multiemployer plan, \n Total **100%**\nwhich provides defined benefits to certain of the Company’s union ", + "page_start": 50, + "page_end": 50, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "It is the Company’s investment policy to maintain 66 percent to 79 percent of the plan’s assets in equity securities and 21 percent to 31 percent of its assets \nin debt securities with the balance invested in a money market account to meet liquidity requirements for distributions. The asset allocation at December \n31, 2003 represents the targeted asset allocation at that time. Based upon the plan’s current over-funded position, the Company expects to make no \ncontributions to its pension plan in 2004. \n\nThe Company also sponsors a defined contribution plan for all employees. Each participant may contribute certain amounts of eligible compensation. The \nCompany makes a matching contribution to the plan. The Company’s contribution under this plan was $202,000 in 2003, $302,000 in 2002 and $258,000 \nin 2001. ", + "page_start": 23, + "page_end": 23, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "In December 2002, the plan was amended to reduce benefit accruals for future service by plan participants by approximately 50 percent. This amendment \ncaused a reduction in the PBO of approximately $616,000, and is reflected as a reduction in pension expense over the estimated employee service lives. \n\nThe changes in the fair value of plan assets, funded status of the plan and the status of the prepaid pension benefit recognized, which is included in the \nCompany’s balance sheets as of December 31, 2003 and 2002 are as follows (in thousands): ", + "page_start": 21, + "page_end": 21, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": "Salary Continuation Benefits \n\nThe Company has agreements with certain retirees of acquired companies to pay monthly retirement benefits through fiscal 2020. \n\nRetiree Health Care Benefits \n\nThe Company provides health care benefits to eligible retired associates who pay the Company a specified monthly premium. \nPremium payments are based upon current insurance rates for the type of coverage provided and are adjusted annually. \nCertain monthly health care premium payments are partially subsidized by the Company. Additionally, in conjunction with a \nfiscal 1998 acquisition, the Company assumed the obligation for a postretirement medical benefit plan which provides health \ncare benefits to eligible retired associates at no cost to the individual. \n\nThe Company uses a June 30 measurement date for all plans. \n\nThe following table sets forth the changes in benefit obligations and plan assets during the year and the funded status for the \npostemployment plans at June 30: \n\nPension Benefits Retiree Health Care Benefits \n\n**2012** 2011 **2012** 2011. \n\n**$** **53,490**\n $ 51,114**$**\n\n**289**\n460 \n\n**2,047**\n2,232 \n\n— \n— \n\n**(4,144 )** (1,856 ) \n\n**150**\n151 \n\n**4,179**\n1,389 \n\n— \n**(8,860 )**\n\n**$** **47,151**\n $ 53,490**$**", + "page_start": 34, + "page_end": 34, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "**Note 9. Retirement Plans (Continued)**\n\nThe Company's matching contributions to the defined contribution plan were approximately $228 thousand, $210 \nthousand and $182 thousand for the years ended December 31, 2003, 2002 and 2001, respectively. \n\nIn May 2003, the Company adopted an unfunded nonqualified supplemental executive retirement plan for named \nexecutives. The plan was established to provide retirement benefits in addition to those provided under the Retirement \nPlan that covers all employees. The following table presents the actuarial information for the plan. ", + "page_start": 33, + "page_end": 33, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**Contributions**\n\nThe Company expects to contribute $0.5 million to the noncontributory defined benefit plan in 2004, and contributed \n$0.4 million in 2003, and $0.3 million in 2002. \n\n31 ■ 2003 ANNUAL REPORT ", + "page_start": 32, + "page_end": 32, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "three-year term. Applied pays dividend equivalents on RSUs on a current basis. \n\nA summary of the status of the Company’s nonvested restricted stock and RSUs at June 30, 2012 is presented below: \n\nYear Ended June 30, 2012 \n**Weighted-Average.**\n\n**Grant-Date.**\n\n(Share amounts in thousands) **Fair Value.**\n\nNonvested, beginning of year **$**\n**25.97**\n\nGranted \n**31.58**\n\nForfeitures \n**27.30**\n\nVested \n**31.42**\n\nNonvested, end of year **$**\n**28.50**\n\nUnrecognized compensation cost related to unvested restricted stock awards and RSUs aggregated $3,670 at June 30, 2012, \nand is expected to be recognized over the weighted-average remaining vesting period of 2.1 years. ", + "page_start": 32, + "page_end": 32, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "NOTE 10: BENEFIT PLANS \n\nRetirement Savings Plan \n\nSubstantially all U.S. associates participate in the Applied Industrial Technologies, Inc. Retirement Savings Plan. Participants may elect \nto contribute up to 50% of their compensation, subject to Internal Revenue Code maximums. The Company makes a discretionary \nprofit-sharing contribution to the Retirement Savings Plan generally based upon a percentage of the Company’s U.S. income before \nincome taxes and before the amount of the contribution (5% for fiscal 2012, 2011 and 2010). The Company partially matches \n401(k) contributions by participants; this match was suspended from January 1, 2009 to June 30, 2010. The Company’s expense for \nprofit sharing and matching of associates’ 401(k) contributions was $10,866, $11,251 and $4,891 during fiscal 2012, 2011 and \n2010, respectively. \n\nDeferred Compensation Plans \n\nThe Company has deferred compensation plans that enable certain associates of the Company to defer receipt of a portion of their \ncompensation and non-employee directors to defer receipt of director fees. The Company funds these deferred compensation \nliabilities by making contributions to rabbi trusts. Assets held in these rabbi trusts consist of investments in money market and ", + "page_start": 31, + "page_end": 31, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "The following table provides information for pension plans with projected benefit obligations and accumulated benefit obligations in \nexcess of plan assets: \n\n\n \n \n \n \n [html]\n
Pension Benefits
June 30,20122011Projected benefit obligations
$47.151$53.490
Accumulated benefit obligations47.15143.528
Fair value of plan assets6.4396.056
", + "page_start": 34, + "page_end": 34, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "NOTES TO CONSOLIDATED FINANCIAL STATEMENTS (Continued) \n(In thousands, except per share amounts) \n\nSalary Continuation Benefits \n\nThe Company has agreements with certain retirees of acquired companies to pay monthly retirement benefits through fiscal 2020. \n\nRetiree Health Care Benefits \n\nThe Company provides health care benefits to eligible retired associates who pay the Company a specified monthly premium. \nPremium payments are based upon current insurance rates for the type of coverage provided and are adjusted annually. \nCertain monthly health care premium payments are partially subsidized by the Company. Additionally, in conjunction with a \nfiscal 1998 acquisition, the Company assumed the obligation for a postretirement medical benefit plan which provides health \ncare benefits to eligible retired associates at no cost to the individual. \n\nThe Company uses a June 30 measurement date for all plans. \n\nThe following table sets forth the changes in benefit obligations and plan assets during the year and the funded status for the \npostemployment plans at June 30: ", + "page_start": 33, + "page_end": 33, + "source_file": "NYSE_AIT_2012.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_AIT_2012.pdf", + "query": "What does Applied has to say regarding the potential creadit risk it could be exposed to ?", + "target_page": 21, + "target_passage": "The Company has a broad customer base representing many diverse industries primarily across North America. As such, the Company does not believe that a significant concentration of credit risk exists in its accounts receivable", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "\nis applied. ", + "page_start": 330, + "page_end": 330, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\nPotential pitfalls and warnings are presented like this. ", + "page_start": 5, + "page_end": 5, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "We make contributions to the plans to secure the benefits of plan \nmembers and invest in permitted investments using the target ranges \nestablished by our Pension Committee, which reviews actuarial \nassumptions on an annual basis. \n\n**Assumptions**\nThere are significant assumptions that are used in the calculations \nprovided by our actuaries, and it is the responsibility of management to \ndetermine which assumptions could result in a significant impact when \ndetermining the accrued benefit obligations and pension expense. \n\n\n \n \n \n \n [html]\n
EmployerEmployeeTotal
2013$ 101$ ≥ 6$ 127
3 / 17eq> 11 / 8
", + "page_start": 122, + "page_end": 122, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "These factors can also affect our objectives, strategies and intentions. \nthese factors are beyond our control or our current \nMany of \nexpectations. Should one or more of these risks, uncertainties or other \nfactors materialize, our objectives, strategies or intentions change, or \nany other \nfactors or assumptions underlying the forward-looking \ninformation prove incorrect, our actual results and our plans could vary \nsignificantly from what we currently foresee. \n\nAccordingly, we warn investors to exercise caution when considering \nstatements containing forward-looking information and that it would \nbe unreasonable to rely on such statements as creating legal rights \nregarding our future results or plans. We are under no obligation (and \nwe expressly disclaim any such obligation) to update or alter any \nstatements containing forward-looking information or the factors or \nassumptions underlying them, whether as a result of new information, \nfuture events or otherwise, except as required by law. All of the \nforward-looking information in this MD&A is qualified by the cautionary \nstatements herein. \n\n\n \n \n \n \n [html]\n
AAF 1DataNumberSpeciesTeverParametersParametersPercentageSpeciesPatientscan fTableParameterParameterSpecificationTableNursestedAge ( years )
", + "page_start": 28, + "page_end": 28, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "**Credit Risk**\nloss we could experience if a \nCredit risk represents the financial \ncounterparty to a financial \ninstrument, in which we have an amount \nowing from the counterparty, failed to meet its obligations under the \nterms and conditions of its contracts with us. \n\n**Liquidity Risk**\nLiquidity risk is the risk that we will not be able to meet our financial \nobligations as they fall due. We manage liquidity risk by managing our \ncommitments and maturities, capital structure and financial leverage, as \noutlined in note 19. We also manage liquidity risk by continually \nmonitoring actual and projected cash flows to ensure that we will have \nsufficient liquidity to meet our liabilities when due, under both normal \nincurring unacceptable losses or \nand stressed conditions, without \nrisking damage to our reputation. \n\nOur credit risk is primarily attributable to our accounts receivable. Our \nbroad customer base limits the concentration of this risk. Our accounts \nreceivable in the consolidated statements of financial position are net of \nallowances for doubtful accounts, which management estimates based \non prior experience and an assessment of \nthe current economic \nenvironment. Management uses estimates to determine the allowance \nfactors such as our \nfor doubtful accounts, \nexperience in collections and write-offs, the number of days the \ncounterparty is past due and the status of the account. We believe that \nour allowance for doubtful accounts sufficiently reflects the related \ncredit risk associated with our accounts receivable. \n\ntaking into account ", + "page_start": 116, + "page_end": 116, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "One major difficulty surely is the**reliable description of exposures at work**. Workers might have had \n**several occupations during their working life, or changed work tasks in the same occupation**due \nto organisational and technological developments, and they might also have changed the specialisation \nin this occupation; also the**level of prevention measures differs**between sectors and countries. Of \ncourse, all this influences the exposure patterns. \n\n**EU-OSHA**applied in its study on ‘Costs and benefits’ estimates, attributable fractions (AF) based on the \nevaluation of literature and statistics. The AF vary between 1% for all respiratory diseases, 3.2% for \nneoplasm and 12.4% for circulatory diseases up to more than 90% for mesothelioma and 100% for \npneumoconiosis.212 For mental diseases the estimated AF is 17.4 % for males and 20.7 for females.213 \n\nThere are very clear connections between specific lung diseases (e.g. pneumoconiosis) and work \nbecause**such exposures are often restricted to workplaces**, as outside work there is practically no \nexposure; many of these diseases are recognised as occupational diseases. Much less clear are the \nattributions of work to cardiovascular, mental, other respiratory diseases like asthma or COPD, and \ndigestive diseases. ", + "page_start": 80, + "page_end": 80, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "on occupation and sector, between 15% and 30% of workers are exposed to such risks. No or very \nminor decreases of these risks could be seen during the past 15 years. \n\nIn both the ESENER and the EWCS surveys52 there is a similar share of ‘Yes responses’ when asked \nfor the presence of such risks.53 In ESENER a set of questions is related to the risks present in the \nenterprise. The figure below shows the responses from ESENER 2014 and ESENER 2019 regarding \nphysical health risks.54 ", + "page_start": 38, + "page_end": 38, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "We do not believe the adoption of SFAS 123(R) will have a material impact on our \ncash flows or financial position. \n\n**Market Risk**\nMarket risk is the risk of loss arising from adverse changes in market rates and \nprices, such as interest rates, foreign currency exchange rates and commodity prices. \nOur primary exposure to market risk is interest rate risk associated with our ", + "page_start": 46, + "page_end": 46, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "**RISKS DUE TO LEGAL AND REGULATORY FACTORS**\n\n**We are subject to certain laws, litigation, regulatory matters and ethical standards, and our failure to comply with or adequately**\n**address developments as they arise could adversely affect our reputation and operations.**\nOur policies, procedures and practices and the technology we implement are designed to comply with federal, state, local and foreign laws, \nrules and regulations, including those imposed by the SEC and other regulatory agencies, the marketplace, the banking industry and foreign \ncountries, as well as responsible business, social and environmental practices, all of which may change from time to time. Significant \nlegislative changes, including those that relate to employment matters and health care reform, could impact our relationship with our \nworkforce, which could increase our expenses and adversely affect our operations. In addition, if we fail to comply with applicable laws and \nregulations or implement responsible business, social, environmental and supply chain practices, we could be subject to damage to our \nreputation, class action lawsuits, legal and settlement costs, civil and criminal liability, increased cost of regulatory compliance, restatements \nof our financial statements, disruption of our business and loss of customers. Any required changes to our employment practices could result \nin the loss of employees, reduced sales, increased employment costs, low employee morale and harm to our business and results of \noperations. In addition, political and economic factors could lead to unfavorable changes in federal, state and foreign tax laws, which may \nincrease our tax liabilities. An increase in our tax liabilities could adversely affect our results of operations. We are also regularly involved in \nvarious litigation matters that arise in the ordinary course of business. Litigation or regulatory developments could adversely affect our \nbusiness and financial condition. ", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**Even if we take appropriate measures to safeguard our information security and privacy environment from security breaches, our**\n**customers and our business could still be exposed to risk.**\nOur Retail and Credit segments involve the collection, storage and transmission of customers’ personal information, consumer preferences \nand credit card information. In addition, our operations involve the collection, storage and transmission of employee information and company \nfinancial and strategic data. Any measures we implement to prevent a security or cybersecurity threat may not be totally effective and may \nhave the potential to harm relations with our customers or decrease activity on our websites by making them more difficult to use. In addition, \nthe regulatory environment surrounding information security, cybersecurity and privacy is increasingly demanding, with new and constantly \nchanging requirements. Security breaches and cyber incidents and their remediation, whether at our company, our third-party providers or \nother retailers, could expose us to a risk of loss or misappropriation of this information, litigation, potential liability, reputation damage and \nloss of customers’ trust and business, which could adversely impact our sales. Any such breaches or incidents could subject us to \ninvestigation, notification and remediation costs, and if there is additional information that is later discovered related to such security breach \nor incident, there could be further loss of customers’ trust and business, based upon their reactions to this additional information. Additionally, \nas a credit card issuer, we could be subject to credit card fraud losses due to external credit card fraud. ", + "page_start": 18, + "page_end": 18, + "source_file": "NYSE_JWN_2014.pdf" + } + ] + }, + { + "references": { + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf", + "query": "To what system of logic do OWL ontologies belong to ?", + "target_page": 7, + "target_passage": "OWL ontologies are an implementation of Description Logic (DL) which is a decidable subset of First Order Logic", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Ontologies are used to capture knowledge about some domain of interest. An ontology describes the \nconcepts in the domain and also the relationships that hold between those concepts. Different ontology \nlanguages provide different facilities. The most recent development in standard ontology languages is \nOWL from the World Wide Web Consortium (W3C). A good primer on the basic concepts of OWL can \nbe found at: https://www.w3.org/TR/owl2-primer/ \n\nOWL makes it possible to describe concepts in an unambiguous manner based on set theory and logic. \nComplex concepts can be built up out of simpler concepts. The logical model allows the use of a reasoner \nwhich can check whether all of the statements and definitions in the ontology are mutually consistent and \ncan also recognize which concepts fit under which definitions. The reasoner can therefore help to \nmaintain the hierarchy correctly. This is particularly useful when dealing with cases where classes can \nhave more than one parent. The reasoner can also infer additional information. For example, if two \nproperties are inverses only one value needs to be asserted by the user and the inverse value will be \nautomatically inferred by the reasoner. \n\n3.1 Components of OWL Ontologies \nAn OWL ontology consists of Classes, Properties, and Individuals. OWL ontologies are an \nimplementation of Description Logic (DL) which is a decidable subset of First Order Logic. A class in \nOWL is a set, a property is a binary relation, and an individual is an element of a set. Other concepts from \nset theory are also implemented in OWL such as Disjoint sets, the Empty set (owl:Nothing), inverse ", + "page_start": 6, + "page_end": 6, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/351037551 \n\nA Practical Guide to Building OWL Ontologies Using Protégé 5.5 and Plugins \n\n**Preprint**· April 2021 \n\nCITATIONS \n0 READS \n36,030 ", + "page_start": 0, + "page_end": 0, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "This introduces Protégé 5 for creating OWL ontologies as well as various plugins. If you have questions \nspecific to this tutorial, please feel free to email me directly: mdebellissf@gmail.com However, if you \nhave general questions about Protégé, OWL, or plugins you should subscribe to and send an email to the \nUser Support for Protégé and Web Protégé email list. This list has many people (including me) who \nmonitor it and can contribute their knowledge to help you understand how to get the most out of this \ntechnology. To subscribe to the list, go to: https://protege.stanford.edu/support.php and click on the first \norange Subscribe button. That will enable you to subscribe to the list and give you the email to send \nquestions to. \n\nThis chapter covers licensing and describes conventions used in the tutorial. Chapter 2 covers the \nrequirements for the tutorial and describes the Protégé user interface. Chapter 3 gives a brief overview of \nthe OWL ontology language. Chapter 4 focuses on building an OWL ontology with classes and object \nproperties. Chapter 4 also describes using a Description Logic Reasoner to check the consistency of the \nontology and automatically compute the ontology class hierarchy. ", + "page_start": 4, + "page_end": 4, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "This chapter describes how to create an ontology of Pizzas. We use Pizzas because it is something almost \neveryone is familiar with. \n\n**Exercise 1: Create a new OWL Ontology**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___", + "page_start": 10, + "page_end": 10, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "**OLAF : Ontology Learning Applied Framework**\nMarion SCHAEFFER (marion.schaeffer@insa-rouen.fr) - Matthias SESBOUE (matthias.sesboue@insa-rouen.fr) \nJean-Philippe KOTOWICZ - Nicolas DELESTRE - Cecilia ZANNI-MERK ", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "4.1 Named Classes \nThe main building blocks of an OWL ontology are classes. In Protégé 5, editing of classes can be done in \nthe Entities tab. The Entities tab has a number of sub-tabs. When you select it, the default should be the \nClass hierarchy view as shown in Figure 4.5.4 All empty ontologies contains one class called owl:Thing. \nOWL classes are sets of individuals. The class owl:Thing is the class that represents the set containing \nall individuals. Because of this all classes are subclasses of owl:Thing. ", + "page_start": 13, + "page_end": 13, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "We designed the proposed framework focusing on**automation**with very little, if any, human involvement in mind. Unlike most existing approaches, \nparticular attention is brought to the**learned ontology final production use case**. We implement the framework as an open-source and open- \naccess python library. We aim to**gather feedback and grow a community**to develop and test multiple algorithms. Various satellite tools could be \ndeveloped to enhance the framework implementation. However, we should focus on developing**axiom extraction**and**automatic ontology**\n**evaluation**. One exciting research area might be the adaptation of the software industry's \"DevOps\" concepts to knowledge management. The latter \nfield is known as \"SemOps\". ", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "Since the beginning of the century, research on ontology learning has gained popularity. Automatically**extracting and structuring knowledge**\nrelevant to a domain of interest from unstructured data is a major scientific challenge. We propose a new approach with a**modular ontology**\n**learning framework**considering tasks from data pre-processing to axiom extraction. Whereas previous contributions considered ontology learning \nsystems as tools to help the domain expert, we developed the proposed framework with**full automation**in mind. An implementation as an**open-**\n**source and collaborative python library**is available at https://gitlab.insa-rouen.fr/msesboue/ontology-learning. ", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "Chapter 5 describes data properties. Chapter 6 describes design patterns and shows one design pattern: \nadding an order to an enumerated class. Chapter 7 describes the various concepts related to the name of \nan OWL entity. \n\nChapter 8 introduces an extended version of the Pizza tutorial developed in chapters 1-7. This ontology \nhas a small number of instances and property values already created which can be used to illustrate the \ntools in the later chapters for writing rules, doing queries, and defining constraints. \n\nChapter 9 describes two tools for doing queries: Description Logic queries and SPARQL queries. Chapter \n10 introduces the Semantic Web Rule Language (SWRL) and walks you through creating SWRL and \nSQWRL rules. Chapter 11 introduces the Shapes Constraint Language (SHACL) and discusses the \ndifference between defining logical axioms in Description Logic and data integrity constraints in \nSHACL. Chapter 12 has some concluding thoughts and opinions and Chapter 13 provides a bibliography. \n\n1.1 Licensing \nThis document is freely available under the Creative Commons Attribution-ShareAlike 4.0 International \nPublic License. I typically distribute it as a PDF but if you want to make your own version send me an \nemail and I will send you the Word version. For details on licensing see: \nhttps://creativecommons.org/licenses/by-sa/4.0/legalcode ", + "page_start": 4, + "page_end": 4, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "In most languages using the CWA we assume that everything that is currently known about the system is \nalready in the database. However, OWL was meant to be a language to bring semantics to the Internet so \nthe language designers chose the OWA. The open world assumption means that we cannot assume \nsomething doesn’t exist just because it isn’t currently in the ontology. The Internet is an open system. The \ninformation could be out there in some data source that hasn’t yet been integrated into our ontology. \nThus, we can’t conclude some information doesn’t exist unless it is*explicitly stated that it does not exist*. \nIn other words, because something hasn’t been stated to be true, it cannot be assumed to be false — it is \nassumed that the knowledge just hasn’t been added to the knowledge base. In the case of our pizza \nontology, we have stated that MargheritaPizza has toppings that are kinds of MozzarellaTopping \nand also kinds of TomatoTopping. Because of the open world assumption, until we explicitly say that a \nMargheritaPizza only has these kinds of toppings, it is assumed by the reasoner that a \nMargheritaPizza could have other toppings. To specify explicitly that a MargheritaPizza has \ntoppings that are kinds of MozzarellaTopping or kinds of TomatoTopping and only kinds of \nMozzarellaTopping or TomatoTopping, we must add what is known as a closure axiom on the \nhasTopping property. ", + "page_start": 42, + "page_end": 42, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + } + ] + }, + { + "references": { + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf", + "query": "Concerning ontologies, what is an anonymous class ?", + "target_page": 30, + "target_passage": "They are created by the reasoner when you use class expressions. For example, if you define the range of a property to be PizzaTopping or PizzaBase then the reasoner will create an anonymous class representing the intersection of those two classes", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "A restriction always describes a class. Sometimes (as we will soon see) it can be a defined class. \nOther times it may be an anonymous class. In all cases the class contains all of the individuals \nthat satisfy the restriction, i.e., all of the individuals that have the relationships required to be a \nmember of the class. In section 9.2 one of our SPARQL queries will return several anonymous \nclasses. ", + "page_start": 30, + "page_end": 30, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "4.1 Named Classes \nThe main building blocks of an OWL ontology are classes. In Protégé 5, editing of classes can be done in \nthe Entities tab. The Entities tab has a number of sub-tabs. When you select it, the default should be the \nClass hierarchy view as shown in Figure 4.5.4 All empty ontologies contains one class called owl:Thing. \nOWL classes are sets of individuals. The class owl:Thing is the class that represents the set containing \nall individuals. Because of this all classes are subclasses of owl:Thing. ", + "page_start": 13, + "page_end": 13, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "So far, we have created some simple named classes and subclasses which hopefully seem \nintuitive and obvious. However, what does it actually mean to be a subclass of something in \nOWL? For example, what does it mean for VegetableTopping to be a subclass of \nPizzaTopping? In OWL subclass means*necessary implication*. I.e., if VegetableTopping is a \nsubclass of PizzaTopping then*all*instances of VegetableTopping are also instances of \nPizzaTopping. It is for this reason that we try to have standards such as having all \nPizzaTopping classes end with the word “Topping”. Otherwise, it might seem we are saying \nthat anything that is a kind of*Ham*like the*Ham*in your sandwich is a kind of MeatTopping or \nPizzaTopping which is not what we mean. For large ontologies strict attention to the naming \nof classes and other entities can prevent potential confusion and bugs. ", + "page_start": 21, + "page_end": 21, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "The foundation for RDF graphs are triples consisting of a subject, predicate, and object. This results in \nwhat is called an undirected or network graph because objects can be subjects and vice versa. Whenever \nyou define a property in OWL you are defining a predicate. An individual can be a subject or an object \n(or both). E.g., in our ontology Customer1 purchasedPizza AmericanaHotPizza1. In this example \nCustomer1 is the subject, purchasedPizza is the predicate and AmericanaHotPizza1 is the object. \n\nHowever, classes and properties themselves are also represented as triples. So for example, when you \ncreate the class Pizza what Protégé does for you is to add the triple: Pizza rdf:type owl:Class to \nthe ontology. I.e., the Pizza entity is of type (is an instance of) owl:Class. Similarly when you add \nNamedPizza as a subclass of Pizza, Protégé adds the triple: NamedPizza rdfs:**s**ubClassOf \nPizza. \n\nHopefully, now you can make some sense of this initial query. The query is looking for all the entities \nthat are the subjects of triples where the predicate is rdfs:**s**ubClassOf and the object is any other \nentity. The*?*before a name indicates that the name is a wildcard that can match anything that fits with the \nrest of the pattern. This is part of the power of SPARQL, one can match a Subject, an Object, a Predicate \nor even all three. Making all 3 parts of the pattern wildcards would return every triple in the graph (in this \ncase our entire Pizza ontology) being searched. You may notice that in some cases the object is simply the \nname of a class while in others it is a class expression with an orange circle in front of it. This is because \nwhen defining classes using DL axioms Protégé creates anonymous classes that correspond to various DL \naxioms. ", + "page_start": 68, + "page_end": 68, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/351037551 \n\nA Practical Guide to Building OWL Ontologies Using Protégé 5.5 and Plugins \n\n**Preprint**· April 2021 \n\nCITATIONS \n0 READS \n36,030 ", + "page_start": 0, + "page_end": 0, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "We have described the class Pizza to be to be a subclass of Thing and a subclass of the things that have \na base which is some kind of PizzaBase. Notice that these are necessary conditions — if something is a \nPizza it is*necessary*for it to be a member of the class Thing (in OWL, everything is a member of the \nclass Thing) and*necessary*for it to have a kind of PizzaBase. More formally, for something to be a \nPizza it is necessary for it to be in a relationship with an individual that is a member of the class \nPizzaBase via the property hasBase. \n\n4.10.3 Creating Subclasses of Pizza \nIt’s now time to add some different kinds of pizzas to our ontology. We will start off by adding a \nMargheritaPizza, which is a pizza that has toppings of mozzarella and tomato. In order to keep our \nontology tidy, we will group our different pizzas under the class NamedPizza. \n\n**Exercise 14: Create Subclasses of Pizza: NamedPizza and MargheritaPizza**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n1. Select Pizza from the class hierarchy on the Classes tab. \n\n2. Click on the Add subclass icon at the top left of the Classes tab (look back at figure 4.4 if you aren’t \ncertain). You can also move your mouse over the icons and you will see a little pop-up hint for each icon. \n\n3. Protégé will prompt you for the name of the new subclass. Call it NamedPizza. \n\n4. Repeat steps 1-3 this time starting with NamedPizza to create a subclass of NamedPizza. Call it \nMargheritaPizza. \n\n5. Add a comment to the class MargheritaPizza using the Annotations view. This is above the \nDescription view. Add the comment: A pizza that only has Mozzarella and Tomato toppings. Remember \nthat annotation properties are meta-data that can be asserted about any entity whereas object and data \nproperties can only be asserted about individuals. There are a few predefined annotation properties that \nare included in all Protégé ontologies such as the comment property. ", + "page_start": 33, + "page_end": 33, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "Figure 4.23 The Reasoner Inferred that Margherita and Soho Pizzas are subclasses of VegetarianPizza \n\n4.14 Defining an Enumerated Class \nA powerful tool in the object-oriented programming (OOP) community is the concept of design patterns. \nThe idea of a design pattern is to capture a reusable model that is at a higher level of abstraction than a \nspecific code library. One of the first and most common design patterns was the Model-View-Controller \npattern first used in Smalltalk and now almost the default standard for good user interface design. Since \nthere are significant differences between OWL and standard OOP the many excellent books on OOP \ndesign patterns don’t directly translate into OWL design patterns. Also, since the use of OWL is more \nrecent than OOP there does not yet exist the excellent documentation of OWL patterns that the OOP \ncommunity has. However, there are already many design patterns that have been documented for OWL \nand that can provide users with ways to save time and to standardize their designs according to best \npractices. \n\nOne of the most common OWL design patterns is an enumerated class. When a property has only a few \npossible values it can be useful to create a class to represent those values and to explicitly define the class \nby listing each possible value. We will show an example of such an enumerated class by creating a new ", + "page_start": 44, + "page_end": 44, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "4.10.4 Detecting a Class that can’t Have Members \nNext, we are going to use the reasoner to detect a class with a definition that means it can never have any \nmembers. In the current version of Protégé when the reasoner detects an inconsistency or problem on \nsome operating systems the UI can occasionally lock up and be hard to use. So to make sure you don’t \nlose any of your work save your ontology using File>Save. \n\nSometimes it can be useful to create a class that we think should be impossible to instantiate to make sure \nthe ontology is modeled as we think it is. Such a class is called a Probe Class. \n\n**Exercise 19: Add a Probe Class called ProbeInconsistentTopping**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___", + "page_start": 37, + "page_end": 37, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "The rest of the tutorial requires some data loaded into your ontology. So far, we have mostly been dealing \nwith defining classes and properties. This type of information is known in the semantic web community \nas T-Box information. The T stands for Terminological. Individuals or instances are known as A-Box. \nThe A stands for Assertional as in specific facts that are asserted about the domain. Typically, there will \nbe a much larger amount of A-Box information than T-Box. The A-Box information is often uploaded \nfrom spreadsheets, relational databases or other sources. One tool that is not covered in this tutorial that is \nuseful is called Cellfie. Cellfie is a tool that can take data from spreadsheets and upload it into an \nontology mapping the table-based data into objects and property values. For a tutorial on Cellfie see: \nhttps://github.com/protegeproject/cellfie-plugin/wiki/Grocery-Tutorial \n\nIn addition to using Cellfie, you can use the Individuals by class tab introduced in chapter 5 to create new \ninstances and to create object and data property values for those instances as you did with the Hot and \nMedium individuals in chapter 6. However, that can be tedious so to spare you that uninteresting work \nI’ve developed a version of the Pizza ontology that has many individuals already created. That ontology \nshould be identical to the ontology you have developed so far except with many additional individuals. \nYou can find this populated Pizza ontology at: https://tinyurl.com/PizzaWDataV2 Go to this URL and \ndownload the file to your local machine and then use File>Open. Before you do that, it is probably a good \nidea to close the current file so that there is no possible confusion between the Pizza ontology you \ndeveloped and the new one with extra data. ", + "page_start": 62, + "page_end": 62, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "Finally, viewing the Individuals by class tab will help to understand the additional data in the ontology. If \nyou go to that tab, you will see many new individuals. In addition to Employees and Customers there \nare instances of the Pizza class. You can see all these individuals in the Individuals by type (inferred) \nview in the upper right corner. \n\nNow with more instances you can see the value of the Individuals by type (inferred) view. You can \nexpand and contract various classes and see the instances for them10. Notice that the 4 \nHighCaloriePizzas are also instances of Pizza but they aren’t shown under Pizza because all \ninstances of HighCaloriePizza are always instances of the Pizza class. There is only one instance of \nthe Pizza class displayed because all the other instances of Pizza are also instances of subclasses of \nPizza so they are shown under those subclasses rather than under Pizza. If there are two or more \nclasses that an Individual is an instance of that aren’t subclasses of each other then they will all be shown. \nFor example, MargheritaPizza1 is an instance of both MargheritaPizza and LowCaloriePizza \nand it shows up under each class because neither is a subclass of the other. It is possible for a Pizza to be \na LowCaloriePizza and not be a MargheritaPizza and vice-versa. ", + "page_start": 64, + "page_end": 64, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + } + ] + }, + { + "references": { + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf", + "query": "When to use an enumerated class in OWL ontologies ?", + "target_page": 46, + "target_passage": "When a property has only a few possible values it can be useful to create a class to represent those values and to explicitly define the class by listing each possible value", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "4.1 Named Classes \nThe main building blocks of an OWL ontology are classes. In Protégé 5, editing of classes can be done in \nthe Entities tab. The Entities tab has a number of sub-tabs. When you select it, the default should be the \nClass hierarchy view as shown in Figure 4.5.4 All empty ontologies contains one class called owl:Thing. \nOWL classes are sets of individuals. The class owl:Thing is the class that represents the set containing \nall individuals. Because of this all classes are subclasses of owl:Thing. ", + "page_start": 13, + "page_end": 13, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "Figure 4.23 The Reasoner Inferred that Margherita and Soho Pizzas are subclasses of VegetarianPizza \n\n4.14 Defining an Enumerated Class \nA powerful tool in the object-oriented programming (OOP) community is the concept of design patterns. \nThe idea of a design pattern is to capture a reusable model that is at a higher level of abstraction than a \nspecific code library. One of the first and most common design patterns was the Model-View-Controller \npattern first used in Smalltalk and now almost the default standard for good user interface design. Since \nthere are significant differences between OWL and standard OOP the many excellent books on OOP \ndesign patterns don’t directly translate into OWL design patterns. Also, since the use of OWL is more \nrecent than OOP there does not yet exist the excellent documentation of OWL patterns that the OOP \ncommunity has. However, there are already many design patterns that have been documented for OWL \nand that can provide users with ways to save time and to standardize their designs according to best \npractices. \n\nOne of the most common OWL design patterns is an enumerated class. When a property has only a few \npossible values it can be useful to create a class to represent those values and to explicitly define the class \nby listing each possible value. We will show an example of such an enumerated class by creating a new ", + "page_start": 44, + "page_end": 44, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/351037551 \n\nA Practical Guide to Building OWL Ontologies Using Protégé 5.5 and Plugins \n\n**Preprint**· April 2021 \n\nCITATIONS \n0 READS \n36,030 ", + "page_start": 0, + "page_end": 0, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "11 For more on DROOLS see the paper: M. J. O'Connor (2012). A Pair of OWL 2 RL Reasoners in the bibliography. \n12 This isn’t actually required. You will get the same result without the Customer(?c) expression but it is a good \nexample of how one can use the names of classes to iterate over their instances with SWRL. \n\n73 ", + "page_start": 73, + "page_end": 73, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "So far, we have created some simple named classes and subclasses which hopefully seem \nintuitive and obvious. However, what does it actually mean to be a subclass of something in \nOWL? For example, what does it mean for VegetableTopping to be a subclass of \nPizzaTopping? In OWL subclass means*necessary implication*. I.e., if VegetableTopping is a \nsubclass of PizzaTopping then*all*instances of VegetableTopping are also instances of \nPizzaTopping. It is for this reason that we try to have standards such as having all \nPizzaTopping classes end with the word “Topping”. Otherwise, it might seem we are saying \nthat anything that is a kind of*Ham*like the*Ham*in your sandwich is a kind of MeatTopping or \nPizzaTopping which is not what we mean. For large ontologies strict attention to the naming \nof classes and other entities can prevent potential confusion and bugs. ", + "page_start": 21, + "page_end": 21, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "The next step is to set some preferences related to the names of new entities. Remember than in Protégé \nany class, individual, object property, data property, annotation property, or rule is referred to as an entity. \nThe term name in OWL can actually refer to two different concepts. It can be the last part of the IRI3 or it \ncan refer to the annotation property (usually rdfs:label) used to provide a more user friendly name for \nthe entity. We will discuss this in more detail below in chapter 7. For now, we just want to set the \nparameters correctly so that future parts of the tutorial (especially the section on SPARQL queries) will \nwork appropriately. ", + "page_start": 10, + "page_end": 10, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "Figure 3.3: Representation of Classes containing Individuals \n\n3.1.3 Classes \nOWL classes are sets that contain individuals. They are described using formal (mathematical) \ndescriptions that rigorously define the requirements for membership of the class. For example, the class \nCat would contain all the individuals that are cats in our domain of interest.2 Classes may be organized \ninto a superclass-subclass hierarchy, which is also known as a taxonomy. However, taxonomies are often \ntrees. I.e., each node has only one parent node. Class hierarchies in OWL are not restricted to be trees and \nmultiple inheritance can be a powerful tool to represent data in an intuitive manner. \n\nSubclasses specialize (aka*are subsumed by*) their superclasses. For example, consider the classes Animal \nand Dog – Dog might be a subclass of Animal (so Animal is the superclass of Dog). This says that*All*\n*dogs are animals*,*All members of the class*Dog*are members of the class*Animal. OWL and Protégé \n\n2 Individuals can belong to more than one class and classes can have more than one superclass. Unlike OOP where \nmultiple inheritance is typically unavailable or discouraged it is common in OWL. ", + "page_start": 8, + "page_end": 8, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "This introduces Protégé 5 for creating OWL ontologies as well as various plugins. If you have questions \nspecific to this tutorial, please feel free to email me directly: mdebellissf@gmail.com However, if you \nhave general questions about Protégé, OWL, or plugins you should subscribe to and send an email to the \nUser Support for Protégé and Web Protégé email list. This list has many people (including me) who \nmonitor it and can contribute their knowledge to help you understand how to get the most out of this \ntechnology. To subscribe to the list, go to: https://protege.stanford.edu/support.php and click on the first \norange Subscribe button. That will enable you to subscribe to the list and give you the email to send \nquestions to. \n\nThis chapter covers licensing and describes conventions used in the tutorial. Chapter 2 covers the \nrequirements for the tutorial and describes the Protégé user interface. Chapter 3 gives a brief overview of \nthe OWL ontology language. Chapter 4 focuses on building an OWL ontology with classes and object \nproperties. Chapter 4 also describes using a Description Logic Reasoner to check the consistency of the \nontology and automatically compute the ontology class hierarchy. ", + "page_start": 4, + "page_end": 4, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "1. An RDF vocabulary for defining data constraints on RDF graphs (which includes OWL since an \n\nOWL ontology is an RDF graph). \n\n2. A reasoner for applying the constraints defined in 1 to a specified data graph such as the Pizza \n\nontology. \n\nOne of the most important classes in 1 is a SHACL Shape. An instance of the SHACL Shape class \nconsists of a set of Targets and Constraints. A Target defines which nodes in the RDF graph that the data \nconstraints apply to. For OWL ontologies this is typically the name of a class which indicates that the \nconstraints apply to all instances of that class. The Constraints define the specific property for the \nconstraint as well as the actual constraints such as the minimum or maximum number of values and the \ndatatype. In the following example, a Target is the Employee class in the Pizza ontology. An example \nconstraint is that the ssn property must have exactly one value. Another example constraint is that the \nformat of the ssn value must be a string of the form: “NNN-NN-NNNN” where each N must be an \ninteger. For more on SHACL see the references in the bibliography. \n\n11.4 The Protégé SHACL Plug-In \nTo start go to Windows>Tabs and see if you have SHACL Editor as an option. If you don’t then go to \nFile>Check for plugins and select the SHACL4Protege Constraint Validator. You need to restart Protégé \nto see the new plugin so save your work and then quit and start Protégé and load the Pizza ontology with \ndata. ", + "page_start": 77, + "page_end": 77, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "4. Look at the check boxes on the right under Query for. Check Superclasses, Subclasses (although it \nshould already be checked by default) and Instances. Now your UI should look like figure 9.1. You may \nnotice that owl:Nothing shows up as a subclass. Don’t worry that is actually expected. Remember that \nowl:Nothing is the empty set and the empty set is a subset of every set (including itself) so just as \nowl:Thing is a superclass of every class owl:Nothing is a subclass of every class. If you don’t want to \nsee owl:Nothing you can uncheck the box toward the bottom right that says Display owl:Nothing. \n\n5. Try some additional DL queries such as: hasTopping some (hasSpiciness value Hot) and \nVegetarianPizza and (hasTopping some (hasSpiciness some (isMilderThan value Hot))). Note that with \nthis last query you are taking advantage of the transitive order you defined for the instances of the \nSpiciness class in chapter 6. \n\n6. You can also do queries for strings in the names of your entities. For example, first do a query simply \nwith Pizza in the query window. Then type in Hot in the Name contains field. This should give you all the \nclasses and individuals with*Hot*in their name. ", + "page_start": 66, + "page_end": 66, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + } + ] + }, + { + "references": { + "source_file": "sg246915.pdf", + "query": "Howcan I specify to Content Manager OnDemand to store the data on the server on which the program runs ?", + "target_page": 121, + "target_passage": "Local: Content Manager OnDemand stores data in a primary storage node on the server on which the data loading program runs", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "OnDemand \nObject Server \n\n", + "page_start": 28, + "page_end": 28, + "source_file": "sg246915.pdf" + }, + { + "text": "**2.1 Introduction**\n\nA*Content Manager OnDemand instance*is a logical server environment. The base system \ncomponents are a library server and one or more object servers. Optional components \ninclude one or more archive managers and one or more Full Text servers. ", + "page_start": 39, + "page_end": 39, + "source_file": "sg246915.pdf" + }, + { + "text": "**10.2 Loading and storing the data**\n\nThe Content Manager OnDemand architecture allows the control and management of the \ndata throughout its lifecycle. The data lifecycle begins with running an efficient load process. \nEach load process invocation ingests report data for a specified application group. \n\nDuring a load process, Content Manager OnDemand stores report (document) data, its \nresources, and index data, as shown in Figure 10-1. ", + "page_start": 243, + "page_end": 243, + "source_file": "sg246915.pdf" + }, + { + "text": "Content Manager OnDemand servers manage control information and index data, store and \nretrieve documents and resource group files, and process query requests from Content \nManager OnDemand Client programs. The documents can be on disk and tape storage \nvolumes. New reports can be loaded into Content Manager OnDemand every day. This way, \nContent Manager OnDemand can retrieve the latest information that is generated by \napplication programs. \n\nWhen a user submits a query, the client program sends a search request to the Content \nManager OnDemand library server. The library server returns a list of the documents that \nmatch the query to the user. When the user selects a document for viewing, the client \nprogram retrieves a copy of the document from the object server where the document is \nstored, opens a viewing window, and displays the document. \n\nFull text search allows users to search the full content of stored documents. For example, \nusers can perform wildcard searches, fuzzy (or similar) searches, proximity searches, and \nboolean searches. \n\nDocuments or reports can also be automatically distributed to users through email or network \nprinters. The distributions can be scheduled to occur at the time that the data is loaded or at \nspecific times during the day. ", + "page_start": 29, + "page_end": 29, + "source_file": "sg246915.pdf" + }, + { + "text": "The library server and the object server can be packaged separately or as a single executable \nfile. \n\n**Content Manager OnDemand Client programs**\nContent Manager OnDemand Client programs operate on various environments, including \npersonal computers that are running on Windows, web browsers, and mobile devices. By \nusing the client program, users can search for and retrieve reports that are stored on the \nsystem. Specifically, users can construct queries and search for reports, retrieve documents \nfrom Content Manager OnDemand, view, print, and fax copies or pages of documents, and \nattach electronic notes to the pages of a document. ", + "page_start": 28, + "page_end": 28, + "source_file": "sg246915.pdf" + }, + { + "text": "The basic Content Manager OnDemand configuration is a library server and an object server \non the same physical system or node. This single library or object server configuration \nsupports the database functions and cache storage on one system. You can add an ASM to \nthe single library or object server configuration to maintain documents on archive media. ", + "page_start": 33, + "page_end": 33, + "source_file": "sg246915.pdf" + }, + { + "text": "**10.1 Introduction**\n\nFor this chapter, unless explicitly stated otherwise, the term “data” is used to refer to the \nreport data, the extracted documents or segments, and their related indexes and the \nextracted resources. \n\nA Content Manager OnDemand system logically stores data in*application groups*. An \napplication group is defined by the Content Manager OnDemand administrator. It consists of \ndata that has the same indexing, data storage, and expiration requirements. The application \ngroup definition also specifies where the report and document data are stored, how long the \ndata is stored, and how the data expires. The method or methods that can be used to expire \nthe data are a function of the application group parameters that are defined before the data is \nloaded into Content Manager OnDemand. In a Content Manager OnDemand system, data \ntypically goes through a lifecycle of loading, storing, migration, and an expiration process. ", + "page_start": 243, + "page_end": 243, + "source_file": "sg246915.pdf" + }, + { + "text": "XML steeliest (resource) archiving is critical. Content Manager OnDemand optimizes the \nstorage of XML data by storing only a single version of a resource and then associating it with \nall of the archived documents. Document resources can be automatically collected and \nmanaged. ", + "page_start": 205, + "page_end": 205, + "source_file": "sg246915.pdf" + }, + { + "text": "*Figure 4-3 Content Manager OnDemand Client search criteria window*\n\nAfter you enter these values, Content Manager OnDemand uses the date information and \nsearches the segment table ARSEG to find the application group data table that contains that \ndate. Content Manager OnDemand then searches the identified table_name (in our example \nHAA1) for the index values (1994-03-07 and 104.18) and finds the matching*Statement_date*\nand the*Balance*and returns these values to the client in a search result list. \n\nAny individual document from within this result list can then be retrieved for display on the \nclient. Content Manager OnDemand locates the document in the archive by using the object \nname, document offset, and length. In the background, the document data is automatically \ndecompressed before it is displayed. \n\nFigure 4-4 on page 85 shows the details of this search sequence from a folder. ", + "page_start": 107, + "page_end": 107, + "source_file": "sg246915.pdf" + }, + { + "text": "Starting with version 9.5 and later, you can run multiple versions of the Content Manager \nOnDemand Windows client (at the release level only, not the PTF level) on a single \nworkstation. The client code is now installed in the c:\\Program Files (x86)\\IBM\\OnDemand \nClients\\V9.5 directory. ", + "page_start": 215, + "page_end": 215, + "source_file": "sg246915.pdf" + } + ] + }, + { + "references": { + "source_file": "sg246915.pdf", + "query": "Does the XML indexer of Content Manager OnDemand support large objects ?", + "target_page": 188, + "target_passage": "No", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "(cid:2) Response time requirements. The goal of Content Manager OnDemand large objects is to \nprovide better performance and usability. Large object support clearly provides enhanced \nusability. However, you must implement large object support so that dividing your \ndocuments into parts provides better overall performance than other methods of \nsegmenting the input data. \n\nWhen you choose a large object, Content Manager OnDemand displays the Number of \nPages field. Specify the number of pages that you want Content Manager OnDemand to \ndivide documents into in the Number of Pages field. \n\nTo generate large objects, the indexer that is specified on the Indexing Information page must \nbe AFP Conversion and Indexing Facility (ACIF), OS/390, or OS/400. When you select the \nLarge Object check box, Content Manager OnDemand automatically adds the INDEXOBJ=ALL \nparameter to the indexing parameters (which causes the indexing program to generate the \nlarge object indexing information). \n\n**Exporting an application**\nIt is not possible to export an application to application groups with different database fields or \nattributes. However, you can export applications to a different server if the application group \non the target server is identical to the application group on the source server (the server on \nwhich the applications are defined). ", + "page_start": 76, + "page_end": 76, + "source_file": "sg246915.pdf" + }, + { + "text": "*Figure 3-6 Application Load Information*\n\n**Large object**\nIn the File Format section, you can set support for large objects. Content Manager \nOnDemand large object support provides enhanced usability and better retrieval performance \nfor reports that contain large documents. \n\nFor example, suppose that a report contains statements that typically exceed 1,000 pages. \nWith large object support, the statements can be divided into parts of 100 pages. When a \nuser views a statement, Content Manager OnDemand retrieves and uncompresses the first \npart of the statement. To view a specific page of a statement, the user can choose the Go To \ncommand in the viewer window and enter the page number. Content Manager OnDemand \nautomatically retrieves and uncompresses the part of the statement that contains the \nrequested page. When the user moves from page to page of a statement, Content Manager \nOnDemand automatically retrieves and uncompresses parts of the statement as needed. \n\nWhen you use large object support, users experience consistent response time when they \nmove from page to page of the document. ", + "page_start": 75, + "page_end": 75, + "source_file": "sg246915.pdf" + }, + { + "text": "XML steeliest (resource) archiving is critical. Content Manager OnDemand optimizes the \nstorage of XML data by storing only a single version of a resource and then associating it with \nall of the archived documents. Document resources can be automatically collected and \nmanaged. ", + "page_start": 205, + "page_end": 205, + "source_file": "sg246915.pdf" + }, + { + "text": "(cid:2)**Problem**: Content Manager OnDemand indexing fails when only one field is defined for an \napplication group. \n\n**Reason or resolution**: The Content Manager OnDemand file name indexing feature \nneeds at minimum one index and a field value that are defined in the application indexer \nparameters. \n\nVerify that you are using a file name index with one field that is defined in the application \ngroup and no field or indexing parameter defined for the application. If these conditions are \ntrue, you must use a field. You can define a dummy literal index and field value in the \napplication indexing parameter as a placeholder. This dummy value is not processed, but \nit allows the file name to be indexed successfully. \n\n(cid:2)**Problem**: Content Manager OnDemand does not break up the PDF file into separate \nreports when TRIGGERs are defined correctly and indexing is successful. For certain \nreports, the trigger is not honored and the reports are grouped. \n\n**Reason or resolution**: The field value*must change*for Content Manager OnDemand to \nindicate a report break. In Figure 18-2, there are several pages of a document. Page 1 is \nthe TRIGGER, and the name is the field that is placed into the index. ", + "page_start": 403, + "page_end": 403, + "source_file": "sg246915.pdf" + }, + { + "text": "XML data is loaded into Content Manager OnDemand by using the**arsload**command. For \nexample, the following statement loads the bamboo.in file and its .res file (if found): \n\narsload -I localhost -u userName -p load.stach -g ci_stmts bamboo,in \n\nThe XML indexer uses the “Generic XML Index File Format” (GXIFF). The GXIFF format is \nfunctionally similar to the Generic Index File Format in that it allows the loading of any type of \ndata into Content Manager OnDemand. \n\nFor more information about using the XML indexer, see*IBM Content Manager OnDemand -*\n*Indexing Reference*, SC19-3354. ", + "page_start": 206, + "page_end": 206, + "source_file": "sg246915.pdf" + }, + { + "text": "– The*XML Indexer*allows the rapid increase in XML archiving mandates that are based \non ISO 20022 standards with XML (including SEPA in Europe). The XML Indexer is \noptimized for high-volume batch archiving of XML, batch PDF, AFP, Line Data, and \ncheck images. \n\n– The*Full Text Indexer*provides the capability to index the full text of a document (or \nreport). You can search through an indexed document. \n\n(cid:2)*Data loading programs*can be set up to automatically store report data into application \ngroups and update the database. The data loading programs can run on any Content \nManager OnDemand server. \n\n(cid:2)*Report Distribution Facility*provides an easy way to automatically group reports and \nportions of reports and distribute the reports to multiple users. Distributions can be \nprinted, created as an output file, or emailed as an attachment. \n\n(cid:2) Both the archived reports and their resources are stored in the Content Manager \n\nOnDemand Archive. The Content Manager OnDemand system manages the stored data \nthroughout its lifetime. It provides authorized users rapid access to the data and allows the \ndata to be converted into different formats for display or print. ", + "page_start": 35, + "page_end": 35, + "source_file": "sg246915.pdf" + }, + { + "text": "**Document indexing**\n*Document indexing*is used for reports that contain logical items, such as customer name or \nnumber. Each of the items in a report can be individually indexed on values, such as account \nnumber, customer name, and balance. Content Manager OnDemand supports up to 128 \nindex values per item. With document indexing, the user is not necessarily required to know \nabout reports or report cycles to retrieve a document from Content Manager OnDemand. \n\n**Report indexing**\n*Report indexing*is used for reports that contain many pages of the same type of data, such as \na transaction log. Each line in the report usually identifies a specific transaction, and it is not \ncost-effective to index each line. Content Manager OnDemand stores the report as groups of \npages and indexes each group. \n\nWhen reports include a sorted transaction value (for example, transaction date and number), \nContent Manager OnDemand can index the data on the transaction value. This indexing is \ndone by extracting the beginning and ending transaction values for each group of pages and \nstoring the values in the database. This type of indexing lets users retrieve a specific \ntransaction value directly. ", + "page_start": 33, + "page_end": 33, + "source_file": "sg246915.pdf" + }, + { + "text": "**Indexes**\nSeg ment-1 \ntabl e \n\nAg Data \nTab le \nD ataba se \nMa nag er \n\nSeg ment-n \ntabl e \n\n*Figure 10-1 Data and index storage locations*\n\nThe Content Manager OnDemand load process identifies, segments, and compresses \ngroups of documents into storage objects that are then stored in the Content Manager \nOnDemand archive, as illustrated in Figure 10-1. To improve the efficiency of the storage \nprocess, Content Manager OnDemand aggregates the stored documents (typically a few \nkilobytes in size) into storage objects. This aggregation provides efficient, high-volume \nstorage, retrieval, and expiration performance. ", + "page_start": 243, + "page_end": 243, + "source_file": "sg246915.pdf" + }, + { + "text": "**10.2.2 Storing the index data**\n\nThe Content Manager OnDemand load process extracts document indexes from the report \ndata and stores the indexes in the Content Manager OnDemand database*application group*\n*data tables*. With these indexes, users can efficiently locate, select, and retrieve documents. \nTypically, indexes are expired when the document data is expired. \n\nEach application group is*segmented*into multiple physical tables by using a date or a date \nand time field. The size of each physical table is determined by the Max rows setting. Each \nrow in the table contains a set of user-defined and system-defined indexes that enable the \nsearch for a report segment or a document. Index data is loaded into a table. When the Max \nrows value is reached, the table is closed and a new table is created. The number of physical \ntables that represent an application group might grow from 1 to*n*. \n\n**10.2.3 Storing the resource data**\n\nIf data caching is enabled, Content Manager OnDemand stores resources in the cache. Two \nlocations on the Storage Management tab affect how resources are stored: \n\n(cid:2) Resource Data \n(cid:2) Document Data ", + "page_start": 247, + "page_end": 247, + "source_file": "sg246915.pdf" + }, + { + "text": "**Indexing and loading**\n\nIn this chapter, we describe the various indexers that are available for IBM Content Manager \nOnDemand (Content Manager OnDemand). \n\nIn this chapter, we cover the following topics: \n\n(cid:2) Introduction \n(cid:2) Getting started with PDF indexing \n(cid:2) Getting started with ACIF indexing \n(cid:2) OS/390 indexer on z/OS and AIX \n(cid:2) OS/400 indexer on Content Manager OnDemand on IBM i \n(cid:2) User exits \n(cid:2) Additional references ", + "page_start": 184, + "page_end": 184, + "source_file": "sg246915.pdf" + } + ] + }, + { + "references": { + "source_file": "sg246915.pdf", + "query": "Considering storage efficiency, should I store my AFP documents as PDF to distribute them over the web ?", + "target_page": 232, + "target_passage": "If a requirement exists to present AFP documents in the Portable Document Format (PDF) format over the web, from a storage perspective, it is more efficient to store the documents in their native format and then convert them to PDF at retrieval tim", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**9.1.2 When to convert data streams**\n\nThe decision of*when*to convert data streams relies mainly on the use of the system. \nTypically, converting data at load time requires more time to process the print stream file, and \nconverting data at retrieval time causes the user retrieval to be a little slower. The decision \nmight depend on how many documents are retrieved, compared to how many documents are \nloaded daily. It might also depend on legal requirements about the format of stored data. \n\n**AFP to PDF**\nIf a requirement exists to present AFP documents in the Portable Document Format (PDF) \nformat over the web, from a storage perspective, it is more efficient to store the documents in \ntheir native format and then convert them to PDF at retrieval time. AFP documents are stored \nmore efficiently than PDF documents. \n\nThe PDF print stream, when it is divided into separate customer statements, is larger than \nAFP because each statement contains its own set of structures that are required by the PDF \narchitecture to define a document. \n\nElapsed time and processor time are also essential factors in the decision-making process. \nThe amount of time (elapsed and CPU) that is needed to convert the document depends on \nhow large the document is and how many resources or fonts are associated with the \ndocument. ", + "page_start": 231, + "page_end": 231, + "source_file": "sg246915.pdf" + }, + { + "text": "However, they all use a rendering engine to display Office, PDF, and AFP data into an image. \nThis rendering might work well with certain Office and PDF files, but it fails on most non-basic \nAFP data streams. \n\nFor more information, see 8.1.1, “Viewer options” on page 186. ", + "page_start": 220, + "page_end": 220, + "source_file": "sg246915.pdf" + }, + { + "text": "(cid:2) For IBM i, depending on your retrieval patterns and system hardware configuration, it \n\nmight be advantageous to*not*store a duplicate set of documents in the Content Manager \nOnDemand cache when you use ASM because ASM might already be using disk space. If \nthe application group uses ASM, caches the data, and specifies the migration of data at \nload time, two copies of the data are stored during the load. One copy is stored in cache, \nand one copy is stored in the ASMREQUEST directory. \n\nTo avoid storing a duplicate set of documents in cache for non-AFP data, change Cache \nData to No on the Storage Management tab of your application group definition. To avoid \nstoring a duplicate set of documents in cache for AFP data, you might change Document \nData to No Cache but leave Resource Data in cache for faster retrieval. \n\n(cid:2) For IBM i, every user that loads data must have a home directory. If users do not have a \nhome directory, the temporary files are stored in the root directory of the integrated file \nsystem (IFS). \n\n(cid:2) If the data source is on a remote system, you can load the data into Content Manager \nOnDemand on the remote system and directly store the export data to the specified \nContent Manager OnDemand library and object server. ", + "page_start": 326, + "page_end": 326, + "source_file": "sg246915.pdf" + }, + { + "text": "One possibly useful implementation of storing fonts with the resource group is when server \nreprint is necessary. If the fonts are stored with the resource group, they can be retrieved from \nContent Manager OnDemand and used by AFP printers. However, if fonts are collected, they \nare also sent to the client as part of the resources group and then discarded. Storing the fonts \nwith the resource group serves only to increase network traffic when transferring the resource \nto the workstation. A more practical option for server printing is to store the font in a fontlib \nand to keep only the reference (path) to the fontlib. Although the font is accessible on the \nserver, Print Services Facility (PSF) or InfoPrint does not need the font to be inline (stored in \nthe resource group). The use of this approach also allows all AFP data that references the \nfont to use the single instance of the font without redundant inline storage. \n\nFigure 13-5 on page 311 shows the indexer information in the application where you can \nselect the resources to collect with the Restype= parameter. Unless reprints to AFP printers \nwith 100% fidelity is a requirement, do not collect the fonts. ", + "page_start": 333, + "page_end": 333, + "source_file": "sg246915.pdf" + }, + { + "text": "maximum disk space required = Number of documents x document size x 150% \n\nThe actual percentage, 50% through 150%, is data-dependent. So, an exact number can be \nobtained only by testing with your data. \n\nFor example, 100,000 documents of 20 KB each can require about 1500 MB (100,000 x \n20 KB x 75%) of disk space. \n\n**Tip:**To determine the text size for AFP and Line Data documents, extract a sample \ndocument and use the**arsview**server command to determine the text size. \n\nThe size of the index is not limited. However, when data is added to or removed from a text \nindex, the text index structure is merged to improve query performance. The required \nprocessing time to complete the merger depends on several factors, such as index size and \nabsolute throughput (which in turn depends on the data type and index format). These factors \nresult in practical limits on the total text index size. \n\nFor query performance, the biggest impact is the number of matching results, not the size of \nthe text index. \n\n**Temporary disk storage**\nDuring the indexing process, the server requires additional disk space for temporary storage. \nThe maximum required disk space is approximately four times the total size of the text of the \ndocuments that are indexed. ", + "page_start": 364, + "page_end": 364, + "source_file": "sg246915.pdf" + }, + { + "text": "Depending on the data that you are working with, consider these options: \n\n(cid:2) For Line Data: \n\n– The line data applet supports annotations. It can work with large object (LOB) reports if \nthe large object functionality is employed at load time. \n\n– The Ajax viewer and direct rendering capabilities of Content Navigator work only on \n\nshorter reports. Additionally, the viewing of annotations and large object documents is \nnot supported. \n\n(cid:2) For AFP data: \n\n– The AFP plug-in is the best choice, because it is almost identical to the client. However, \nit does not support annotations. \n\nThe only viewers that use this functionality are the line data applet, the AFP plug-in \nviewer, and the Content Manager OnDemand Windows client. \n\n– AFP to PDF is a choice that does not require a plug-in rollout at the users’ computers if \n\nthe Acrobat plug-in is installed on their workstations. Font mappings must be \nconfigured at a central location. The additional workload on a rendering system and \nadditional license costs must be considered. Large reports might not be able to be \nrendered or viewed. \n\n**Note:**The AFP viewer plug-in, which is available with ODWEK and Content \nManager OnDemand, is a version of the AFP viewer plug-in from the InfoPrint \nSolutions Company. Although the standard InfoPrint viewer can be used for viewing \nAFP, the ODWEK version uses direct communication with the Content Manager \nOnDemand server, enabling segmented document transfer for LOB documents. ", + "page_start": 212, + "page_end": 212, + "source_file": "sg246915.pdf" + }, + { + "text": "You can browse the VSAM dataset, but if the compression is on, you cannot see much. For \ntest purposes, compression can be switched off and then the content of the VSAM dataset is \nviewable. Compression can be switched off on the load information in the application window. \n\nIf you store AFP data to VSAM, the resources are stored in a different VSAM dataset. ", + "page_start": 141, + "page_end": 141, + "source_file": "sg246915.pdf" + }, + { + "text": "**13.4.1 PDF data**\n\nPortable Document Format (PDF) data is an increasingly common data type that can be \narchived within Content Manager OnDemand. The following key advantages are available by \nusing this data type as a document format: \n\n(cid:2) It is a read-only format that does not require any external resources, such as images or \nfonts. It is self-contained. \n\n(cid:2) The viewer for PDF can be downloaded at no charge from the Adobe website and the \nbrowser plug-ins for PDF are also available at no charge. \n\nDuring PDF document creation, resources, such as images and custom fonts, are placed in \nthe data stream once and then referenced many times from within the PDF file. If a large \nreport is produced from many small documents, that report requires only one copy of the \nresources. \n\nHowever, when the PDF is indexed, the PDF Indexer creates many PDF documents from the \ninput file. Each of these documents requires a certain number of PDF structures, which define \na document. These documents are concatenated together in the .out file, and then loaded \ninto Content Manager OnDemand as separate documents. Because the resources are \nextracted and placed into a separate resource file, they are not included in each document. \nFor an illustration of the process, see Figure 13-3. ", + "page_start": 331, + "page_end": 331, + "source_file": "sg246915.pdf" + }, + { + "text": "**Note:**If your DRP has a total capacity of less than 50 TB savings, you might need to \ndecrease the extent size from the default for DRP (which is 4 GB) to 1 GB for optimal \nspace. \n\nThe main purpose of DRPs is to be a fast and efficient container for volumes with data \nreduction capability. DRPs can also contain standard thick provisioned volumes. \n\nTo create a volume on a DRP, navigate to**Volumes**→**Volumes**, and click**Create Volumes**. ", + "page_start": 443, + "page_end": 443, + "source_file": "sg247938.pdf" + }, + { + "text": "From a performance perspective, the use of the transaction data field for transaction-style line \ndata optimizes indexing performance by reducing the number of index values to be inserted \ninto the database. Therefore, the process of loading and retrieving these large reports is \nfaster and the Content Manager OnDemand database is many times smaller. \n\n**13.4.3 AFP data**\n\nAFP data is a multi-part data type. In addition to the variable data, external resources, such \nas images, fonts, and logos, are also referenced by the AFP data stream. When Content \nManager OnDemand stores AFP data, the resources are also archived. When the data is \nviewed, the referenced resources are displayed. \n\nIt is a common misconception that if fonts are collected when the data is loaded, they are \navailable for viewing in the Windows client. However, Windows does not recognize AFP fonts. \nIt is not possible to use these fonts even if they are sent to the client as part of the resource. \nWindows clients require a mapping from AFP fonts to Adobe Type Manager (ATM) fonts or \nTrueType (TT) fonts. Content Manager OnDemand provides this mapping for most standard \nfonts. For more information about mapping custom fonts, see*IBM Content Manager -*\n*Windows Client Customization Guide and Reference*, SC27-0837. ", + "page_start": 333, + "page_end": 333, + "source_file": "sg246915.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20200438_en.pdf", + "query": "Where can I consult a summary of the impact of the International tax compliance regulations ?", + "target_page": 3, + "target_passage": "A Tax Information and Impact Note covering the International Tax Compliance Regulations 2015 was published on 18th March 2015 and is available on the HMRC website at https://www.gov.uk/government/publications/tax-administration-regulations-to-implement-the- uks-automatic-exchange-of-information-agreements", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThe Regulations amend the International Tax Compliance Regulations 2015 (“the principal \nRegulations”) which give effect to agreements and arrangements reached between the United \nKingdom and other jurisdictions to improve international tax compliance. \n\nRegulation 2(2) extends the application of the principal Regulations to arrangements entered into \nby the United Kingdom for the exchange of financial account information with other jurisdictions \nup to 19th April 2020, the date before the Regulations are made. \n\nRegulation 2(5) omits various accounts from the category of excluded accounts. Regulation \n2(4)(b) amends the definitions of “new account” and “pre-existing account” in relation to those ", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "The Treasury make these Regulations in exercise of the powers conferred by section 222 of the \nFinance Act 2013(**a**): \n\n**Citation and commencement**\n\n**1.**These Regulations may be cited as the International Tax Compliance (Amendment) \n\nRegulations 2020 and come into force on 13th May 2020. \n\n**Amendments to the International Tax Compliance Regulations 2015**\n\n**2.**—(1) The International Tax Compliance Regulations 2015(**b**) are amended as follows. \n(2) In regulation 1(3)(b)(i), for “16th May 2019” substitute “19th April 2020”(**c**). \n(3) In regulation 3(4A)(a), at the beginning insert “subject to regulation 24(3)”. \n(4) In regulation 24— \n\n(a) in the table in paragraph (2), in the column headed “the CRS”— \n\n(i) at the beginning of the entry for “new account” insert “subject to paragraph (3)”, and \n(ii) at the beginning of the entry for “pre-existing account” insert “subject to regulation \n\n3(4A)(a) and paragraph (3)”, and \n\n(b) after paragraph (2) insert— \n\n“(3) In respect of the accounts listed in paragraph (4)— ", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "accounts so that these terms are defined by reference to the date that those accounts ceased to be \nexcluded accounts. Regulation 2(3) and (4)(a) make consequential amendments. \n\nRegulation 3 makes a transitional provision for the calendar year 2020 in relation to accounts \nwhich were previously excluded accounts. \n\nA Tax Information and Impact Note covering the International Tax Compliance Regulations 2015 \nwas published on 18th March 2015 and \nthe HMRC website at \nhttps://www.gov.uk/government/publications/tax-administration-regulations-to-implement-the- \nuks-automatic-exchange-of-information-agreements. It remains an accurate summary of the \nimpacts that apply to this instrument. \n\nis available on ", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "(**a**) 2013 c. 29; section 222 was amended by section 50 of the Finance (No. 2) Act 2015 (c. 33) but the amendments are not \nrelevant to these Regulations. \n(**b**) S.I. 2015/878 (referred to in these footnotes as “the principal Regulations”); relevant amending instruments are S.I. \n\n2017/598, 2018/490 and 2019/881. \nIn accordance with the common reporting standard for automatic exchange of financial account information developed by \nthe Organisation for Economic Co-operation and Development and adopted by the United Kingdom, the United Kingdom \nexchanges information received from financial institutions under the principal Regulations with a territory which is a \n“Reportable Jurisdiction” under the CRS and with which the United Kingdom has entered into international exchange \narrangements for that year. Reportable Jurisdictions are identified in a published list available at https://www.gov.uk/hmrc- \ninternal-manuals/international-exchange-of-information/ieim402340. A hard copy of this list is available for inspection at \nthe offices of HMRC at 10 South Colonnade, 9th Floor, Canary Wharf, London E14 4PU. \n\n(**c**) ", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Year Ended June 30,201220112010
Statutory income tax rate35.0 %35.0 %35.0 %
Effects of :
State and local taxes2.5 %2.8 %2.2 %
U. S. tax on foreign income, net1.8 %
Valuation allowance( 0.6 )%0.8 %
Foreign income taxes( 1.8 )%( 1.0 )%0.5 %
Deductible dividend( 0.5 )%( 0.5 )%( 0.7 )%
Other, net( 0.4 )%( 0.8 )%( 0.6 )%
Effective income tax rate34.8 %36.7 %37.2 %
", + "page_start": 26, + "page_end": 26, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
PolicyDescriptionComplex JudgmentsReference
Income Taxes :Interventions : Interventions : Interventions : Interventions : Interventions : Interventions : Interventions : Interventions : Interventions : Interventions : Interventions : Interventions : Interventions : Interventions : IntiValuation allowancesformation and therealizability of net therealizability of net the purposes are based upon ludgment and estimates allowances and the allowances and the allowances and the allowances and the allowances and the operNote 2, Summary of Significant Accounting Policies, and Note 6, Income Taxes in the Consolidated Financial Statements.
", + "page_start": 40, + "page_end": 40, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "316 It is hardly foreseeable how far the experience of interrupted supply chains during the COVID-19 pandemic will \ncontribute to a de-globalisation and reduction of international supply chain dependency. \n\n317 Such methodologies exist for the environmental field, well-known is the ‘ecological footprint’. \n\n318 Eurofound and the ILO have jointly produced a pilot report on worldwide working conditions to achieve a better \nevidence base for actions and policies, see: Eurofound & ILO, 2019: Working conditions in a global perspective \n\n319 See: https://www.globalreporting.org/ or UN-PRI (UN Principles of responsible investment) \nhttps://www.unpri.org/ \n320 United Nations, Global Compact, here \n321 European Commission: Corporate sustainability due diligence \n\n322 Regulation (EU) 2017/821 of the European Parliament and of the Council of 17 May 2017 laying down supply \nchain due diligence obligations for Union importers of tin, tantalum and tungsten, their ores, and gold originating \nfrom conflict-affected and high-risk areas, here \n323 Centennial Declaration of the International Commission on Occupational Health, ICOH \n\n324 ILO: Monitoring Compliance with International Labour Standards The key role of the ILO Committee of Experts \non the Application of Conventions and Recommendations, here ", + "page_start": 152, + "page_end": 152, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "•**Compliance**with and impact of legislation. Currently, there are data on the percentage of \nenterprises with a risk assessment but very limited information about the**quality of these risk**\n**assessments and of implemented risk management and reduction measures**. Previous \nstudies indicate that in many cases the risk assessment is conducted by an enterprise just to \ncomply with legal obligations (paper compliance). A possible approach could be an**anonymous**\n**evaluation of the quality of a representative share**of risk assessments. ", + "page_start": 139, + "page_end": 139, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
( In thousands )200320022001
Net long - term deferred tax liabilities : Tax over book depreciation OPEB chiligations Compensation Goodwill Other – net
8 ( 28.103 ) 1824.912 ( 18.044 ) 3.320$ ( 34.398 ) 3.5813.821 ( 14.173 ) 4.055$ ( 38.759 ) 3.1972.519 ( 5.550 )Total net long - term deferred tax liabilities
( 37.733 )|( 37.114 )( 39.632 )Met euround deferred tax assets : and assessment and associated general, and product stability accruded by and assessment integration accrudents. Integration accrudes and assessments. Plast closing accrualsDeferred income contro
2984.7544.343.464.5. 4687.5866.9851.504.675.461 ( 3.880 ) 9.369 ( 504 )1.1194.002 ( 1.766 ) 3.3681.6066.708Total net current deferred tax assets
14.32910.10114.940Net deferred tax ( liabilities ) assets
8 ( 23.404 )|$ ( 27.013 )$ ( 24.692 )
", + "page_start": 48, + "page_end": 48, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "**NOTES TO THE CONSOLIDATED FINANCIAL STATEMENTS**\n\n\n \n \n \n \n [html]\n
Year ended 31 December2014 US $ 70002013 US $ 7000
c )Unused tax losses and temporary differences for whichno deferred tax asset has been recognised at 30 %
2.685170d )
Deferred tax charged directly to equity :-Equity raising costs
1.147665-
Currency translation adjustment( 268 )-
", + "page_start": 78, + "page_end": 78, + "source_file": "ASX_SEA_2014.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed12.pdf", + "query": "What was the muscle volume of the knee flexors of the 2024 word's strongest man ?", + "target_page": 7, + "target_passage": "Knee flexors 3,060 ", + "chunk_present": { + "presence": true, + "index": 8 + } + }, + "top_chunk": [ + { + "text": "0 1000 2000 3000 4000 5000 \n\n**QF volume (cm3)**\n\nFigure 4. Quadriceps femoris (QF; A), \nvastus medialis (VM; B), vastus lateralis \n(VL; C), vastus intermedius (VI; D), and rec- \ntus femoris (RF; E) muscle volume of a \nWorld’s Strongest Man and deadlift cham- \npion (WSM) compared with long-term re- \nsistance-trained (n ¼ 16, from the work by \nMaden-Wilkinson et al. \n(10)], elite sprint \nrunners [n ¼ 5, from the work by Miller \net al. (13)], subelite sprint runners [n ¼ 26, \nfrom the work by Miller et al. (13)], and \nuntrained control populations [n ¼ 102, \npooled population from the works by \nMiller et al. (13) (n ¼ 11), Balshaw et al. (11) \n(n ¼ 52), and Balshaw et al. (14) (pretest \ndata n ¼ 39)]. \n\n**B** **C**\n\nWSM \n\nLong-term resistance-trained \n\n**D**", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed12.pdf" + }, + { + "text": "1500 1800 \n\nFigure 5. Overall hamstrings (HAMS; A), \nsemimembranosus (SM; B), semitendino- \nsus (ST; C), biceps femoris long head \n(BFlh; D), and biceps femoris short head \n(BFsh; E) muscle volume of a World’s \nStrongest Man and deadlift champion \n(WSM) compared with long-term resist- \nance trained [n ¼ 16, from the work by \n(10)], elite sprint \nMaden-Wilkinson et al. \nrunners [n ¼ 5, from the work by Miller et \nal. (13)], subelite sprint runners [n ¼ 26, \nfrom the work by Miller et al. (13)], and \nuntrained control populations [n ¼ 50, \npooled population from the works by \nMiller et al. (13) (n ¼ 11) and Balshaw et al. \n(14) (pretest data n ¼ 39)]. \n\n0 100 200 300 400 500 600 \n\n**ST volume (cm3)**\n\n**D** **E**\n\nWSM \n\nLong-term resistance-trained ", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed12.pdf" + }, + { + "text": "This study compared the muscle and tendon morphology of an extraordinarily strong individual, a World’s Strongest Man and deadlift \nchampion (WSM), with that of various other athletic, trained, and untrained populations. The WSM completed the following: 1) 3.0-T \nMRI scans, to determine the volume of 22 individual lower limb muscles, 5 functional muscle groups, patellar tendon (PT) cross-sec- \ntional area (CSA), and PT moment arm; and 2) countermovement jumps (CMJ) and isometric midthigh pull (IMTP) contractions. The \nWSM was compared with previously assessed groups from our laboratory (muscle and tendon) and the wider research literature \n(CMJ and IMTP). The WSM’s CMJ peak power (9,866 W) and gross (9,171 N) and net (7,480 N) IMTP peak forces were higher than \nany previously published values. The WSM’s overall measured leg muscle volume was approximately twice that of untrained controls \n( þ 96%) but with pronounced anatomical variability in the extent of muscular development. The plantar flexor group ( þ 120%) and the \nguy rope muscles (sartorius, gracilis, and semitendinosus: þ 140% to þ 202%), which stabilize the pelvis and femur, demonstrated the \nlargest differences relative to that of untrained controls. The WSM’s pronounced quadriceps size (greater than or equal to twofold vs. \nuntrained) was accompanied by modest PT moment arm differences and, notably, was not matched by an equivalent difference in PT \nCSA ( þ 30%). These results provide novel insight into the musculotendinous characteristics of an extraordinarily strong individual, \nwhich may be toward the upper limit of human variation, such that the WSM’s very pronounced lower limb muscularity also exhibited \ndistinct anatomical variability and with muscle size largely uncoupled from tendon size. ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed12.pdf" + }, + { + "text": "In this paper, we present the findings from a unique op- \nportunity to examine the laboratory function, muscle size, \nand distribution of muscle mass, as well as patellar tendon \nsize and moment arm, of a World’s Strongest Man and dead- \nlift champion (WSM) in comparison with existing data on \nuntrained individuals, power athletes (100-m-track sprint- \ners), and long-term resistance-trained populations that we \nhave assessed previously (10, 11, 13–15). \n\nMRI Measurement of Muscle Tendon Unit Morphology \nand Moment Arm \nMATERIALS AND METHODS \n\nParticipant \n\nThe WSM’s achievements included one World’s Strongest \nMan title (14 mo prior to measurement), five Britain’s \nStrongest Man titles (the most recent 6 mo prior to measure- \nment), twice being World Deadlift Champion and Deadlift \nWorld Record holder (500 kg; at the time of measurement), \nand second place at Europe’s Strongest Man. Prior to agreeing \nto participate, the purpose of the research study and the test- \ning procedures were explained to the participant along with \nthe risks and benefits of taking part. The participant gave his \nwritten informed consent to participate in the study that was \napproved by the Loughborough University Ethical Advisory \nCommittee (Ethics Number R18-P090). Included in the writ- \nten consent was a statement providing permission for publi- \ncation of the collected data and the likelihood that their \nidentity may be evident based on their achievements and \ncharacteristics, despite anonymization. ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed12.pdf" + }, + { + "text": "NEW & NOTEWORTHY Lower-body muscle size of an extraordinarily strong individual, a World’s Strongest Man and deadlift \nchampion (WSM), was approximately twice that of controls but was underpinned by pronounced anatomical variability in the \nextent of muscular development ( þ 23–202%): the plantar flexor group and guy rope muscles demonstrating the largest differen- \nces. The WSM’s quadriceps size (more than or equal to twice that of controls) contrasted with modest differences in patella ten- \ndon moment arm ( þ 18%) and was uncoupled from patellar tendon size ( þ 30%). \n\nisometric force; magnetic resonance imaging; power; strength ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed12.pdf" + }, + { + "text": "sprinters (3,218 ± 400 cm3; Fig. 4A). Moreover, the WSM’s \nquadriceps femoris was 18% larger than the most muscular \nindividual we have previously assessed (elite sprinter: 3,716 \ncm3). The volumes of the individual vasti muscles of the WSM \n(VL: 1,508 cm3; VI: 1,336 cm3; VM: 1,088 cm3) were 130–138% \nlarger than untrained controls (VL: 633 ± 117 cm3; VI: 581 ± 120 \ncm3; VM: 461 ± 89 cm3) and also greater than any trained/ath- \nletic individual we have previously assessed (Fig. 4, B–D). \nHowever, the WSM’s RF (453 cm3) was not quite so large, being \n76% greater than untrained controls (257 ± 57 cm3) but smaller \nthan the average elite sprinter ((cid:5)5%; Fig. 4E), 13% greater than \nsubelite sprinters, and 21% greater than long-term resistance- \ntrained individuals. \n\nCompared with untrained control participants (n ¼ 11), \nall 22 of the WSM’s individual muscles/compartments \nwere larger than untrained controls (Table 2 and Fig. 3). \nHowever, the differences in muscle volume were extremely \nvariable, with the biggest differences being for the “guy \nropes,” which were 2.5–3.0 times that of untrained controls \n( þ 140% gracilis; þ 157% ST; þ 202% sartorius), compared \nwith more modest differences such as 23% (BFsh) and 32% \n(iliopsoas) greater. ", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed12.pdf" + }, + { + "text": "+201.9% \n+157.1% \n+139.8% \n+134.6% \n+128.6% \n+113.8% \n+112.7% \n+105.4% \n+105.2% \n+103.0% \n+101.0% \n+98.8% \n+96.5% \n+94.1% \n+65.6% \n+52.9% \n+49.8% \n+49.6% \n+42.2% \n+32.4% \n+24.6% \n+23.1% \n\n0 250 \n\n**Difference in muscle volume (%)**\n\nFigure 3. Percentage differences in muscle volumes of all muscles, 5 func- \ntional muscle groups, and 23 individual muscles/compartments between \nthe World’s Strongest Man and deadlift champion (WSM; n ¼ 1) and \nuntrained control participants (n ¼ 11) from the work by Miller et al. (13). A \npositive value indicates greater muscle volume of WSM relative to the \ngroup mean of the untrained controls. The functional muscle groups and \nindividual muscles are ordered according to the magnitude of the percent- \nage differences for absolute muscle volume. ", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed12.pdf" + }, + { + "text": "The total unilateral muscle volume of the 22 measured \nmuscles/compartments of WSM (14,922 cm3) was nearly \ntwice that of a relatively modest (n ¼ 11) sample of untrained \ncontrols (7,628 ± 1,548 cm3; þ 96%; Fig. 3), while being 63% \ngreater than subelite (9,164 ± 1,207 cm3) and þ 32% greater \nthan elite 100-m sprinters (11,323 ± 1,328 cm3; Table 2). The \nmuscle group differences were largest for the plantar flexors \n( þ 120% vs. untrained; þ 100% vs. subelite sprinters; þ 70% \nvs. elite sprinters) and smallest for the hip flexors ( þ 65% vs. \nuntrained; þ 30% vs. subelite sprinters; þ 5% vs. elite \nsprinters). The WSM had the highest values of any individ- \nual we have observed for four out of five muscle groups, but \nnot the hip flexors, which were inferior to three of the elite \n100-m sprinters (n ¼ 5). ", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed12.pdf" + }, + { + "text": "and net) and CMJ power values previously reported by 54%, \n100%, and 164%, respectively. The WSM had overall lower- \nbody muscularity approximately twice that of untrained con- \ntrols ( þ 96%) and 32% greater than that of elite 100-m sprint- \ners. However, there was substantial anatomical variability in \nthe magnitude of the differences, ranging from the plantar \nflexors ( þ 120% vs. untrained) to the hip flexors ( þ 65% vs. \nuntrained). Similarly, some specific muscles, such as the guy \nrope muscles that stabilize the femur and pelvis, were 2.5–3.0 \ntimes the volume of untrained individuals (gracilis þ 140%, \nsemitendinosus þ 157%, and sartorius þ 202%) but others dis- \nplayed more marginal differences (BFsh þ 23%, iliopsoas \nþ 32% vs. untrained). Considering the knee extensors, the \nWSM had both quadriceps femoris volume greater than or \nequal to twofold that of untrained controls and a greater pa- \ntella tendon moment arm than we have previously measured \n( þ 18% vs. untrained), which would be expected to combine \nto facilitate extraordinary strength. Furthermore, despite the \nWSM’s extremely large quadriceps femoris, their patellar ten- \ndon CSA was only 30% greater than that of untrained controls \nand not outside the range of tendons we have previously \nassessed. The results of this study provide novel insights into \nthe muscle and tendon characteristics, as well as the strength \nand power capabilities, of an extraordinarily strong individual \nthat may be toward the upper limit of human variation in \nthese characteristics. ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed12.pdf" + }, + { + "text": "Overall hamstring volume of the WSM (1,545 cm3) was \n109% greater than a large pooled population of untrained con- \ntrols (739 ± 142 cm3; n ¼ 50), 44% greater than subelite sprint- \ners (1,075 ± 178 cm3), 53% greater than long-term resistance- \ntrained individuals (1,011 ± 142 cm3), and 17% greater than elite \nsprinters (1,315 ± 130 cm3; Fig. 5A). The WSM’s hamstring vol- \nume was also marginally larger ( þ 3%) than the most muscu- \nlar individual we have previously assessed (subelite sprinter, \n1,495 cm3). The ST (563 cm3) and BFlh (454 cm3) volumes of \nthe WSM were 132–182% larger than that of the pooled popula- \ntion of untrained controls (ST: 200 ± 48 cm3; BFlh: 196 ± 47 \ncm3; Fig. 5, C and D) and greater than the mean of any \ntrained/athletic group we have previously assessed (Fig. 5, C \nand D). SM (392 cm3) volume of the WSM was 66% greater \nthan untrained controls (SM 236 ± 46 cm3) and greater than \nthe mean for trained/athletic groups we have previously ", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed12.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed12.pdf", + "query": "What are the nutritionnal added components to the word's strongest man regime ?", + "target_page": 2, + "target_passage": "The WSM’s nutritional supplement consumption included protein, branched-chain amino acids, and electrolytes", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "INTRODUCTION \nhealthy aging (5). However, our knowledge of extreme human \nstrength is limited. \n\nTo date, there is little scientific information on the charac- \nteristics of extremely strong humans in terms of laboratory- \nbased tests of strength and power, particularly the size and dis- \ntribution of their muscle mass, as well as tendon size and joint \nmechanics (moment arm). Kraemer et al. (6) examined the \nbody composition of elite strongman competitors using dual- \nenergy X-ray absorptiometry scanning and found that they \nhad a body mass (153 ± 19 kg) and lean mass (118 ± 12 kg) \napproximately twice that of an average untrained healthy \nyoung man. Whole body skeletal muscle mass of athletes from \nstrength- and power-based sports has also been estimated \nusing ultrasound measurements at a limited number of ana- \ntomical locations (7, 8). However, neither ultrasound-derived Feats of strength have fascinated man since the early stages \nof human civilization, as shown by the archeological evidence \nof inscribed heavy stones at Olympia and Thera in Greece, \ndated to the 6th century BC, detailing the way they were lifted \nby Bybon and Eumastus, respectively (1). Over the centuries, \nmany types of strength competitions have existed; some of \nwhich have been codified and endured within modern sport- \ning competitions (e.g., weightlifting, powerlifting, and shot \nput). In addition, professional strongman competitions, such \nas the annually contested “World’s Strongest Man” event, \ngenerate extensive global interest (2). Moreover, scientific \nunderstanding of muscular strength is important because of \nits role in athletic performance (3), injury prevention (4), and ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed12.pdf" + }, + { + "text": "1500 1800 \n\nFigure 5. Overall hamstrings (HAMS; A), \nsemimembranosus (SM; B), semitendino- \nsus (ST; C), biceps femoris long head \n(BFlh; D), and biceps femoris short head \n(BFsh; E) muscle volume of a World’s \nStrongest Man and deadlift champion \n(WSM) compared with long-term resist- \nance trained [n ¼ 16, from the work by \n(10)], elite sprint \nMaden-Wilkinson et al. \nrunners [n ¼ 5, from the work by Miller et \nal. (13)], subelite sprint runners [n ¼ 26, \nfrom the work by Miller et al. (13)], and \nuntrained control populations [n ¼ 50, \npooled population from the works by \nMiller et al. (13) (n ¼ 11) and Balshaw et al. \n(14) (pretest data n ¼ 39)]. \n\n0 100 200 300 400 500 600 \n\n**ST volume (cm3)**\n\n**D** **E**\n\nWSM \n\nLong-term resistance-trained ", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed12.pdf" + }, + { + "text": "1. \n\nCrowther NB. Weightlifting in antiquity: achievement and training. \nGreece Rome 24: 111–120, 1977. doi:10.1017/s0017383500018416. \n2. Dixon E. How Wave.tv is making the World’s Strongest Man think \nbigger with its digital plans (Online). SportsPro, 2020.https://www. \nsportspromedia.com/insights/analysis/worlds-strongest-man-wavetv- \nthe-pump-snapchat-brian-verne-interview/ [Apr 6, 2024]. \nSuchomel TJ, Nimphius S, Stone MH. The importance of muscular \nstrength in athletic performance. Sports Med 46: 1419–1449, 2016. \ndoi:10.1007/s40279-016-0486-0. \n\n3. \n\n4. Opar DA, Williams MD, Timmins RG, Hickey J, Duhig SJ, Shield AJ. \nEccentric hamstring strength and hamstring injury risk in Australian \nfootballers. Med Sci Sports Exerc 47: 857–865, 2015. doi:10.1249/ \nmss.0000000000000465. ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed12.pdf" + }, + { + "text": "This study compared the muscle and tendon morphology of an extraordinarily strong individual, a World’s Strongest Man and deadlift \nchampion (WSM), with that of various other athletic, trained, and untrained populations. The WSM completed the following: 1) 3.0-T \nMRI scans, to determine the volume of 22 individual lower limb muscles, 5 functional muscle groups, patellar tendon (PT) cross-sec- \ntional area (CSA), and PT moment arm; and 2) countermovement jumps (CMJ) and isometric midthigh pull (IMTP) contractions. The \nWSM was compared with previously assessed groups from our laboratory (muscle and tendon) and the wider research literature \n(CMJ and IMTP). The WSM’s CMJ peak power (9,866 W) and gross (9,171 N) and net (7,480 N) IMTP peak forces were higher than \nany previously published values. The WSM’s overall measured leg muscle volume was approximately twice that of untrained controls \n( þ 96%) but with pronounced anatomical variability in the extent of muscular development. The plantar flexor group ( þ 120%) and the \nguy rope muscles (sartorius, gracilis, and semitendinosus: þ 140% to þ 202%), which stabilize the pelvis and femur, demonstrated the \nlargest differences relative to that of untrained controls. The WSM’s pronounced quadriceps size (greater than or equal to twofold vs. \nuntrained) was accompanied by modest PT moment arm differences and, notably, was not matched by an equivalent difference in PT \nCSA ( þ 30%). These results provide novel insight into the musculotendinous characteristics of an extraordinarily strong individual, \nwhich may be toward the upper limit of human variation, such that the WSM’s very pronounced lower limb muscularity also exhibited \ndistinct anatomical variability and with muscle size largely uncoupled from tendon size. ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed12.pdf" + }, + { + "text": "NEW & NOTEWORTHY Lower-body muscle size of an extraordinarily strong individual, a World’s Strongest Man and deadlift \nchampion (WSM), was approximately twice that of controls but was underpinned by pronounced anatomical variability in the \nextent of muscular development ( þ 23–202%): the plantar flexor group and guy rope muscles demonstrating the largest differen- \nces. The WSM’s quadriceps size (more than or equal to twice that of controls) contrasted with modest differences in patella ten- \ndon moment arm ( þ 18%) and was uncoupled from patellar tendon size ( þ 30%). \n\nisometric force; magnetic resonance imaging; power; strength ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed12.pdf" + }, + { + "text": "RESEARCH ARTICLE \n\nMuscle and tendon morphology of a world strongman and deadlift champion \n\nThomas G. Balshaw,1 Garry J. Massey,1,2 \nThomas M. Maden-Wilkinson,6 and \n\nRobert Miller,1,3,4 Emmet J. McDermott,1,5 \n\nJonathan P. Folland1 \n\n1School of Sport, Exercise, and Health Sciences, Loughborough University, Loughborough, United Kingdom; 2College of Life \nand Environmental Sciences, University of Exeter, Exeter, United Kingdom; 3UK Athletics, Loughborough University, \nLoughborough, United Kingdom; 4Department of Sport Science, Aspire Academy, Doha, Qatar; 5Department of Physical \nEducation and Sport Sciences, University of Limerick, Limerick, Ireland; and 6Academy of Sport and Physical Activity, Faculty \nof Health and Wellbeing, Sheffield Hallam University, Sheffield, United Kingdom \n\nAbstract ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed12.pdf" + }, + { + "text": "DISCUSSION \n\nThis study is the first to document the lower-body muscle \nand tendon morphology of a World’s Strongest Man and \ndeadlift champion (i.e., an exceptionally strong individual), \nand these are presented alongside functional whole body \nassessments, which exceeded the highest IMTP force (gross \n\nJ Appl Physiol (cid:4) doi:10.1152/japplphysiol.00342.2024 (cid:4) www.jappl.org ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed12.pdf" + }, + { + "text": "In this paper, we present the findings from a unique op- \nportunity to examine the laboratory function, muscle size, \nand distribution of muscle mass, as well as patellar tendon \nsize and moment arm, of a World’s Strongest Man and dead- \nlift champion (WSM) in comparison with existing data on \nuntrained individuals, power athletes (100-m-track sprint- \ners), and long-term resistance-trained populations that we \nhave assessed previously (10, 11, 13–15). \n\nMRI Measurement of Muscle Tendon Unit Morphology \nand Moment Arm \nMATERIALS AND METHODS \n\nParticipant \n\nThe WSM’s achievements included one World’s Strongest \nMan title (14 mo prior to measurement), five Britain’s \nStrongest Man titles (the most recent 6 mo prior to measure- \nment), twice being World Deadlift Champion and Deadlift \nWorld Record holder (500 kg; at the time of measurement), \nand second place at Europe’s Strongest Man. Prior to agreeing \nto participate, the purpose of the research study and the test- \ning procedures were explained to the participant along with \nthe risks and benefits of taking part. The participant gave his \nwritten informed consent to participate in the study that was \napproved by the Loughborough University Ethical Advisory \nCommittee (Ethics Number R18-P090). Included in the writ- \nten consent was a statement providing permission for publi- \ncation of the collected data and the likelihood that their \nidentity may be evident based on their achievements and \ncharacteristics, despite anonymization. ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed12.pdf" + }, + { + "text": "\n\n- \n\ni\\ \nULTIMATE \nSTRENGTH ", + "page_start": 362, + "page_end": 362, + "source_file": "00-80T-80.pdf" + }, + { + "text": "8. \n\nAbe T, Buckner SL, Mattocks KT, Jessee MB, Dankel SJ, Mouser \nJG, Bell ZW, Loenneke JP. Skeletal muscle mass and architecture \nof the world’s strongest raw powerlifter: a case study. Asian J Sports \nMed 9: e61763, 2018. doi:10.5812/asjsm.61763. \nPowell PL, Roy RR, Kanim P, Bello MA, Edgerton VR. Predictability \nof skeletal muscle tension from architectural determinations in \nguinea pig hindlimbs. J Appl Physiol Respir Environ Exerc Physiol \n57: 1715–1721, 1984. doi:10.1152/jappl.1984.57.6.1715. \n\n9. \n\n27. Cunningham DJ, Shearer DA, Drawer S, Pollard B, Cook CJ, \nBennett M, Russell M, Kilduff LP. Relationships between physical \nqualities and key performance indicators during match-play in senior \ninternational rugby union players. PLoS One 13: e0202811, 2018. \ndoi:10.1371/journal.pone.0202811. \n\n10. Maden-Wilkinson TM, Balshaw TG, Massey G, Folland JP. What \nmakes long-term resistance-trained individuals so strong? A com- \nparison of skeletal muscle morphology, architecture, and joint \nmechanics. J Appl Physiol (1985) 128: 1000–1011, 2019. doi:10.1152/ \njapplphysiol.00224.2019. \nBalshaw TG, Maden-Wilkinson TM, Massey GJ, Folland JP. The \nhuman muscle size and strength relationship: effects of architecture, \nmuscle force, and measurement location. Med Sci Sports Exerc 53: \n2140–2151, 2021. doi:10.1249/mss.0000000000002691. \n\n28. Doyle TLA, Fain AC, Wills JA, Cooper D, Toonen K, Kamphius B. \nMeasures of \nlower body strength associated with injuries in \nAustralian special forces selection candidates. J Appl Biomech 38: \n255–262, 2022. doi:10.1123/jab.2021-0134. \n\n29. Kawamori N, Rossi SJ, Justice BD, Haff EE, Pistilli EE, O’Bryant HS, \nStone MH, Haff GG. Peak force and rate of force development dur- \ning isometric and dynamic mid-thigh clean pulls performed at vari- \nous intensities. J Strength Cond Res 20: 483–491, 2006. doi:10.1519/ \n18025.1. \n\n11. ", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed12.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed12.pdf", + "query": "Why constraint made the scanning of the word's strongest man's upper body impossible using a MRI ?", + "target_page": 10, + "target_passage": "Despite using a wide-bore MRI scanner, due to the size of the WSM’s shoulders and arms, it was not possible to scan their upper body", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Although the current investigation provides a detailed \nassessment of an individual at/toward the upper limit of \nhuman strength performance, it is important to appreciate \nstudy limitations. First, the participant was not measured im- \nmediately before their World’s Strongest Man championship \nsuccess or other landmark performances, and it is entirely pos- \nsible the functional and structural characteristics we assessed \nmay have been even higher directly prior to peak performan- \nces. Despite using a wide-bore MRI scanner, due to the size of \nthe WSM’s shoulders and arms, it was not possible to scan their \nupper body. Thus, we were not able to investigate this aspect of \nthe WSM’s muscle morphology; although given that greater hy- \npertrophy occurs in the upper body compared with the lower \nbody (42), it is possible that the WSM’s upper-body muscle size \nrelative to untrained controls may have been even more pro- \nnounced than what we have documented for the lower body. \nIn the current study to provide the most representative data on \nuntrained control participants, the largest available untrained \ncontrol populations were used for each category of measure- \nments. Thus, different untrained control populations were \nused [e.g., comparison of quadricep and hamstring size (n ¼ \n102) vs. comparison of all the leg muscles (n ¼ 11)], which led to \nsome subtle discrepancies in the contrasts between these \ngroups and the WSM [e.g., quadriceps femoris/knee extensors, \nþ 127% and þ 99% relative to our large pooled (n ¼ 102) and \nsmaller (n ¼ 11) untrained control samples, respectively]. \nImportantly, however, this discrepancy does not appear to \nmeaningfully affect the interpretation of the findings. There \nwere subtle differences in the precise scanning and analysis \napproaches used with the reference populations featured in \nthis study, including 1) magnetic field strength [1.5 T (10, 11, 15) \nvs. 3.0 T, WSM and (13, 14)]; 2) the interslice distance used to \nquantify quadriceps femoris and hamstrings muscle volume \n[1.5 cm (10, 11, 14) vs. 2.0 cm, WSM and (13)]; 3) the calculation \nof muscle volume [area under the cubic spline ACSA-muscle \nlength curve: (10, 11, 14) vs. the equation detailed earlier: WSM \nand (13)]; and 4) the use of unilateral MRI measures derived \nfrom one limb (10, 11, 14, 15) or collapsed across two limbs \n[WSM and (13)]. However, it seems likely that these subtle dif- \nferences would have had at most a very minor effect on the \nfindings. Finally, it is also important to highlight that the differ- \nences documented between the WSM and comparative popula- \ntions for the various measures included in the current study \ncannot be assumed to be anything other than a combination of \nboth innate (genetic) and environmental (training and nutri- \ntion) factors. ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed12.pdf" + }, + { + "text": "The participant reported for their MRI scan [3.0-T \nDiscovery MR750W (70-cm-wide bore), GE Medical] having \nnot completed any strenuous physical activity in (cid:2)24 h and \nhad received prior instruction to arrive in a relaxed state hav- \ning eaten and drunk normally. The participant sat quietly for \n15 min prior to their scan. The participant lay supine for the \nMRI scan of the lower-body musculature from T12 to the lat- \neral malleolus. A body coil (GE Medical) allowed axial T1- \nweighted images (time of repetition/time to echo 600/8.144 \nms, image matrix 512 (cid:3) 512, field of view 500 (cid:3) 500 mm, \npixel size 0.9766 (cid:3) 0.9766 mm, slice thickness 5 mm, and \ninterslice gap 5 mm) to be acquired in five overlapping \nblocks. Images of both sides of the body were acquired \nwithin a single scan for blocks 1 (T12 to pelvis), 4 (knee joint \nspace to midshank), and 5 (midshank to lateral malleolus). \nHowever, due to the size of the participant’s thighs, it was \nnecessary to scan each thigh individually for blocks 2 (pelvis \nto midthigh) and 3 (midthigh to knee joint space); this \ninvolved the radiographer repositioning the field of view \nbetween scanning the first and the second thigh but not \nphysically moving the coil or the participant. Oil-filled cap- \nsules were secured to the surface of the participant’s skin \nwith Transpore tape at intervals along the length of the lower \nbody prior to the scan and in an offline analysis used to ver- \nify the alignment of the blocks (Horos software, Version 3.36, \nhttps://horosproject.org/). ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed12.pdf" + }, + { + "text": "Figure 1. Example axial MRI images from \nthe World’s Strongest Man and deadlift \nchampion (WSM; A–C) and an untrained \nfrom the hip \ncontrol participant \n(A and D), thigh (B and E), and lower leg (C \nand F). Image location relative to femur \nand shank length was matched between \nthe WSM and the untrained control as fol- \nlows: hip image is at approximately midfe- \nmoral head, thigh image is at (cid:6)52% of \nfemur length (0% is distal end of femur, \n100% is greater trochanter), and lower leg \nimage is at (cid:6)70% of shank length (0% is \nlateral malleolus, 100% is proximal end of \ntibia). The untrained control participant \ndisplayed was from the work by Miller et al. \n(13) and had a total measured muscle vol- \nume of all measured muscles that was 5.1% \nsmaller than the mean of the untrained \ngroup within that study. \n\n(D–F) ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed12.pdf" + }, + { + "text": "In this paper, we present the findings from a unique op- \nportunity to examine the laboratory function, muscle size, \nand distribution of muscle mass, as well as patellar tendon \nsize and moment arm, of a World’s Strongest Man and dead- \nlift champion (WSM) in comparison with existing data on \nuntrained individuals, power athletes (100-m-track sprint- \ners), and long-term resistance-trained populations that we \nhave assessed previously (10, 11, 13–15). \n\nMRI Measurement of Muscle Tendon Unit Morphology \nand Moment Arm \nMATERIALS AND METHODS \n\nParticipant \n\nThe WSM’s achievements included one World’s Strongest \nMan title (14 mo prior to measurement), five Britain’s \nStrongest Man titles (the most recent 6 mo prior to measure- \nment), twice being World Deadlift Champion and Deadlift \nWorld Record holder (500 kg; at the time of measurement), \nand second place at Europe’s Strongest Man. Prior to agreeing \nto participate, the purpose of the research study and the test- \ning procedures were explained to the participant along with \nthe risks and benefits of taking part. The participant gave his \nwritten informed consent to participate in the study that was \napproved by the Loughborough University Ethical Advisory \nCommittee (Ethics Number R18-P090). Included in the writ- \nten consent was a statement providing permission for publi- \ncation of the collected data and the likelihood that their \nidentity may be evident based on their achievements and \ncharacteristics, despite anonymization. ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed12.pdf" + }, + { + "text": "DISCUSSION \n\nThis study is the first to document the lower-body muscle \nand tendon morphology of a World’s Strongest Man and \ndeadlift champion (i.e., an exceptionally strong individual), \nand these are presented alongside functional whole body \nassessments, which exceeded the highest IMTP force (gross \n\nJ Appl Physiol (cid:4) doi:10.1152/japplphysiol.00342.2024 (cid:4) www.jappl.org ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed12.pdf" + }, + { + "text": "INTRODUCTION \nhealthy aging (5). However, our knowledge of extreme human \nstrength is limited. \n\nTo date, there is little scientific information on the charac- \nteristics of extremely strong humans in terms of laboratory- \nbased tests of strength and power, particularly the size and dis- \ntribution of their muscle mass, as well as tendon size and joint \nmechanics (moment arm). Kraemer et al. (6) examined the \nbody composition of elite strongman competitors using dual- \nenergy X-ray absorptiometry scanning and found that they \nhad a body mass (153 ± 19 kg) and lean mass (118 ± 12 kg) \napproximately twice that of an average untrained healthy \nyoung man. Whole body skeletal muscle mass of athletes from \nstrength- and power-based sports has also been estimated \nusing ultrasound measurements at a limited number of ana- \ntomical locations (7, 8). However, neither ultrasound-derived Feats of strength have fascinated man since the early stages \nof human civilization, as shown by the archeological evidence \nof inscribed heavy stones at Olympia and Thera in Greece, \ndated to the 6th century BC, detailing the way they were lifted \nby Bybon and Eumastus, respectively (1). Over the centuries, \nmany types of strength competitions have existed; some of \nwhich have been codified and endured within modern sport- \ning competitions (e.g., weightlifting, powerlifting, and shot \nput). In addition, professional strongman competitions, such \nas the annually contested “World’s Strongest Man” event, \ngenerate extensive global interest (2). Moreover, scientific \nunderstanding of muscular strength is important because of \nits role in athletic performance (3), injury prevention (4), and ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed12.pdf" + }, + { + "text": "\n\nSTRENGTH \n\nQ \nFAILURE ", + "page_start": 344, + "page_end": 344, + "source_file": "00-80T-80.pdf" + }, + { + "text": "This study compared the muscle and tendon morphology of an extraordinarily strong individual, a World’s Strongest Man and deadlift \nchampion (WSM), with that of various other athletic, trained, and untrained populations. The WSM completed the following: 1) 3.0-T \nMRI scans, to determine the volume of 22 individual lower limb muscles, 5 functional muscle groups, patellar tendon (PT) cross-sec- \ntional area (CSA), and PT moment arm; and 2) countermovement jumps (CMJ) and isometric midthigh pull (IMTP) contractions. The \nWSM was compared with previously assessed groups from our laboratory (muscle and tendon) and the wider research literature \n(CMJ and IMTP). The WSM’s CMJ peak power (9,866 W) and gross (9,171 N) and net (7,480 N) IMTP peak forces were higher than \nany previously published values. The WSM’s overall measured leg muscle volume was approximately twice that of untrained controls \n( þ 96%) but with pronounced anatomical variability in the extent of muscular development. The plantar flexor group ( þ 120%) and the \nguy rope muscles (sartorius, gracilis, and semitendinosus: þ 140% to þ 202%), which stabilize the pelvis and femur, demonstrated the \nlargest differences relative to that of untrained controls. The WSM’s pronounced quadriceps size (greater than or equal to twofold vs. \nuntrained) was accompanied by modest PT moment arm differences and, notably, was not matched by an equivalent difference in PT \nCSA ( þ 30%). These results provide novel insight into the musculotendinous characteristics of an extraordinarily strong individual, \nwhich may be toward the upper limit of human variation, such that the WSM’s very pronounced lower limb muscularity also exhibited \ndistinct anatomical variability and with muscle size largely uncoupled from tendon size. ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed12.pdf" + }, + { + "text": "Xn(cid:5)1 \nh \nVm ¼ ðAmi þ Ami þ 1Þ \n2 \ni¼1 \n\nwhere Am represents the muscle CSA calculated from each \nimage, i is the image number, n is the total number of \nimages, and h is the distance between images. The volume of \nfive functional muscle groups was calculated as the sum \nof the following muscles: hip extensors (gluteus maxi- \nmus, adductor magnus, BFlh, SM, and ST), hip flexors \n(iliopsoas, RF, sartorius, and tensor fasciae latae), knee \nextensors (RF, VI, VM, and VL), knee flexors (gracilis, \nBFlh and BFsh, SM, ST, sartorius, popliteus, and medial \nand lateral gastrocnemius), and plantarflexors (medial \nand lateral gastrocnemius and soleus). The sum of all the \nmeasured lower-body muscles was also quantified as the \nvolume of “all muscles.” \n\nOnce muscle MRI scanning had been completed, a flex \ncoil (GE Medical) was used to acquire unilateral T1-weighted \naxial (time of repetition/time to echo 650/9.476 ms, image \nmatrix 512 (cid:3) 512, field of view 180 (cid:3) 180 mm, pixel size \n0.3516 (cid:3) 0.3516 mm, slice thickness 2 mm, and interslice gap \n0 mm) and sagittal images (time of repetition/time to echo \n606/9.512 ms, image matrix 512 (cid:3) 512, field of view 180 (cid:3) 180 \nmm, pixel size 0.3516 (cid:3) 0.3516 mm, slice thickness 2 mm, \nand interslice gap ¼ 0 mm) from both knee joints. The axial \nimages were obtained perpendicular to the line of the tendon \nfrom (cid:6)2 cm superior to the apex of the patella to (cid:6)2 cm ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed12.pdf" + }, + { + "text": "**MRI acquisition.**MRI scanning sessions at the University of Califor- \nnia, Santa Barbara and Irvine were conducted on 3T Prisma scanners \nequipped with 64-channel phased-array head/neck coil (of which 50 \ncoils are used for axial brain imaging). High-resolution anatomical scans \nwere acquired using a T1-weighted (T1w) magnetization prepared rapid \ngradient echo (MPRAGE) sequence (repetition time (TR) = 2,500 ms, \ntime to echo (TE) = 2.31 ms, inversion time (TI) = 934 ms, flip angle = 7°, \n0.8 mm thickness) followed by a gradient echo field map (TR = 758 ms, \nTE1 = 4.92 ms, TE2 = 7.38 ms, flip angle = 60°). A T2-weighted (T2w) \nturbo spin echo scan was also acquired with an oblique coronal orienta- \ntion positioned orthogonally to the main axis of the hippocampus (TR/ \nTE = 9,860/50 ms, flip angle = 122°, 0.4 × 0.4 mm2 in-plane resolution, \n2-mm slice thickness, 38 interleaved slices with no gap, total acquisi- \ntion time = 5 min and 42 sec). The Diffusion Spectrum Imaging (DSI) \nprotocol sampled the entire brain with the following parameters: \nsingle phase, TR = 4,300 ms, echo time = 100.2 ms, 139 directions, \n*b*-max = 4,990, FoV = 259 × 259 mm, 78 slices, 1.7986 × 1.7986 × 1.8 mm \nvoxel resolution. These images were linearly registered to the \nwhole-brain T1w MPRAGE image. A custom foam headcase was used \nto provide extra padding around the head and neck, as well as to mini- \nmize head motion. Additionally, a custom-built sound-absorbing foam \ngirdle was placed around the participant’s waist to attenuate sound \nnear the fetus during second-trimester and third-trimester scanning. ", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed4.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed13.pdf", + "query": "What is typical age at which multiple sclerosis is diagnosed ?", + "target_page": 2, + "target_passage": "Multiple sclerosis (MS) is a progressive inflammatory disease of the central nervous system (CNS) that is typically diagnosed at 30– 40 years of ag", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "1 Introduction \n\nMultiple sclerosis (MS) is a progressive inflammatory disease of \nthe central nervous system (CNS) that is typically diagnosed at 30– \n40 years of age (1). A great concern is the significantly lower levels \nof physical activity (PA) in people with MS (pwMS) across \ndisability levels than in their healthy counterparts (2, 3). ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed13.pdf" + }, + { + "text": "Prior to recruitment, the study was introduced to individuals \nwith multiple sclerosis (pwMS) through a seminar hosted by the \nNordland MS Association. Additionally, \nseminars were \nconducted for health professionals in community healthcare and \nat the regional hospital. Written information about this study \n(and the RCT) was sent from the MS clinic at the regional \nto all eligible individuals affiliated with the \nhospital by post \nIndividuals who wished to participate signed the \nhospital. \nattached consent \nin the pre-stamped \nfollows: had been \nenvelope. The inclusion criteria were as \ndiagnosed with MS, had a score on the Expanded Disability \nStatus Scale (EDSS) (29) of ≤3.5, was ≥18 years, was employed \n(10%–100% of \nfull-time) and residential address in the two \npredefined municipalities. The exclusion criteria were as follows: \npregnancy, exacerbation of symptoms within two weeks prior to \nenrollment and other serious conditions compromising balance, \nwalking or work capacity. All participants in the intervention \ngroup of the RCT (n = 15) were included (Table 3). \n\nform and returned it ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed13.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
2. Casey B, Coste S, Galvin R, Domndly A. Objector physical activity levels in people with multiple sclerosis : meta - analysis. Sured J Med Sci Sperts ( 2018 ) 28 ( 9 ): 1900 – 9 : doe 10.111 / oma 13214
3. Kimuth - Hopkin D, Adamon B, Rouguea R, Mofi RW, People with MS are less physically active than healthy controls but as active as those with other clientic diseases an updated muta - analysis. Multi Scler Relat Disead. ( 2017 ) 1338 – A3 doch
4. Houng PD, Lerd S, Gandevia S, Menant J. Eurcise and sports science Australia ( ESSA ) position statement on exercise for people with mild to moderate multiple sclerosis. J Sci Mad Sport. ( 2022 ) 25 ( 2 ) 146 – 54 doc 101010 ( t ) nama 201103
5. Didga - U, Langokon - Christensen M, Stmage E, Bimenschnider M, Fivid LG. Eurecise as medicine in multiple sclerosis - ine for a paradiges shift : preventive, symptomatic, and disease - modifying appects and perspectives. Carr Neuroly
6. Remonschnider M., Hival 1. G. Hisegued 1. Stypared MEE, Eskilleen SI, Gaemalke T, et al. Invotigating the potential doese - molifying and neuroprotective efficacy of exercise therapy cells in the disease course of multiple sclerosie
7. KaB - II, Itom TB, Coste S, Costello K, Dalga U, Garmon E, et al. Enexise and likelyle physical activity recommendations for people with multiple sclerosis througheut the disease course. Mult Scler. ( 2020 ) 26 ( 12 ) 149 – 69, due : 10113 / 10
6. Moreno - Naruro P, Mana a A, Martino G, Ventura L, Burhado D, Veno - Garcia FJ, et al. Too stoutest relatibility and known - groups validity of traumacie tento in people with multiple sclerosis : a cross - sciented, case control study. Phys :
9 Rate J, Arntan EC, Lamers I, Fey P, Normann B. What is the distribution of trank impairments and in velationship with disability level in individuals with multiple sclerosis? Multi - Relat Doord ( 2011 ) 5.10325. doc 10.10108 / mused 20112
", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed13.pdf" + }, + { + "text": "Figure 3, which shows the age of the individual at a positive test, also reveals that although the \naverage age at positive test is 32, the peak is quite flat, with high numbers of positive tests still \nbeing recorded by individuals in their late 30s and even into their 40s. ", + "page_start": 9, + "page_end": 9, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "1. Walton C, King R, Rechtman L, Kaye W, Leray E, Marrie RA, et al. Rising \ninsights from the Atlas of MS, third \n\n11. Unluer NO, Ozkan T, Yasa ME, Ates Y, Anlar O. Investigation of the \nrelationship between trunk motor control and balance, functional mobility, and gait \ncapacity in patients with multiple sclerosis/multipl sklerozlu hastalarda govde motor \nkontrolu ile denge, fonksiyonel mobilite ve yuruyus kapasitesi arasindaki iliskinin \nincelenmesi. Türk Nöroloji Dergisi. (2021) 27(3):283. doi: 10.4274/tdn.2021.41017 \n\nprevalence of multiple sclerosis worldwide: \nedition. Mult Scler. (2020) 26(14):1816–21. doi: 10.1177/1352458520970841 \n\n12. Learmonth YC, Motl RW. Physical activity and exercise training in multiple \nsclerosis: a review and content analysis of qualitative research identifying perceived \ndeterminants and consequences. Disabil Rehabil. (2016) 38(13):1227–42. doi: 10. \n3109/09638288.2015.1077397 \n\n13. Fikke HK, Normann B, Sivertsen M, Dahl SSH, Arntzen EC. Optimizing \nsensorimotor function, physical activity and employment for people with MS—a \n10.52705/ \nfeasibility \nc14a8ca05f7546dabc18bd0275cf2edd \n90(1):32–42. study. Fysioterapeuten. (2023) doi: \n\n14. Arntzen EC, Straume B, Odeh F, Feys P, Normann B. Group-based, \nindividualized, comprehensive core stability and balance intervention provides \nimmediate and long-term improvements in walking in individuals with multiple \nsclerosis: a randomized controlled trial. Physiother Res Int. (2019) 25(1):e1798. \ndoi: 10.1002/pri.1798 \n\n15. Arntzen EC, Straume BK, Odeh F, Feys P, Zanaboni P, Normann B. Group- \nbased individualized comprehensive core stability intervention improves balance in \npersons with multiple sclerosis: a randomized controlled trial. Phys Ther. (2019) 99 \n(8):1027–38. doi: 10.1093/ptj/pzz017 \n\n16. Arntzen EC, Øberg GK, Gallagher S, Normann B. Group-based, individualized \nexercises can provide perceived bodily changes and strengthen aspects of self in \nindividuals with MS: a qualitative interview study. Physiother Theory Pract. (2019) \n37(10):1080–95. doi: 10.1080/09593985.2019.1683923 \n\n17. Florio-Smith J, Ayer M, Colhoun S, Daykin N, Hamill B, Liu X, et al. The \nimportance of the patient’s perspective in decision-making in multiple sclerosis: \nresults of the OwnMS patient perspectives study. Mult Scler Relat Disord. (2023) \n75:104757. doi: 10.1016/j.msard.2023.104757 \n\n18. Kleim JA, Jones TA. Principles of experience-dependent neural plasticity: \nimplications for rehabilitation after brain damage. J Speech Lang Hear Res. (2008) \n51(1):225–39. doi: 10.1044/1092-4388(2008/018) \n19. Thompson E. Mind in Life: Biology, Phenomenology, and The Sciences of Mind. ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed13.pdf" + }, + { + "text": "21,274 excluded \n8,273 Previous diagnosis of asthma \n5,363 Previous diagnosis of COPD \n190 Age < 18 years \n1,763 Previous diagnosis of CF, bronchiectasis, pulmonary \nfibrosis, or lung cancer \n1,331 History of MI, heart problems, stroke, aortic or cerebral \naneurysm, eye surgery, or detached retina in past 3 mos. \n19 Pregnant, in the third trimester \n3,715 Under care of respirologist or using an inhaled respiratory ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "The mean age at test is 32 and the mean year of birth is 1977, implying that most of these \nindividuals were in their mid-to-late teens during the crime peak of the mid-1990s.9 Given \nevidence suggesting that the average age of initiation for opiate/crack use is around 18–20 \n(Millar et al., 2001), this age profile would tentatively suggest that OCU incidence also peaked in \nthe 1990s and that this created a large cohort of users who would be approaching 40 today. \n\nThe minimum and maximum years of birth are fixed by construction, because anyone born ", + "page_start": 8, + "page_end": 8, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "4.3 Methodological considerations \n\nfor deriving \nknowledge from individuals’ experiences. The participants self- \nreferred to the intervention and were recruited based on pre-set \ncriteria. This approach yielded rich information from people \nwith mild to moderate disabilities due to MS who were \n\nThe design and methods were adequate ", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed13.pdf" + }, + { + "text": "The mode age of initiation has shifted from around 18 to around 25 and there is an older age \nprofile throughout. Rises in average age of initiation have also been reported recently in cohorts \nof Australian injecting drug users (Horyniak et al., 2015). There appear to be two possible \nexplanations. \n\n There is a genuine shift towards new initiates being older, and for them to present to \n\ntreatment much faster than in previous years. \n\n There is a consistent, but small number of individuals who mis-report their age of onset \n\nwhen attending treatment i.e. who report that they have only been using opiates/crack for \na short period when in fact they have been using for a far longer period, and that this is \nstarting to really bias the numbers for recent cohorts because attendees from the original \nepidemic are becoming smaller. \n\nIt is possible then that the flattening we observe in the incidence trend is due to a small in-flux of \nolder initiates, although mis-reporting may also explain that phenomenon. Either way though, as \nthis analysis has made clear throughout, absolute numbers of new OCUs appear to be small – \nprobably fewer than 10,000 per annum and the numbers of those involved with crime will be \nsmaller still. In addition, despite a flattening in the probable trend in new users, there is currently \nno sign that it is likely to tip upwards. If anything, the data suggest the downward trend is set to \nresume, though clearly it remains important to monitor the situation. ", + "page_start": 28, + "page_end": 28, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "47. Herring TE, Knowles LM, Alschuler KN. Outdoor adventure programs for \npersons with multiple sclerosis: a review and agenda for future research. Int J MS \nCare. (2021) 23(4):186–92. doi: 10.7224/1537-2073.2020-066 \n\n48. Creswell JW, Poth CN. Qualitative Inquiry & Research Design: Choosing Among \nFive Approaches. 4th ed. California: Sage (2018). ", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed13.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed13.pdf", + "query": "What was the average year of the group that participated to the study concerning the impact of outdoor pysiotherapy on patient with multiple sclerosis", + "target_page": 4, + "target_passage": "Age in years Mean 47.6", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "2.3 Study context \n\ninterview study was nested within a randomized \n(RCT) comparing the CoreDISTparticipation \ncontrolled trial \nintervention to usual care (26) and conducted at a regional \nhospital MS-outpatient clinic (Nordland Hospital Trust) and in \ntwo affiliated municipalities in the northern Norway. The current \nintervention group’s \nstudy investigates participants \nexperiences of the four-week outdoor group, which was part of \nthis new intervention (Table 2). The outdoor sessions were \nconducted by three trained physiotherapists working in the \n\nThis \n\nin the ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed13.pdf" + }, + { + "text": "Background and purpose: Physical activity (PA) is often reduced in people with \nMS (pwMS), even when disability is low. Understanding the perspectives of pwMS \non interventions aiming to improve PA is important to inform the development \nof such services. The aim of \nthis study was to explore the experiences \nof pwMS participating in an outdoor, high-intensity and balance exercise \ngroup intervention. \nMethods: This qualitative study was nested within an RCT exploring a novel \nintervention integrating sensorimotor exercises with high-intensity intervals of \nin-depth interviews with the intervention group \nrunning/walking. \n(n = 15; 12 women, 3 men; age 38–66; EDSS score 0–3.5) were conducted \npostintervention (mean days = 14), analyzed using a phenomenological- \ninspired approach with systematic text condensation, and interpreted based on \nenactive theory. \nResults: Four categories were generated: (1) Exploration of one’s own physical \nabilities: Challenging one’s own limits was perceived by all participants to \nimprove movement performance and/or intensity level. Such bodily changes \nengendered strong positive feelings. Some negative consequences of high- \nintensity training were described, increasing a feeling of loss. (2) New insights \nand beliefs: Participants experienced enhanced beliefs \nin their own \ncapabilities, which they integrated in activities outside the intervention. (3) An \nengaging environment: The group setting was perceived as supportive, and \nthe outdoor environment was perceived as stimulating activity. (4) Professional \nleadership, \ntailoring and co-creation of enjoyment: Physiotherapist-led, \nindividualized interactions were regarded as necessary to safely revisit prior \nactivities, such as running. Co-creating enjoyment facilitated high-intensity \ntraining and intervention adherence. \n\nIndividual, ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed13.pdf" + }, + { + "text": "47. Herring TE, Knowles LM, Alschuler KN. Outdoor adventure programs for \npersons with multiple sclerosis: a review and agenda for future research. Int J MS \nCare. (2021) 23(4):186–92. doi: 10.7224/1537-2073.2020-066 \n\n48. Creswell JW, Poth CN. Qualitative Inquiry & Research Design: Choosing Among \nFive Approaches. 4th ed. California: Sage (2018). ", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed13.pdf" + }, + { + "text": "1. Walton C, King R, Rechtman L, Kaye W, Leray E, Marrie RA, et al. Rising \ninsights from the Atlas of MS, third \n\n11. Unluer NO, Ozkan T, Yasa ME, Ates Y, Anlar O. Investigation of the \nrelationship between trunk motor control and balance, functional mobility, and gait \ncapacity in patients with multiple sclerosis/multipl sklerozlu hastalarda govde motor \nkontrolu ile denge, fonksiyonel mobilite ve yuruyus kapasitesi arasindaki iliskinin \nincelenmesi. Türk Nöroloji Dergisi. (2021) 27(3):283. doi: 10.4274/tdn.2021.41017 \n\nprevalence of multiple sclerosis worldwide: \nedition. Mult Scler. (2020) 26(14):1816–21. doi: 10.1177/1352458520970841 \n\n12. Learmonth YC, Motl RW. Physical activity and exercise training in multiple \nsclerosis: a review and content analysis of qualitative research identifying perceived \ndeterminants and consequences. Disabil Rehabil. (2016) 38(13):1227–42. doi: 10. \n3109/09638288.2015.1077397 \n\n13. Fikke HK, Normann B, Sivertsen M, Dahl SSH, Arntzen EC. Optimizing \nsensorimotor function, physical activity and employment for people with MS—a \n10.52705/ \nfeasibility \nc14a8ca05f7546dabc18bd0275cf2edd \n90(1):32–42. study. Fysioterapeuten. (2023) doi: \n\n14. Arntzen EC, Straume B, Odeh F, Feys P, Normann B. Group-based, \nindividualized, comprehensive core stability and balance intervention provides \nimmediate and long-term improvements in walking in individuals with multiple \nsclerosis: a randomized controlled trial. Physiother Res Int. (2019) 25(1):e1798. \ndoi: 10.1002/pri.1798 \n\n15. Arntzen EC, Straume BK, Odeh F, Feys P, Zanaboni P, Normann B. Group- \nbased individualized comprehensive core stability intervention improves balance in \npersons with multiple sclerosis: a randomized controlled trial. Phys Ther. (2019) 99 \n(8):1027–38. doi: 10.1093/ptj/pzz017 \n\n16. Arntzen EC, Øberg GK, Gallagher S, Normann B. Group-based, individualized \nexercises can provide perceived bodily changes and strengthen aspects of self in \nindividuals with MS: a qualitative interview study. Physiother Theory Pract. (2019) \n37(10):1080–95. doi: 10.1080/09593985.2019.1683923 \n\n17. Florio-Smith J, Ayer M, Colhoun S, Daykin N, Hamill B, Liu X, et al. The \nimportance of the patient’s perspective in decision-making in multiple sclerosis: \nresults of the OwnMS patient perspectives study. Mult Scler Relat Disord. (2023) \n75:104757. doi: 10.1016/j.msard.2023.104757 \n\n18. Kleim JA, Jones TA. Principles of experience-dependent neural plasticity: \nimplications for rehabilitation after brain damage. J Speech Lang Hear Res. (2008) \n51(1):225–39. doi: 10.1044/1092-4388(2008/018) \n19. Thompson E. Mind in Life: Biology, Phenomenology, and The Sciences of Mind. ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed13.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
2. Casey B, Coste S, Galvin R, Domndly A. Objector physical activity levels in people with multiple sclerosis : meta - analysis. Sured J Med Sci Sperts ( 2018 ) 28 ( 9 ): 1900 – 9 : doe 10.111 / oma 13214
3. Kimuth - Hopkin D, Adamon B, Rouguea R, Mofi RW, People with MS are less physically active than healthy controls but as active as those with other clientic diseases an updated muta - analysis. Multi Scler Relat Disead. ( 2017 ) 1338 – A3 doch
4. Houng PD, Lerd S, Gandevia S, Menant J. Eurcise and sports science Australia ( ESSA ) position statement on exercise for people with mild to moderate multiple sclerosis. J Sci Mad Sport. ( 2022 ) 25 ( 2 ) 146 – 54 doc 101010 ( t ) nama 201103
5. Didga - U, Langokon - Christensen M, Stmage E, Bimenschnider M, Fivid LG. Eurecise as medicine in multiple sclerosis - ine for a paradiges shift : preventive, symptomatic, and disease - modifying appects and perspectives. Carr Neuroly
6. Remonschnider M., Hival 1. G. Hisegued 1. Stypared MEE, Eskilleen SI, Gaemalke T, et al. Invotigating the potential doese - molifying and neuroprotective efficacy of exercise therapy cells in the disease course of multiple sclerosie
7. KaB - II, Itom TB, Coste S, Costello K, Dalga U, Garmon E, et al. Enexise and likelyle physical activity recommendations for people with multiple sclerosis througheut the disease course. Mult Scler. ( 2020 ) 26 ( 12 ) 149 – 69, due : 10113 / 10
6. Moreno - Naruro P, Mana a A, Martino G, Ventura L, Burhado D, Veno - Garcia FJ, et al. Too stoutest relatibility and known - groups validity of traumacie tento in people with multiple sclerosis : a cross - sciented, case control study. Phys :
9 Rate J, Arntan EC, Lamers I, Fey P, Normann B. What is the distribution of trank impairments and in velationship with disability level in individuals with multiple sclerosis? Multi - Relat Doord ( 2011 ) 5.10325. doc 10.10108 / mused 20112
", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed13.pdf" + }, + { + "text": "Prior to recruitment, the study was introduced to individuals \nwith multiple sclerosis (pwMS) through a seminar hosted by the \nNordland MS Association. Additionally, \nseminars were \nconducted for health professionals in community healthcare and \nat the regional hospital. Written information about this study \n(and the RCT) was sent from the MS clinic at the regional \nto all eligible individuals affiliated with the \nhospital by post \nIndividuals who wished to participate signed the \nhospital. \nattached consent \nin the pre-stamped \nfollows: had been \nenvelope. The inclusion criteria were as \ndiagnosed with MS, had a score on the Expanded Disability \nStatus Scale (EDSS) (29) of ≤3.5, was ≥18 years, was employed \n(10%–100% of \nfull-time) and residential address in the two \npredefined municipalities. The exclusion criteria were as follows: \npregnancy, exacerbation of symptoms within two weeks prior to \nenrollment and other serious conditions compromising balance, \nwalking or work capacity. All participants in the intervention \ngroup of the RCT (n = 15) were included (Table 3). \n\nform and returned it ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed13.pdf" + }, + { + "text": "Enjoyment has previously been reported to promote PA \nin pwMS, and our study brings requested knowledge of what \nin an exercise intervention (46): \ncan constitute enjoyment \nplayful group-exercise tasks, a cheerful physiotherapist, and the \noutdoor environment. \n\nThe appreciation of being active outdoors in the study sample \naligns with that in the general population (47). The outdoors \nprovided a natural environment, which both invited participants to \nactively explore abilities thought of as left behind after their \ndiagnosis with MS, such as running, and provided an appreciated \nbreak from focusing on MS symptoms. We also suggest that the \npositive \nchallenging weather \nconditions and the added meaning of exercising among other \npeople in the city park can be explained according to such terms. \nThese positive experiences show how we are enmeshed in our \nhistory, context and social encounters (35) and how these aspects \nshould also be accounted for when designing exercise interventions. \n\nexperiences of mastering the ", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed13.pdf" + }, + { + "text": "The physiotherapist-participant interaction is acknowledged in \nexercise interventions for pwMS, pointing to professionals’ role in \ninforming participants of exercise benefits in the management of \nMS, \nintensity, and \nduration of exercise (40). Tailored interventions are supported \n\nincluding the prescribing mode, frequency, ", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed13.pdf" + }, + { + "text": "given the heterogenic pathology and symptoms of MS (41, 42). \nHowever, our findings illuminate qualitative aspects of how to \nachieve tailored and meaningful intersubjective interactions in an \nexercise intervention. \n\nmotivated for physical activity (PA), employed, and residing in \nnorthern Norway. Ethnicity or socio-economic class were not \nrecorded. However, considering that all \nthese factors can \ninfluence PA engagement (46), \nit is possible that additional \naspects of the phenomenon could be uncovered in a different \nsample \n(48). There was a higher percentage of women \nparticipating than men; however, this corresponds to the gender \ndistribution in the MS population (1). \n\nThe use of enactive theory was innovative within the field and \nallowed for, \nimportance for self- \nefficacy to be identified. Transference of our results to similar \npopulations can be achieved through theoretical generalization (28). \n\nit appears that \n\nin particular, new aspects of \n\nthe physiotherapists’ ability to adapt ", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed13.pdf" + }, + { + "text": "The way the physiotherapists led the group and, in particular, \ninteracted with each participant were regarded as helpful \nfor \nimproving their bodily functions and activity levels. Some \nparticipants reported being afraid to try out new activities or \ntraining at high intensities after being diagnosed with MS but felt \nsafe to explore when supervised by the physiotherapist because of \nin the relationship between them and in the \ntheir \nphysiotherapist’s professional knowledge. \n\nI have simply been taught some tools to improve certain parts of \nmy body and how that has an effect on, for example, walking: \nThat my hip has to be with me to maintain balance—and that \nmakes how I stand on the ground important. Previously I was \nnot aware of that…., now everything works better. (ID6, EDSS: 2) \n\nTwo participants reported that the intervention motivated \nthem to commit to new exercise routines, and some stated that \nthey had more “readiness” for activities such as playing with \ntheir grandchildren, hiking with friends, or engaging in a high- \nintensity activity. Some stated that their bodily changes were \nperhaps not noticeable for others, but they themselves noticed \nthat it was easier to climb stairs, balance on one leg and walk \nfast or that they now moved in a “better way” or with less pain. \nThree participants perceived the duration of the outdoor group \nto be too short to feel \nlasting improvements in their physical \nendurance or muscular strength. \n\nHow the physiotherapist approached the ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed13.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed13.pdf", + "query": "What were the prerequisites allowing to be involved in the study concerning the impact of outdoor sport on patients witg multiple sclerosis ?", + "target_page": 4, + "target_passage": "The inclusion criteria were as follows: had been diagnosed with MS, had a score on the Expanded Disability Status Scale (EDSS) (29) of ≤3.5, was ≥18 years, was employed (10%–100% of full-time) and residential address in the two predefined municipalities", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "47. Herring TE, Knowles LM, Alschuler KN. Outdoor adventure programs for \npersons with multiple sclerosis: a review and agenda for future research. Int J MS \nCare. (2021) 23(4):186–92. doi: 10.7224/1537-2073.2020-066 \n\n48. Creswell JW, Poth CN. Qualitative Inquiry & Research Design: Choosing Among \nFive Approaches. 4th ed. California: Sage (2018). ", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed13.pdf" + }, + { + "text": "Prior to recruitment, the study was introduced to individuals \nwith multiple sclerosis (pwMS) through a seminar hosted by the \nNordland MS Association. Additionally, \nseminars were \nconducted for health professionals in community healthcare and \nat the regional hospital. Written information about this study \n(and the RCT) was sent from the MS clinic at the regional \nto all eligible individuals affiliated with the \nhospital by post \nIndividuals who wished to participate signed the \nhospital. \nattached consent \nin the pre-stamped \nfollows: had been \nenvelope. The inclusion criteria were as \ndiagnosed with MS, had a score on the Expanded Disability \nStatus Scale (EDSS) (29) of ≤3.5, was ≥18 years, was employed \n(10%–100% of \nfull-time) and residential address in the two \npredefined municipalities. The exclusion criteria were as follows: \npregnancy, exacerbation of symptoms within two weeks prior to \nenrollment and other serious conditions compromising balance, \nwalking or work capacity. All participants in the intervention \ngroup of the RCT (n = 15) were included (Table 3). \n\nform and returned it ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed13.pdf" + }, + { + "text": "4.3 Methodological considerations \n\nfor deriving \nknowledge from individuals’ experiences. The participants self- \nreferred to the intervention and were recruited based on pre-set \ncriteria. This approach yielded rich information from people \nwith mild to moderate disabilities due to MS who were \n\nThe design and methods were adequate ", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed13.pdf" + }, + { + "text": "Background and purpose: Physical activity (PA) is often reduced in people with \nMS (pwMS), even when disability is low. Understanding the perspectives of pwMS \non interventions aiming to improve PA is important to inform the development \nof such services. The aim of \nthis study was to explore the experiences \nof pwMS participating in an outdoor, high-intensity and balance exercise \ngroup intervention. \nMethods: This qualitative study was nested within an RCT exploring a novel \nintervention integrating sensorimotor exercises with high-intensity intervals of \nin-depth interviews with the intervention group \nrunning/walking. \n(n = 15; 12 women, 3 men; age 38–66; EDSS score 0–3.5) were conducted \npostintervention (mean days = 14), analyzed using a phenomenological- \ninspired approach with systematic text condensation, and interpreted based on \nenactive theory. \nResults: Four categories were generated: (1) Exploration of one’s own physical \nabilities: Challenging one’s own limits was perceived by all participants to \nimprove movement performance and/or intensity level. Such bodily changes \nengendered strong positive feelings. Some negative consequences of high- \nintensity training were described, increasing a feeling of loss. (2) New insights \nand beliefs: Participants experienced enhanced beliefs \nin their own \ncapabilities, which they integrated in activities outside the intervention. (3) An \nengaging environment: The group setting was perceived as supportive, and \nthe outdoor environment was perceived as stimulating activity. (4) Professional \nleadership, \ntailoring and co-creation of enjoyment: Physiotherapist-led, \nindividualized interactions were regarded as necessary to safely revisit prior \nactivities, such as running. Co-creating enjoyment facilitated high-intensity \ntraining and intervention adherence. \n\nIndividual, ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed13.pdf" + }, + { + "text": "given the heterogenic pathology and symptoms of MS (41, 42). \nHowever, our findings illuminate qualitative aspects of how to \nachieve tailored and meaningful intersubjective interactions in an \nexercise intervention. \n\nmotivated for physical activity (PA), employed, and residing in \nnorthern Norway. Ethnicity or socio-economic class were not \nrecorded. However, considering that all \nthese factors can \ninfluence PA engagement (46), \nit is possible that additional \naspects of the phenomenon could be uncovered in a different \nsample \n(48). There was a higher percentage of women \nparticipating than men; however, this corresponds to the gender \ndistribution in the MS population (1). \n\nThe use of enactive theory was innovative within the field and \nallowed for, \nimportance for self- \nefficacy to be identified. Transference of our results to similar \npopulations can be achieved through theoretical generalization (28). \n\nit appears that \n\nin particular, new aspects of \n\nthe physiotherapists’ ability to adapt ", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed13.pdf" + }, + { + "text": "Enjoyment has previously been reported to promote PA \nin pwMS, and our study brings requested knowledge of what \nin an exercise intervention (46): \ncan constitute enjoyment \nplayful group-exercise tasks, a cheerful physiotherapist, and the \noutdoor environment. \n\nThe appreciation of being active outdoors in the study sample \naligns with that in the general population (47). The outdoors \nprovided a natural environment, which both invited participants to \nactively explore abilities thought of as left behind after their \ndiagnosis with MS, such as running, and provided an appreciated \nbreak from focusing on MS symptoms. We also suggest that the \npositive \nchallenging weather \nconditions and the added meaning of exercising among other \npeople in the city park can be explained according to such terms. \nThese positive experiences show how we are enmeshed in our \nhistory, context and social encounters (35) and how these aspects \nshould also be accounted for when designing exercise interventions. \n\nexperiences of mastering the ", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed13.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
2. Casey B, Coste S, Galvin R, Domndly A. Objector physical activity levels in people with multiple sclerosis : meta - analysis. Sured J Med Sci Sperts ( 2018 ) 28 ( 9 ): 1900 – 9 : doe 10.111 / oma 13214
3. Kimuth - Hopkin D, Adamon B, Rouguea R, Mofi RW, People with MS are less physically active than healthy controls but as active as those with other clientic diseases an updated muta - analysis. Multi Scler Relat Disead. ( 2017 ) 1338 – A3 doch
4. Houng PD, Lerd S, Gandevia S, Menant J. Eurcise and sports science Australia ( ESSA ) position statement on exercise for people with mild to moderate multiple sclerosis. J Sci Mad Sport. ( 2022 ) 25 ( 2 ) 146 – 54 doc 101010 ( t ) nama 201103
5. Didga - U, Langokon - Christensen M, Stmage E, Bimenschnider M, Fivid LG. Eurecise as medicine in multiple sclerosis - ine for a paradiges shift : preventive, symptomatic, and disease - modifying appects and perspectives. Carr Neuroly
6. Remonschnider M., Hival 1. G. Hisegued 1. Stypared MEE, Eskilleen SI, Gaemalke T, et al. Invotigating the potential doese - molifying and neuroprotective efficacy of exercise therapy cells in the disease course of multiple sclerosie
7. KaB - II, Itom TB, Coste S, Costello K, Dalga U, Garmon E, et al. Enexise and likelyle physical activity recommendations for people with multiple sclerosis througheut the disease course. Mult Scler. ( 2020 ) 26 ( 12 ) 149 – 69, due : 10113 / 10
6. Moreno - Naruro P, Mana a A, Martino G, Ventura L, Burhado D, Veno - Garcia FJ, et al. Too stoutest relatibility and known - groups validity of traumacie tento in people with multiple sclerosis : a cross - sciented, case control study. Phys :
9 Rate J, Arntan EC, Lamers I, Fey P, Normann B. What is the distribution of trank impairments and in velationship with disability level in individuals with multiple sclerosis? Multi - Relat Doord ( 2011 ) 5.10325. doc 10.10108 / mused 20112
", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed13.pdf" + }, + { + "text": "2.3 Study context \n\ninterview study was nested within a randomized \n(RCT) comparing the CoreDISTparticipation \ncontrolled trial \nintervention to usual care (26) and conducted at a regional \nhospital MS-outpatient clinic (Nordland Hospital Trust) and in \ntwo affiliated municipalities in the northern Norway. The current \nintervention group’s \nstudy investigates participants \nexperiences of the four-week outdoor group, which was part of \nthis new intervention (Table 2). The outdoor sessions were \nconducted by three trained physiotherapists working in the \n\nThis \n\nin the ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed13.pdf" + }, + { + "text": "1. Walton C, King R, Rechtman L, Kaye W, Leray E, Marrie RA, et al. Rising \ninsights from the Atlas of MS, third \n\n11. Unluer NO, Ozkan T, Yasa ME, Ates Y, Anlar O. Investigation of the \nrelationship between trunk motor control and balance, functional mobility, and gait \ncapacity in patients with multiple sclerosis/multipl sklerozlu hastalarda govde motor \nkontrolu ile denge, fonksiyonel mobilite ve yuruyus kapasitesi arasindaki iliskinin \nincelenmesi. Türk Nöroloji Dergisi. (2021) 27(3):283. doi: 10.4274/tdn.2021.41017 \n\nprevalence of multiple sclerosis worldwide: \nedition. Mult Scler. (2020) 26(14):1816–21. doi: 10.1177/1352458520970841 \n\n12. Learmonth YC, Motl RW. Physical activity and exercise training in multiple \nsclerosis: a review and content analysis of qualitative research identifying perceived \ndeterminants and consequences. Disabil Rehabil. (2016) 38(13):1227–42. doi: 10. \n3109/09638288.2015.1077397 \n\n13. Fikke HK, Normann B, Sivertsen M, Dahl SSH, Arntzen EC. Optimizing \nsensorimotor function, physical activity and employment for people with MS—a \n10.52705/ \nfeasibility \nc14a8ca05f7546dabc18bd0275cf2edd \n90(1):32–42. study. Fysioterapeuten. (2023) doi: \n\n14. Arntzen EC, Straume B, Odeh F, Feys P, Normann B. Group-based, \nindividualized, comprehensive core stability and balance intervention provides \nimmediate and long-term improvements in walking in individuals with multiple \nsclerosis: a randomized controlled trial. Physiother Res Int. (2019) 25(1):e1798. \ndoi: 10.1002/pri.1798 \n\n15. Arntzen EC, Straume BK, Odeh F, Feys P, Zanaboni P, Normann B. Group- \nbased individualized comprehensive core stability intervention improves balance in \npersons with multiple sclerosis: a randomized controlled trial. Phys Ther. (2019) 99 \n(8):1027–38. doi: 10.1093/ptj/pzz017 \n\n16. Arntzen EC, Øberg GK, Gallagher S, Normann B. Group-based, individualized \nexercises can provide perceived bodily changes and strengthen aspects of self in \nindividuals with MS: a qualitative interview study. Physiother Theory Pract. (2019) \n37(10):1080–95. doi: 10.1080/09593985.2019.1683923 \n\n17. Florio-Smith J, Ayer M, Colhoun S, Daykin N, Hamill B, Liu X, et al. The \nimportance of the patient’s perspective in decision-making in multiple sclerosis: \nresults of the OwnMS patient perspectives study. Mult Scler Relat Disord. (2023) \n75:104757. doi: 10.1016/j.msard.2023.104757 \n\n18. Kleim JA, Jones TA. Principles of experience-dependent neural plasticity: \nimplications for rehabilitation after brain damage. J Speech Lang Hear Res. (2008) \n51(1):225–39. doi: 10.1044/1092-4388(2008/018) \n19. Thompson E. Mind in Life: Biology, Phenomenology, and The Sciences of Mind. ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed13.pdf" + }, + { + "text": "The physiotherapist-participant interaction is acknowledged in \nexercise interventions for pwMS, pointing to professionals’ role in \ninforming participants of exercise benefits in the management of \nMS, \nintensity, and \nduration of exercise (40). Tailored interventions are supported \n\nincluding the prescribing mode, frequency, ", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed13.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_STO_2004.pdf", + "query": "What was the sales revenue of Santos in 2004 ?", + "target_page": 12, + "target_passage": " Sales revenue was a record $1,501 million", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**2004 WAS A YEAR OF GOOD**\n**OPERATING RESULTS**\nOverall the increase in 2004 profit \nof 16% reflected a year of sound \noperating performance. Sales \nrevenue was a record $1,501 \nmillion, up 2.5% on 2003, \nreflecting higher prices across \nmost products and was achieved \ndespite lower production as a \nresult of the Moomba incident \nand declining output from late \nlife fields. \n\n**‘The sound operating results**\n**achieved in 2004 underline**\n**the changing face of Santos**\n**towards a higher value, higher**\n**margin business. We ended the**\n**year with a strong financial**\n**position and our financial**\n**flexibility intact.’**\n\nSantos benefited from higher \nworld oil prices and realised \nUS$51.83 per boe in 2004, an \nincrease of 19% over 2003. The \nbenefit of higher world oil prices \nsubstantially offset the impact \nof lower production volumes. \n**PETER WASOW**\nChief Financial Officer \n\nSantos was also able to negotiate \nhigher domestic gas prices (up \n4% on average) and deliver new \nrevenue streams from project \nstart-ups and acquisitions during \nthe year. ", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**Consolidated** **Santos Ltd**\n\n**2004**\n**$million** 2003 \n$million **2004**\n**$million** 2003 \n$million \n\n**1,544.3**\n**–**\n**3.5**\n**14.5**\n**19.9**\n**(583.6)**\n**(169.6)**\n**(65.2)**\n**(158.8)** 1,637.3 \n0.4 \n2.5 \n17.0 \n28.2 \n(439.9) \n(118.7) \n(60.9) \n(168.6) **644.4**\n**251.7**\n**45.1**\n**19.0**\n**18.0**\n**(279.0)**\n**(78.4)**\n**(90.6)**\n**(137.5)** 683.0 \n0.4 \n36.9 \n22.1 \n1.6 \n(186.4) \n(39.8) \n(83.6) \n(65.1) \n\n**605.0** 897.3 **392.7** 369.1 ", + "page_start": 53, + "page_end": 53, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "A one US cent movement in the \nAustralia–US dollar exchange rate \nwould produce a change in profit \nafter tax of A$8 million, and \na 1% change in interest rates \nequates to a change in net profit \nafter tax of A$9 million. \n\n**A STRONG FINANCIAL**\n**PERFORMANCE**\nIt was pleasing that Santos \nwas able to conclude 2004 \non a higher note than it started. \n2004 has also been an important \nperiod for shareholders, with a \nsignificant improvement in the \nSantos share price combined with \nan increase in the dividend. \n\nWe achieved record annual \nrevenue thanks to higher oil and \ngas prices combined with the \nreturn of full production at \nMoomba to produce a 21.5% jump \nin second half sales: the best \nresult for any six-month period \nin Santos' history. \n\nThe average realised price for \ncrude oil was up nearly 19% \nto A$51.83 per barrel. ", + "page_start": 6, + "page_end": 6, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "Dear Shareholder, \n\nI am pleased to report that \nin 2004 Santos continued \nto deliver on its strategy to \ntransform the Company into a \ntruly international exploration \nand production business with \nworld-class operations. \n\nWhile the year saw many \npositives in terms of development \nand exploration success, it did \nnot get off to a good start with \nthe incident on New Year’s Day \nat the Moomba processing facility \nin central Australia. \n\nIn addition to our focus \non shareholder value, Santos \ntakes its corporate social \nresponsibilities seriously and \nis committed to sustainability \nas a core value in all operations. \nThe Company’s first Sustainability \nReview was released during \nthe year. \n\nI am confident that the \nsignificant achievements made \nduring 2004 provide Santos with \na solid platform from which to \nachieve future growth with \nincreased value for our \nshareholders. \n\nGroup sales revenue increased by \n2.5% to a record $1,501 million, \nearnings before interest and tax \nimproved by 23% to $574 million \nand net profit after tax rose by \n16% to $380 million. \n\nSantos continues to be \nrecognised for the high quality \nof its corporate governance, \nreceiving a measure of five out \nof five for corporate governance \nfor the third successive year \nin an independent report prepared \nby leading accounting and \nmanagement firm, Horwath, \nand the University of Newcastle. \n\nA large proportion of the costs \nand foregone revenues associated \nwith the repair of the damaged \nplant and the reduced oil and \ngas production volumes are \nbeing recovered under \ninsurance policies. ", + "page_start": 3, + "page_end": 3, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "The amounts recognised in the financial statements of the Santos Group and the Company in relation to executive share options exercised during \nthe financial year were: \n\n**Consolidated** **Santos Ltd**\n\n**2004**\n**$million** 2003 \n$million **2004**\n**$million** 2003 \n$million \n\nIssued ordinary share capital **4.1** 5.7 **4.1** 5.7 ", + "page_start": 66, + "page_end": 66, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "*Revenue.*Revenue was $2,708.1 million, $2,517.8 million and $2,365.1 million for the years ended \nDecember 31, 2004, 2003 and 2002, respectively. Revenue increased by $190.3 million, or 7.6%, from 2003 to ", + "page_start": 41, + "page_end": 41, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "Importantly, Santos was able \nto work effectively with its key \nstakeholders, including customers, \njoint venturers and government \ndepartments, to minimise the \ncommercial impacts. \nEven with the large effort \nexpended on the Moomba \nincident, Santos was able to \ndeliver strong results for 2004, \nreflecting higher average prices \nacross most products. \n\nNatural gas supplies were quickly \nrestored, in part by recovering \nprocessed gas from underground \nstorage reservoirs. Liquids \nprocessing facilities were \nprogressively reinstated allowing \nfurther increases to gas production \nand sales volumes, with the \nramp-up to full liquids production \nachieved by August as planned. \n\nThis strong financial performance, \ncombined with the confidence \nthat Santos will continue to grow \nearnings in the future, enabled \nthe Board to increase the final \ndividend on ordinary shares by \n20% from 15 cents to 18 cents \nper share, fully franked. For the \nfull year, dividends increased \nby 10% to 33 cents per share, \ncompared with 30 cents per share \n\nAnnual Report 2004 ", + "page_start": 3, + "page_end": 3, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "STATEMENTS OF FINANCIAL PERFORMANCE \n\nfor the year ended 31 December 2004 \n\n**Consolidated** **Santos Ltd**\n\n\n \n \n \n \n [html]NoteCo2004Smillion619Earnings per share ( cents )Diluted\n
2003 $ millionS2004SmillionLtd2003 $ millionProduct sales
21.500.91.465.0568.8616.3
Cost of sales3( 1.049.8 )( 974.4 )( 414.5 )( 356.6 )
Gross profit451.1490.6154.3259.7Other revenue
2252.3154.4858.0126.2
Other expenses3( 129.0 )( 179.5 )( 221.0 )( 108.3 )
Borrowing costs4( 33.6 )( 34.6 )( 91.1 )( 84.0 )
Profit from ordinary activities before income tax expense540.8430.9700.2193.6Income tax expense relating to ordinary activities
( 160.9 )( 103.9 )( 57.1 )( 10.7 )
Net profit after income tax attributable to the shareholders of Santos Ltd379.9327.0643.1182.9Net exchange differences relating to self - sustaining foreign operations
( 0.2 )( 4.7 )
Total changes in equity from non - owner related transactions attributableto the shareholders of Santos Ltd379.7322.3643.1182.9
Basic2158.652.1
2158.551.5
", + "page_start": 51, + "page_end": 51, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "NOTES TO THE FINANCIAL STATEMENTS \n\nfor the year ended 31 December 2004 \n\n**Consolidated** **Santos Ltd**\n\n**2004**\n**$million** 2003 \n$million **2004**\n**$million** 2003 \n$million **19. Foreign Currency Translation Reserve**\n\nBalance at the end of the year **(9.0)** (8.8) **–** – \n\n**Movements during the year**\nBalance at the beginning of the year \nExchange difference on net investment in foreign operations and related hedges: \n**(8.8)** (4.1) **–** – \n\nGross hedges \nRelated income tax \nOverseas net assets **17.3**\n**(5.2)**\n**(12.3)** 123.5 \n(37.1) \n(91.1) **–**\n**–**\n**–** – \n– \n– \n\nNet translation adjustment **(0.2)** (4.7) **–** – \n\nBalance at the end of the year **(9.0)** (8.8) **–** – \n\nThe foreign currency translation reserve records the foreign currency differences arising from the translation of self-sustaining foreign operations, the \ntranslation of transactions that hedge the Company’s net investment in a foreign operation or the translation of foreign currency monetary items \nforming part of the net investment in a self-sustaining operation. \n\n**Consolidated** **Santos Ltd**", + "page_start": 69, + "page_end": 69, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "LEVERAGING BASE BUSINESS \n**12**Production results for 2004 plus a review \nof activities that are creating value in \nSantos’ base business. \n\nCREATING OPPORTUNITIES \n**15**Exploration strategy, results and acreage \nacquisitions, 2005 program and new \nventure opportunities. ", + "page_start": 1, + "page_end": 1, + "source_file": "ASX_STO_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "1002.2525.pdf", + "query": "How have been confirmed nonvanishing neutrino ?", + "target_page": 2, + "target_passage": "The nonvanishing neutrino masses have been confirmed by various neutrino oscillation phenomena and indicate the evidence of new physics beyond the Standard Model.", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "Note that two RH neutrinos are enough to reconcile with the observed neutrino oscillation \n\ndata, with a prediction of one massless light neutrino. Therefore, without introducing any \n\nadditional new dynamical degrees of freedom, the DM particle arises in the minimal gauged \n\nU(1)B L model. \n− \n\nThe paper is organized as follows. In the next section, we briefly describe our model. In \n\nsection III, we estimate the thermal relic density of the RH neutrino and identify the model ", + "page_start": 1, + "page_end": 1, + "source_file": "1002.2525.pdf" + }, + { + "text": "The nonvanishing neutrino masses have been confirmed by various neutrino oscillation \n\nphenomena and indicate the evidence of new physics beyond the Standard Model. The most \n\nattractive idea to naturally explain the tiny neutrino masses is the seesaw mechanism [1], in \n\nwhich the right-handed (RH) neutrinos singlet under the SM gauge group are introduced. \nU(1)Y × \nL model based on the gauge group SU(3)C × \nL [2] is an elegant and simple extension of the SM, in which the RH neutrinos of \n\nThe minimal gauged U(1)B \nSU(2)L × \n− \n\nU(1)B \n− \n\nthree generations are necessarily introduced because of the gauge and gravitational anomaly \n\nIn addition, the mass of RH neutrinos arises associated with the U(1)B cancellations. L \n− \n\ngauge symmetry breaking. \n\nAlthough the scale of the B L gauge symmetry breaking is basically arbitrary as long as \n− \n\nphenomenological constraints are satisfied, one interesting option is to take it to be the TeV \n\nscale [3]. It has been recently pointed out [4] that when the classical conformal invariance ", + "page_start": 1, + "page_end": 1, + "source_file": "1002.2525.pdf" + }, + { + "text": "From Eq. (19), one can see that σ(p) (sin 2θ/v′)2 for a given DM mass mN . Fig. 3 shows \nSI ∝ \n\nthe spin-independent cross section of RH neutrino with a proton. The resultant cross section \n\nis found to be far below the current limits reported by XENON10 [24] and CDMSII [25]: \n\n8 \n7 pb, for a DM mass of 100 GeV-1 TeV. Future experiments such σSI . 4 10− 2 10− \n× − × \n\nas XENON1T [26] can reach the cross section predicted in our model. \n\n10-8 ", + "page_start": 7, + "page_end": 7, + "source_file": "1002.2525.pdf" + }, + { + "text": "II. THE MINIMAL GAUGED U (1)B L MODEL WITH Z2 PARITY \n− \n\nThe model is based on the gauge group SU(3)C × SU(2)L × U(1)Y × \nU(1)B L. Additional \n\n− \nL, a SM singlet \nfields besides the standard model fields are a gauge field Z ′µ of the U(1)B \n− \n\nB L Higgs boson Ψ with two U(1)B L charge, and three RH neutrinos Ni which are \n− \n− \n\nnecessary for the gauge and gravitational anomaly cancellations. In describing the RH \n\nneutrinos, we use the four component representation of RH neutrino constructed from the \n\nWeyl spinor νRi, \n\nνRi \n\nNi ≡ \n, (1) \n  \n\nǫ ν∗Ri \n  \nFor the two RH neutrinos, N1 and N2, we assign Z2 parity even, while odd for N3, so that \n\nthe RH neutrino N3 is stable and, hence, the DM candidate. ", + "page_start": 2, + "page_end": 2, + "source_file": "1002.2525.pdf" + }, + { + "text": "We have proposed a scenario of the RH neutrino dark matter in the context of the minimal \n\ngauged U(1)B L model. We have introduced a discrete Z2 parity in the model, so that one \n− \n\n\n \n \n \n \n [html]\n
TableAge ( years )ControlAvo antianantAllongeryStatementsParametersDataStatements
\n\n8 ", + "page_start": 7, + "page_end": 7, + "source_file": "1002.2525.pdf" + }, + { + "text": "Our RH neutrino DM can elastically scatter off with nucleon, unlike another RH neutrino \n\nDM model has been proposed by Krauss et. al. [21] and studied [22, 23]. The main process \n\nis Higgs exchange and the resultant cross section for a proton is given by \n\n2 \n\nmpmN \nmp + mN (cid:19) 4 \nπ (cid:18) \nσ(p) \nSI = f 2 \np , \n(17) \n\nwith the hadronic matrix element \n\nfp \nmp αq \nmq αq \nmq 2 \n27 \nf (p) \nT q f (p) \nT G \n, = + (18) \n\nXq=u,d,s Xc,b,t \n\nand the effective vertex (see Appendix for notations) \n\n∂Φ \n∂h ∂Ψ \n∂h ∂Φ \n∂H ∂Ψ \n∂H (cid:19) \n1 \nM 2 \nh 1 \nM 2 \nH \nαq = \nλN yq (cid:18) \n− \n, + (19) ", + "page_start": 6, + "page_end": 6, + "source_file": "1002.2525.pdf" + }, + { + "text": "10 \n\nout first deriving the normal state self-energy microscop- \nically (this is what we will do in the next section). The \nresults of the calculations for the modified MFLI model \nare presented in Figs. 15 and 16. We clearly see that the \nbehavior is now different and ∆WK < 0 for all Γ. This \nis the same behavior as we previously found in BCSI \nand EB models. So we argue that the ‘unconventional’ \nbehavior exhibited by the original MFLI model is most \nlikely the manifestation of a particular modeling incon- \nsistency. Still, Ref. 30 made a valid point that the fact \nthat quasiparticles behave more close to free fermions in \na SCS than in a NS, and this effect tends to reverse the \nsigns of ∆WK and of the kinetic energy 43. It just hap- \npens that in a modified MFLI model the optical integral \nis still larger in the NS. ", + "page_start": 9, + "page_end": 9, + "source_file": "1001.0764.pdf" + }, + { + "text": "is imposed on the minimal U(1)B L model, the symmetry breaking scale appears to be the \n− \n\nTeV scale naturally. If this is the case, all new particles, the Z ′ gauge boson, the B L \n\n− \nL gauge Higgs boson H and the RH neutrinos appear at the TeV scale unless the U(1)B \n− \n\ncoupling is extremely small, and they can be discovered at Large Hadron Collider [5–8]. \n\nThen we may be able to understand the relation between the gauge symmetry breaking and \n\nthe origin of neutrino masses. \n\nAlthough such a TeV scale model is interesting and appealing, one might think that the \n\nabsence of dark matter (DM) candidate is a shortcoming of this model. A sterile RH neutrino \n\nwith mass of the order of MeV is one possibility [9]. In this paper, we propose a very simple \n\nidea to introduce the DM candidate in the minimal gauged U(1)B L model. We introduce \n− \n\nthe Z2 parity into the model and impose one of three RH neutrinos to be odd, while the \n\nothers even. In this way, the Z2-odd RH neutrino becomes stable and the DM candidate. ", + "page_start": 1, + "page_end": 1, + "source_file": "1002.2525.pdf" + }, + { + "text": "The mass of the new neutral gauge boson Z ′ arises by the U(1)B L gauge symmetry \n− \n\nbreaking, \n\nM 2 \nZ ′ = 4g2 \nB \n2. \nLv′ \n(10) \n− \n\nAssociated with the U(1)B L gauge symmetry breaking, the RH neutrinos Ni acquire masses \n− \n\nv′ \n√2 \nMNi = \n(11) \n\nFrom LEP experiment, the current lower bound on the Z ′ boson mass has been found to \n\nbe [10, 11] \n\nMZ ′ \ngB \n= 2v′ & 6 7 TeV. (12) \n− L \n− \n\nTwo Z2-even RH neutrinos N1 and N2 are responsible for light neutrino masses via the \n\nseesaw mechanism, \n\nv2 \n2MNi \nmναβ = yαiyiβ . (13) \n\n− Xi=1,2 \nNote that the rank of this mass matrix is two, so that the lightest neutrino is massless. ", + "page_start": 3, + "page_end": 3, + "source_file": "1002.2525.pdf" + }, + { + "text": "modified MFLI models. It is interesting that this holds \ndespite the fact that for large λ CB model displays the \nphysics one apparently needs to reverse the sign of ∆WK \n– the absence of the quasiparticle peak in the NS and its \nemergence in the SCS accompanied by the dip and the \nhump at larger energies. The absence of coherent quasi- \nparticle in the NS at large λ is also apparent form Fig \n21 where we show the normal state distribution functions \nfor two different λ. For large λ the jump (which indicates \nthe presence of quasiparticles) virtually disappears. \n\nconsistent with earlier calculation of the kinetic energy \nfor Ornstein-Zernike form of the spin susceptibility43. \n\nWe clearly see that the increase of the zero crossing \nfrequency of ∆W (ωc) at a truly strong coupling is cor- \nrelated with the non-BCS behavior of δKE. At the same \ntime, the behavior of δW (ωc) is obviously not driven by \nthe kinetic energy as eventually δW (ωc) changes sign and \nbecome negative. Rather, the increase in the frequency \nrange where ∆W (ωc) remains positive and non-BCS be- \nhavior of δKE are two indications of the same effect that \nfermions are incoherent in the NS but acquire coherence \nin the SCS. ", + "page_start": 13, + "page_end": 13, + "source_file": "1001.0764.pdf" + } + ] + }, + { + "references": { + "source_file": "1002.2525.pdf", + "query": "What are the dominant contributions in thermal relic density ?", + "target_page": 5, + "target_passage": "In practice, the dominant contributions come from the Higgs (h and H) exchange diagrams.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "and mass spectrum of the Higgs bosons. \n\nThe thermal relic abundance of DM \n\n109 mN /Td \n√g \nσv \nMP h \n\nΩN h2 = 1.1 1, GeV− (14) \n× \ni \n\nwith the Planck mass MP , the thermal averaged product of the annihilation cross section \n\nσv and the relative velocity , the total number of relativistic degrees of freedom in the \nh i \n\nthermal bath g , and the decoupling temperature Td, is evaluated by solving the Boltzmann \n∗ \n\nequation for the number density of RH neutrino nN ; \n\ndnN \ndt \n(n2 \nn2 \nEQ), \n+ 3HnN = σv \nN − −h i \n\nand the Friedmann equation \n\n2 \n\n˙a \na(cid:19) \n8π \n3M 2 \nP \n= \n≡ (cid:18) \n\nwith nEQ and a(t) being the equilibrium number density and the scale factor, under the \n\nradiation dominated Universe with the energy density ρ = ρrad [14]. \n\n5 ", + "page_start": 4, + "page_end": 4, + "source_file": "1002.2525.pdf" + }, + { + "text": "FIG. 1: The thermal relic density of RH neutrino DM as a function of its mass for a parameter \n\nset: (v′, Mh, MH, MZ ′, sin θ) = (3000 GeV, 120 GeV, 200 GeV, 1000 GeV, 0.7). ", + "page_start": 5, + "page_end": 5, + "source_file": "1002.2525.pdf" + }, + { + "text": "Fig. 1 shows the relic density ΩN h2 as a function of the DM mass mN for a set of \n\nparameters: (v′, Mh, MH, MZ ′, sin θ) = (4000 GeV, 120 GeV, 200 GeV, 1000 GeV, 0.7), for \n\nexample. Willkinson Microwave Anisotropy Probe measured the value of DM abundance as \n\nΩDM h2 \nonly near Higgs resonances, mN ≈ \n\n0.1 [15]. The figure shows that a desired DM relic abundance can be obtained for \n≃ \n\nMh/2 or MH /2. \n\nFig. 2 shows the relic density ΩN h2 as a function of the DM mass mN for a smaller Higgs \n\nmixing sin θ = 0.3 (others are the same as in Fig. 1). Compared with Fig. 1, for mN . MW \nwhere the DM particles dominantly annihilate into f ¯f , the relic density further increases \n\nbecause of the small mixing angle. When the DM is heavier, the annihilation mode into \n\nHiggs boson pairs is opened and the relic density slightly deceases, but the reduction is not \n\nenough to reach ΩN h2 \n≃ \n\n 1000 ", + "page_start": 5, + "page_end": 5, + "source_file": "1002.2525.pdf" + }, + { + "text": "Our model is quite analogous to the so-called gauge singlet scalar dark matter [16–18]. \n\nSome recent studies can be found in Refs. [19, 20]. In the gauge singlet scalar DM model, the \n\nthermal abundance is mainly controlled by the interactions between the SM Higgs boson and \n\nthe DM particle. In our model, B L Higgs VEV v′ can play the same role for mN < MW , \n− \n\nnamely a larger v′ corresponds to weaker coupling between DM and Higgs for a fixed DM \n\nmass. On the other hand, for mN > MW the difference appears. Even if the annihilation \n\n6 ", + "page_start": 5, + "page_end": 5, + "source_file": "1002.2525.pdf" + }, + { + "text": "**Acknowledgments**\n\n• FSRQs exhibit higher ratios of γ-ray to sub- \nmillimeter luminosity than BL Lacs (Figure 5), \nbut all objects inhabit a region of parameter \nspace suggesting transitions between states dur- \ning flaring epochs. \n\nThis work was supported in part by the NSF \nREU and DoD ASSURE programs under Grant no. \n0754568 and by the Smithsonian Institution. Par- \ntial support was also provided by NASA contract \nNAS8-39073 and NASA grant NNX07AQ55G. We \nhave made use of the SIMBAD database, operated at \nCDS, Strasbourg, France, and the NASA/IPAC Ex- \ntragalactic Database (NED) which is operated by the \nJPL, Caltech, under contract with NASA. As Fermi continues to observe fainter sources, the \nsample of objects for which we can perform this type of \nanalysis will increase and provide better limits on our \nresults. To understand the physical relevance of these \nresults, however, it is important to be able to distin- \nguish between the difference in variability between BL \n\neConf C091122 ", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0806.pdf" + }, + { + "text": "III. RESULTS \n\nTable I gives the fluxes and significances averaged \nover all the days from Aug. 12, 2008 (the beginning of \nscience operations) to Dec. 15, 2009, approximately \n490 days. \n\nThe results presented here are preliminary. We \nhave not completed the fine tuning of our algorithms, \nthough the average fluxes are not expected to change \nmuch. Future work will \ninclude using the GBM \nCSPEC data, with its finer energy binning, to exam- \nine the detailed spectra for these sources. \n\nThe Crab (Fig. 2) spectrum in the hard x-ray/low \nenergy gamma-ray region can be described by a bro- \nken power law, with the spectrum steepening at 100 \nkeV and then hardening at 650 keV [7, 8]. While the \nGBM CTIME data do not have the spectral resolution The measured 20 - 50 keV GBM light curves are \ncompared to Swift’s 15 - 50 keV light curves for sev- \n\neConf C091122 ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0955.pdf" + }, + { + "text": "Polesya, H. Ebert, U. Wurstbauer, M. Hochstrasser, G. \nRossi, G. Woltersdorf, W. Wegscheider, and C. H. Back, \nPhys. Rev. Lett. 101, 267201 (2008). \n\n8 R. P. Campion, K. W. Edmonds, L. X. Zhao, K. Y. Wang, \nC. T. Foxon, B. L. Gallagher, and C. R. Staddon, J. Crys- \ntal Growth 247, 42 (2003). \n\n9 F. Maccherozzi, G. Panaccione, G. Rossi, M. Hochstrasser, \nM. Sperl, M. Reinwald, G. Woltersdorf, W. Wegscheider, \nand C. H. Back, Phys. Rev. B 74, 104421 (2006). \n\n3 M. Wang, R. P. Campion, A. W. Rushforth, K. W. Ed- \nmonds, C. T. Foxon, and R. P. Campion, Appl. Phys. Lett. \n93, 132103 (2008). \n\n10 Ch. Binek, S. Polisetty, X. He and A. Berger, Phys. Rev. \nLett. 96, 067201 (2006). ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2449.pdf" + }, + { + "text": "A. Stannard, E. Pauliac-Vaujour, C. P. Martin, M. O. Blunt, P. J. Moriarty \n\nThe School of Physics and Astronomy, \n\nThe University of Nottingham, Nottingham NG7 2RD, UK ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2669.pdf" + }, + { + "text": "Note that two RH neutrinos are enough to reconcile with the observed neutrino oscillation \n\ndata, with a prediction of one massless light neutrino. Therefore, without introducing any \n\nadditional new dynamical degrees of freedom, the DM particle arises in the minimal gauged \n\nU(1)B L model. \n− \n\nThe paper is organized as follows. In the next section, we briefly describe our model. In \n\nsection III, we estimate the thermal relic density of the RH neutrino and identify the model ", + "page_start": 1, + "page_end": 1, + "source_file": "1002.2525.pdf" + }, + { + "text": "This work is supported by the NASA Fermi Guest \nInvestigator program. At LSU, additional support is \nprovided by NASA/Louisiana Board of Regents Co- \noperative Agreement NNX07AT62A. \nFIG. 8: XTEJ1752-223 light curve. Horizontal scale is in \nmodified Julian days. ", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0955.pdf" + } + ] + }, + { + "references": { + "source_file": "1002.2525.pdf", + "query": "What happend to the annihilation and the relic density when the DM is heavier ?", + "target_page": 6, + "target_passage": "When the DM is heavier, the annihilation mode into Higgs boson pairs is opened and the relic density slightly deceases", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Fig. 1 shows the relic density ΩN h2 as a function of the DM mass mN for a set of \n\nparameters: (v′, Mh, MH, MZ ′, sin θ) = (4000 GeV, 120 GeV, 200 GeV, 1000 GeV, 0.7), for \n\nexample. Willkinson Microwave Anisotropy Probe measured the value of DM abundance as \n\nΩDM h2 \nonly near Higgs resonances, mN ≈ \n\n0.1 [15]. The figure shows that a desired DM relic abundance can be obtained for \n≃ \n\nMh/2 or MH /2. \n\nFig. 2 shows the relic density ΩN h2 as a function of the DM mass mN for a smaller Higgs \n\nmixing sin θ = 0.3 (others are the same as in Fig. 1). Compared with Fig. 1, for mN . MW \nwhere the DM particles dominantly annihilate into f ¯f , the relic density further increases \n\nbecause of the small mixing angle. When the DM is heavier, the annihilation mode into \n\nHiggs boson pairs is opened and the relic density slightly deceases, but the reduction is not \n\nenough to reach ΩN h2 \n≃ \n\n 1000 ", + "page_start": 5, + "page_end": 5, + "source_file": "1002.2525.pdf" + }, + { + "text": "and mass spectrum of the Higgs bosons. \n\nThe thermal relic abundance of DM \n\n109 mN /Td \n√g \nσv \nMP h \n\nΩN h2 = 1.1 1, GeV− (14) \n× \ni \n\nwith the Planck mass MP , the thermal averaged product of the annihilation cross section \n\nσv and the relative velocity , the total number of relativistic degrees of freedom in the \nh i \n\nthermal bath g , and the decoupling temperature Td, is evaluated by solving the Boltzmann \n∗ \n\nequation for the number density of RH neutrino nN ; \n\ndnN \ndt \n(n2 \nn2 \nEQ), \n+ 3HnN = σv \nN − −h i \n\nand the Friedmann equation \n\n2 \n\n˙a \na(cid:19) \n8π \n3M 2 \nP \n= \n≡ (cid:18) \n\nwith nEQ and a(t) being the equilibrium number density and the scale factor, under the \n\nradiation dominated Universe with the energy density ρ = ρrad [14]. \n\n5 ", + "page_start": 4, + "page_end": 4, + "source_file": "1002.2525.pdf" + }, + { + "text": "Our model is quite analogous to the so-called gauge singlet scalar dark matter [16–18]. \n\nSome recent studies can be found in Refs. [19, 20]. In the gauge singlet scalar DM model, the \n\nthermal abundance is mainly controlled by the interactions between the SM Higgs boson and \n\nthe DM particle. In our model, B L Higgs VEV v′ can play the same role for mN < MW , \n− \n\nnamely a larger v′ corresponds to weaker coupling between DM and Higgs for a fixed DM \n\nmass. On the other hand, for mN > MW the difference appears. Even if the annihilation \n\n6 ", + "page_start": 5, + "page_end": 5, + "source_file": "1002.2525.pdf" + }, + { + "text": "FIG. 1: The thermal relic density of RH neutrino DM as a function of its mass for a parameter \n\nset: (v′, Mh, MH, MZ ′, sin θ) = (3000 GeV, 120 GeV, 200 GeV, 1000 GeV, 0.7). ", + "page_start": 5, + "page_end": 5, + "source_file": "1002.2525.pdf" + }, + { + "text": "can be achieved only when the annihilation processes are enhanced by Higgs resonances. \n\nTherefore, the mass of the RH neutrino DM should be around a half of Higgs boson masses. \n\nWe have also calculated the elastic scattering cross section between the DM particle and a \n\nproton and found it within the reach of future experiments for the direct DM search. ", + "page_start": 8, + "page_end": 8, + "source_file": "1002.2525.pdf" + }, + { + "text": "Note that two RH neutrinos are enough to reconcile with the observed neutrino oscillation \n\ndata, with a prediction of one massless light neutrino. Therefore, without introducing any \n\nadditional new dynamical degrees of freedom, the DM particle arises in the minimal gauged \n\nU(1)B L model. \n− \n\nThe paper is organized as follows. In the next section, we briefly describe our model. In \n\nsection III, we estimate the thermal relic density of the RH neutrino and identify the model ", + "page_start": 1, + "page_end": 1, + "source_file": "1002.2525.pdf" + }, + { + "text": "parameter to be consistent with the current observations. We also calculate the scattering \n\ncross section between the DM particle and nucleon and discuss the implication for the direct \n\nDM search experiments. We summarize our results in the section IV. Our notations and the \n\nformulas used in our analysis are listed in Appendix. ", + "page_start": 2, + "page_end": 2, + "source_file": "1002.2525.pdf" + }, + { + "text": "III. RESULTS \n\nTable I gives the fluxes and significances averaged \nover all the days from Aug. 12, 2008 (the beginning of \nscience operations) to Dec. 15, 2009, approximately \n490 days. \n\nThe results presented here are preliminary. We \nhave not completed the fine tuning of our algorithms, \nthough the average fluxes are not expected to change \nmuch. Future work will \ninclude using the GBM \nCSPEC data, with its finer energy binning, to exam- \nine the detailed spectra for these sources. \n\nThe Crab (Fig. 2) spectrum in the hard x-ray/low \nenergy gamma-ray region can be described by a bro- \nken power law, with the spectrum steepening at 100 \nkeV and then hardening at 650 keV [7, 8]. While the \nGBM CTIME data do not have the spectral resolution The measured 20 - 50 keV GBM light curves are \ncompared to Swift’s 15 - 50 keV light curves for sev- \n\neConf C091122 ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0955.pdf" + }, + { + "text": "Our RH neutrino DM can elastically scatter off with nucleon, unlike another RH neutrino \n\nDM model has been proposed by Krauss et. al. [21] and studied [22, 23]. The main process \n\nis Higgs exchange and the resultant cross section for a proton is given by \n\n2 \n\nmpmN \nmp + mN (cid:19) 4 \nπ (cid:18) \nσ(p) \nSI = f 2 \np , \n(17) \n\nwith the hadronic matrix element \n\nfp \nmp αq \nmq αq \nmq 2 \n27 \nf (p) \nT q f (p) \nT G \n, = + (18) \n\nXq=u,d,s Xc,b,t \n\nand the effective vertex (see Appendix for notations) \n\n∂Φ \n∂h ∂Ψ \n∂h ∂Φ \n∂H ∂Ψ \n∂H (cid:19) \n1 \nM 2 \nh 1 \nM 2 \nH \nαq = \nλN yq (cid:18) \n− \n, + (19) ", + "page_start": 6, + "page_end": 6, + "source_file": "1002.2525.pdf" + }, + { + "text": "Due to the additional gauge symmetry U(1)B L, the covariant derivative for each fields \n− \n\nis given by \n\nDµ = D(SM ) iqB LgB \nLZ ′µ, \n(2) \nµ \n− \n− − \n\nwhere D(SM ) is the covariant derivative in the SM, and qB L is the charge of each fields µ \n− \n\nunder the U(1)B L with its gauge coupling gB L. \n− − \n\nYukawa interactions relevant for the neutrino masses are given by \n\n3 2 3 \n\n1 \n2 yαi ¯Lα ˜ΦNi − \n¯NiΨPRNi + h.c., λRi \nLint = \n(3) \n\nXα=1 Xi=1 Xi=1 \n\nwhere ˜Φ = iτ2Φ∗ for Φ being the SM Higgs doublet, and without loss of generality we have \n− \n\nworked out in the basis where the second term in the right-hand-side is in flavor diagonal \n\nfor RH neutrinos. Because of the Z2 parity, the DM candidate N3 has no Yukawa couplings ", + "page_start": 2, + "page_end": 2, + "source_file": "1002.2525.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv1.pdf", + "query": "What is the aim of LLM routers ?", + "target_page": 1, + "target_passage": "LLM routers aim to balance quality and cost of generation by classifying queries and routing them to a cheaper or more expensive LLM depending on their complexity. ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "10 Conclusion \n\nLLM routers balance quality and cost of LLM inference by routing different queries to different LLMs. They are an \nexample of a broader, emerging class of systems we call “LLM control planes” that aim to achieve various quality, \nefficiency, and cost objectives by orchestrating use of multiple LLMs to respond to a query. \n\n17 ", + "page_start": 16, + "page_end": 16, + "source_file": "arxiv1.pdf" + }, + { + "text": "Figure 1: LLM routers classify queries and route complex ones to an expensive/strong model, others to a cheaper/weak \nmodel. To control costs, LLM routers can be calibrated to maintain (for an expected workload) a specific ratio between \nqueries sent to the strong and weak models. ", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv1.pdf" + }, + { + "text": "LLM routers. A prominent example of this emerging class of LLM control planes are LLM routers [27, 41, 47, 53, 59]. \nLLM routers decide which of the two (or, sometimes, more) LLMs to use to answer a query. In prescriptive routing, \nthe router applies some lightweight classifier to the input query that determines which underlying LLM to utilize for a \nresponse. The classifier is itself a learned function that scores the complexity of the query. Deployments can then configure \na score threshold for when to route a query to the more expensive LLM. This threshold can be tuned using representative \nworkloads to achieve a desired cost-performance trade-off. Figure 1 shows the basic workflow of binary LLM routers. \n\nNon-prescriptive routing [15, 20, 68] uses the responses from one or more underlying LLMs to determine which response \nto return to the user. For example, FrugalGPT [20] submits the query to a sequence of models (ordered by price) called a \ncascade, stopping when it obtains a response classified by the router as sufficient. \n\n2 ", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv1.pdf" + }, + { + "text": "In contrast to routers motivated by controlling costs, several LLM router designs focus solely on improving quality of \nresponses [31, 45, 57, 58]. \n\nThe LLM routers described thus far do not modify the queries or individual LLM responses. Other types of control planes \ndo. Ensemble approaches such as mixture-of-expert (MoE) [29, 30, 52, 56] architectures select a subset of underlying \nmodels to apply to each token of a query and merge their responses. LLM synthesis [40] architectures operate similarly, \nbut route the entire query to a subset of underlying LLMs and merge their responses. These approaches reduce inference \ncosts by using fewer and/or less complex underlying models. \n\nApplications of LLM routers. A key use case for LLM routers is to help LLM-based application reduce cost. Several \ncommercial routers, including Unify [12], Martian [5], NotDiamond [7], and others, offer this as a service. By replacing a \nfew lines of code, the application can send user queries to a router service, rather than directly to some LLM provider. The \nservice selects the optimal LLM and forwards the queries. Commercial router services claim that this results in significant \ncost savings: up to 98% in the case of Martian [5], and 10× in the case of NotDiamond [7]. ", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv1.pdf" + }, + { + "text": "Underlying LLMs. In [47], Ong et al. trained the routers with GPT-4-1106-preview [14] as the strong model and Mixtral \n8x7B [39] as the weak model. They report successful generalization between the underlying LLMs, stating that their \nrouters trained for a particular strong-weak LLM pair can be used with other strong-weak LLM pairs. \n\nTo allow our evaluation to scale, we use as the strong model Ms the open-sourced Llama-3.1-8B [3] and as Mw the \n4-bit quantized version of Mixtral 8x7B (for efficiency reasons). This reduced the cost of our experiments by avoiding \nexpensive GPT API calls and lowering the computational costs of Mixtral. Unless mentioned otherwise, all of our results \n\n7 ", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv1.pdf" + }, + { + "text": "Results for LLM pair 4. As discussed in Section 5, we replace the strong model that was used by Ong et al. [47], GPT-4- \n1106-preview (rank 28 in the Chatbot Arena leaderboard [1, 21]), with the open-sourced Llama-3.1-8B (rank 58) to reduce \nthe costs of our extensive set of evaluations. In this section we perform a smaller-scale evaluation of the quality-enhancing \nattack performance when using GPT as the strong model, i.e., LLM pair 4. We evaluate this setting using three of the \nn = 10 confounder gadgets for each router. \n\nTable 10 shows the results across benchmarks in the white-box setting. Compared to the pair 1 setting (Table 3), the attack \nresults in a higher increase in benchmark performance. This further demonstrates higher attack effect on response quality \nwhen the performance gap between the weak and strong models is higher. \n\n7 Rerouting Commercial Routers \n\nWe evaluate our rerouting attack on several commercial routers: Unify [12], NotDiamond [7], OpenRouter [11], and \nMartian [5]. These routers are available through black-box APIs. Therefore, we use our black-box attack with the \n40 gadgets optimized for the open-sourced routers RSW , RM F , RCLS, and RLLM (10 per router). We perform this \nevaluation using the MT-bench benchmark. ", + "page_start": 11, + "page_end": 11, + "source_file": "arxiv1.pdf" + }, + { + "text": "8 Defenses \n\nDefenses against rerouting should be cheap. If the per-query cost of the defense is comparable to the per-query cost of a \nstrong LLM, deploying the defense will defeat the main purpose of LLM routing, which is to reduce the cost of responding \nto queries. ", + "page_start": 13, + "page_end": 13, + "source_file": "arxiv1.pdf" + }, + { + "text": "Threat models. Within the context of control plane integrity attacks against LLM routers, we identify several threat \nmodels that differ in terms of the adversary’s goals and their knowledge about the target control plane RM \nω . \n\nIn terms of goals, an adversary may seek to inflate the costs of a victim application that utilizes an LLM control plane. \nAs a kind of denial-of-service attack, such cost inflation would penalize the application developer who expects routing \nto control costs. Another adversarial goal could be arbitrage: consider an application that charges X dollars per query, \nwhereas directly using Ms costs Y > X. The application’s lower rate X makes economic sense assuming it uses a router \nto route the bulk of queries to a cheaper model Mw. An input adaptation attack in this setting can gain (indirect) access to \nMs, obtaining an arbitrage advantage of Y − X per query. To be effective, this arbitrage adversary would want to ensure \nthat adaptations do not lower response quality (i.e., it extracts all the value out of rerouting to Ms). As before, the victim \nin this case is the application that relies on routing to lower its costs (unsuccessfully, under this attack). \n\nWe now discuss adversarial capabilities. We assume that our victim application’s prompt includes a substring that can be \ncontrolled by the adversary. This represents many real-world apps such as chatbots, coding assistants, writing assistants, \nand others, that insert user inputs into an LLM prompt. In crafting adversarial portions of prompts, an adversary may have \nvarious levels of knowledge about the victim application’s router. We consider the following knowledge settings: ", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv1.pdf" + }, + { + "text": "We introduced and defined a new safety property, LLM control plane integrity. \nInformally, this property holds if an \nadversarial user cannot influence routing decisions made by the control plane. To show that existing LLM routers do not \nsatisfy this property, we designed, implemented, and evaluated a black-box optimization method for generating query- \nindependent “confounder gadgets.” When added to any query, the confounder gadget confuses the router into routing the \nquery to the adversary-chosen LLM. \n\nWe evaluated the efficacy of confounder gadgets on multiple open-source and commercial routers and demonstrated that \nthey successfully reroute queries without a negative impact on the quality of responses. We also discussed defenses against \nthese attacks and indicated directions for future research. \n\nAcknowledgments \n\nThis research was supported in part by the Google Cyber NYC Institutional Research Program, the Israel Science Founda- \ntion (Grant No. 1336/22), and the European Union (ERC, FTRC, 101043243). Views and opinions expressed are however \nthose of the author(s) only and do not necessarily reflect those of the European Union or the European Research Council. \nNeither the European Union nor the granting authority can be held responsible for them. ", + "page_start": 17, + "page_end": 17, + "source_file": "arxiv1.pdf" + }, + { + "text": "an extra potentially expensive LLM invocation for each query processed by the router. Second, it may degrade the quality \nof responses from the destination LLMs, which are sensitive to the phrasing of queries and prompts. \n\nDetecting anomalous user workloads. Another possible defense requires the router to monitor individual user work- \nloads, and identify those users whose queries are routed to the strongest model with an abnormally high frequency. The \nrouter can then impose a user-specific threshold. Of course such workloads may have a benign explanation, e.g., the user’s \nqueries may be unusually complex. Even so, routers could potentially be designed to perform user-specific routing. For \nexample, one could imagine using per-user thresholds that are calibrated dynamically to attempt to maintain a consistent \nfraction of queries being routed to the strong model. \n\nSuch user-specific routing would complicate implementations, and would make inaccurate decisions for a user until there \nis sufficient data about their queries. The latter is relevant in adversarial settings, since such an approach would still be \ncircumventable should attackers be able to mount Sybil attacks in which the attacker creates a new user for, in the limit, \neach query. \n\n9 Related Work \n\nEvasion attacks against ML systems. A large body of work has investigated evasion attacks against ML systems [25, \n43, 60], also referred to as adversarial examples [32, 48, 49], and these attacks are now being explored in the context of \nmulti-modal LLMs [28] as well as text-only LLMs (for just one example, see [22]). We discussed in Section 3 how our \nresults compare: LLM control plane integrity is a distinct AI safety issue, but related in that: (1) control plane integrity \nattacks may use evasion-style techniques, and (2) control plane integrity attacks might be useful for performing evasion. ", + "page_start": 16, + "page_end": 16, + "source_file": "arxiv1.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv1.pdf", + "query": "What is an LLM control plane ?", + "target_page": 3, + "target_passage": " An LLM control plane Rω is a potentially randomized algorithm.", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "3 LLM Control Plane Integrity \n\nIn this section, we define LLM control plane integrity. Informally, it means that decisions made about underlying LLM \nqueries made by the control plane algorithms cannot be subverted by adversarial queries. Looking ahead, we will focus \non one class of control plane: predictive LLM routing as used to manage cost. ", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv1.pdf" + }, + { + "text": "10 Conclusion \n\nLLM routers balance quality and cost of LLM inference by routing different queries to different LLMs. They are an \nexample of a broader, emerging class of systems we call “LLM control planes” that aim to achieve various quality, \nefficiency, and cost objectives by orchestrating use of multiple LLMs to respond to a query. \n\n17 ", + "page_start": 16, + "page_end": 16, + "source_file": "arxiv1.pdf" + }, + { + "text": "Formalizing control planes. An LLM control plane Rω is a potentially randomized algorithm. It is parameterized by \na string ω, called the parameters. It utilizes some number n of LLMs denoted by M. We will mostly focus on the \ncase of n = 2, and, for reasons that will be clear in a moment, use Ms (“strong”) and Mw (“weak”) to denote the two \nunderlying LLMs. Then inference on an input x ∈ X for some set X of allowed queries is performed by computing \na response via y ←$ RM \nω (x). Here we use ←$ to denote running R with fresh random coins; we use ← when R is \ndeterministic. We focus on inference for a single query, but it is straightforward to extend our abstraction for control \nplanes to include sessions: the controller would maintain state across invocations, potentially adapting its behavior as a \nfunction of a sequence of queries and responses. \n\nLLM control planes should, in general, be relatively computationally lightweight, at least compared to the underlying \nLLMs. This is particularly so in the cost-motivated usage of control planes, as a computationally or financially expensive \ncontrol plane would eat into cost savings incurred by utilizing cheaper underlying LLMs for some queries. For example, \npredictive binary routers use relatively simple classifiers to determine which of Ms or Mw should be used to respond to a \nquery. ", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv1.pdf" + }, + { + "text": "Figure 1: LLM routers classify queries and route complex ones to an expensive/strong model, others to a cheaper/weak \nmodel. To control costs, LLM routers can be calibrated to maintain (for an expected workload) a specific ratio between \nqueries sent to the strong and weak models. ", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv1.pdf" + }, + { + "text": "Control plane integrity. A control plane integrity adversary is a randomized algorithm A that seeks to maliciously guide \ninference flow. \n\nIn an unconstrained LLM control plane integrity attack, the adversary A seeks to generate inputs ⃗x = ⃗x1, . . . , ⃗xq such \nthat running RM \nω (⃗x) generates a transcript for which P((x1, i1), . . . , (xq, iq)) = 0. This attack could be launched by an \nadversary who wants to maximize inference costs for a victim application using an LLM router. \n\nA harder setting requires input adaptation, where the adversary is given inputs x1, . . . , xq and it must find new inputs \nˆx1, . . . , ˆxq for which the transcript resulting from P((ˆx1, i1), . . . , (ˆxq, iq)) = 0. There will be some competing constraint, \nsuch as that xj and ˆxj are very similar for each j, or that the outputs yj ←$ RM \nω (ˆxj) are close. In the \nrouting context, the adversary’s goal is to increase the fraction of queries that get routed to the strong model, in order to \nimprove the overall quality of responses, drive up the victim application’s inference costs, or both. \n\nω (xj) and ˆyj ←$ RM ", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv1.pdf" + }, + { + "text": "A natural solution to balancing performance and economic considerations is to take advantage of the availability of mul- \ntiple LLMs at different price-performance points. Recently proposed LLM routing systems [5, 12, 27, 47, 53] orchestrate \ntwo or more LLMs and adaptively route each query to the cheapest LLM they deem likely to generate a response of \nsufficient quality. In the two-LLM case, let Ms be an expensive, high-quality model and Mw a weaker, lower-grade one. \nGiven query q, the routing algorithm R(·) applies a classifier to q that outputs 0 if Mw is sufficient for answering q, or 1 \nif Ms is required. The system then routes q accordingly. \n\nLLM routing is an example of a general class of systems we call LLM control planes, which orchestrate the use of multiple \nLLMs to process inputs, as further described in Section 2. \n\nOur contributions. First, we introduce LLM control plane integrity as a novel problem in AI safety. Recently proposed \nLLM control-plane algorithms are learned, calibrated classifiers (see Section 2). Their inputs are queries from potentially \nadversarial users. Robustness of control-plane algorithms to adversarial queries is a new problem, distinct from adversarial \nrobustness of the underlying LLMs. ", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv1.pdf" + }, + { + "text": "LLM routers. A prominent example of this emerging class of LLM control planes are LLM routers [27, 41, 47, 53, 59]. \nLLM routers decide which of the two (or, sometimes, more) LLMs to use to answer a query. In prescriptive routing, \nthe router applies some lightweight classifier to the input query that determines which underlying LLM to utilize for a \nresponse. The classifier is itself a learned function that scores the complexity of the query. Deployments can then configure \na score threshold for when to route a query to the more expensive LLM. This threshold can be tuned using representative \nworkloads to achieve a desired cost-performance trade-off. Figure 1 shows the basic workflow of binary LLM routers. \n\nNon-prescriptive routing [15, 20, 68] uses the responses from one or more underlying LLMs to determine which response \nto return to the user. For example, FrugalGPT [20] submits the query to a sequence of models (ordered by price) called a \ncascade, stopping when it obtains a response classified by the router as sufficient. \n\n2 ", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv1.pdf" + }, + { + "text": "Figure 2: Overview of our attack on LLM routing control plane integrity. The attack adds to each query a prefix (repre- \nsented by the gear), called a “confounder gadget,” that causes the router to send the query to the strong model. ", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv1.pdf" + }, + { + "text": "Inference flow. Given a set of LLMs M, a control plane Rω, and an input x, an LLM inference flow is the sequence of \nLLM invocations Mij (zj) for 1 ≤ j ≤ m and ij ∈ {w, s} made when executing RM \nω (x). Here m is the total number of \nLLM invocations, and z1, . . . , zm are the queries made to the underlying LLMs. Should R be randomized, the sequence \nand its length are random variables. An inference flow can be written as a transcript \n\nT = (i1, z1), (i2, z2), . . . , (im, zm) \nof pairs of model indexes ij ∈ {w, s} and model inputs zj. Note that for simplicity we ignore the potential for paral- \nlelization, assuming execution proceeds serially. For binary routers, we have m = 1 and T ∈ {(w, x), (s, x)}. We write \nsubmitting a sequence of inferences ⃗x = ⃗x1, . . . , ⃗xq to a control plane as \nω (⃗x1), . . . , RM ", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv1.pdf" + }, + { + "text": "Threat models. Within the context of control plane integrity attacks against LLM routers, we identify several threat \nmodels that differ in terms of the adversary’s goals and their knowledge about the target control plane RM \nω . \n\nIn terms of goals, an adversary may seek to inflate the costs of a victim application that utilizes an LLM control plane. \nAs a kind of denial-of-service attack, such cost inflation would penalize the application developer who expects routing \nto control costs. Another adversarial goal could be arbitrage: consider an application that charges X dollars per query, \nwhereas directly using Ms costs Y > X. The application’s lower rate X makes economic sense assuming it uses a router \nto route the bulk of queries to a cheaper model Mw. An input adaptation attack in this setting can gain (indirect) access to \nMs, obtaining an arbitrage advantage of Y − X per query. To be effective, this arbitrage adversary would want to ensure \nthat adaptations do not lower response quality (i.e., it extracts all the value out of rerouting to Ms). As before, the victim \nin this case is the application that relies on routing to lower its costs (unsuccessfully, under this attack). \n\nWe now discuss adversarial capabilities. We assume that our victim application’s prompt includes a substring that can be \ncontrolled by the adversary. This represents many real-world apps such as chatbots, coding assistants, writing assistants, \nand others, that insert user inputs into an LLM prompt. In crafting adversarial portions of prompts, an adversary may have \nvarious levels of knowledge about the victim application’s router. We consider the following knowledge settings: ", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv1.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv1.pdf", + "query": "What is a confounder gadget ?", + "target_page": 5, + "target_passage": " Given a query xi, we prepend a confounder gadget ci, which is a short sequence of adversarially chosen tokens.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Confounder gadgets. Our approach works as follows. Given a query xi, we prepend a confounder gadget ci, which is a \nshort sequence of adversarially chosen tokens. The modified query is ˆxi = ci∥xi where ∥ denotes string concatenation. \nIntuitively, we will use optimization to search for confounders that trick the scoring function into ranking ˆxi as sufficiently \ncomplex to require the strong model. \n\nIn the white-box, query-specific setting, we can choose ci as a function of xi and the known parameters ω = (S, θ, τ ). To \ndo so, we fix a confounder length of n tokens and let I be a token dictionary (it should be a sufficiently large subset of the \ntoken dictionary used by S). Then we set the gadget to initially be n tokens all fixed to the same value from I. The exact \nchoice of the initialization token is not important; in our implementation, we used the first token in the dictionary (‘!’). \nDenote this initial confounder as c(0) \ni = [c(0) i,1 , c(0) i,2 , . . . , c(0) \ni,n]. ", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv1.pdf" + }, + { + "text": "Let B = {˜c0, . . . , ˜cB}. \n\n(3) Find the candidate that maximizes the score: \n\nc(t+1) \ni ← arg max \nSθ(c∥xi) . (1) \nc∈B \n\nThe final confounder c(T ) \nis used with query xi. We early abort if, after 25 iterations, there is no update to the confounder \ngadget. Technically, we could abort early if we find a confounder whose score exceeds τ . Running further can be useful \nwhen an adversary does not know τ . \n\ni \n\nThe attack’s runtime is dominated by T · B times the cost of executing S. In practice, S are designed to be fast (otherwise \nrouters would significantly increase the latency of applications that use them). We report precise timings later; in summary, \nthe attack is fast because we can set T to be relatively small and still find high-scoring confounders. \n\nDue to the randomness in index and token selection, the method converges to different, yet similarly effective, confounder \ngadgets on each run. Our evaluation will thus measure average performance over multiple gadgets. ", + "page_start": 5, + "page_end": 5, + "source_file": "arxiv1.pdf" + }, + { + "text": "Figure 2: Overview of our attack on LLM routing control plane integrity. The attack adds to each query a prefix (repre- \nsented by the gear), called a “confounder gadget,” that causes the router to send the query to the strong model. ", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv1.pdf" + }, + { + "text": "Query-independent confounders. One downside of the per-query approach is that the adversary must repeat, for each \nquery, the search for a good confounder. In practice, the adversary might prefer a query-independent attack. Our con- \nfounder gadget approach extends to this setting readily: perform the search routine above for an empty query. In other \nwords, just ignore xi in the query-dependent attack above, replacing Sθ(c∥xi) in Eq. 1 with Sθ(c). This finds a sin- \ngle query-independent confounder c that can be prefixed to all queries, i.e., ˆxi = c∥xi. We will show that this works \nsurprisingly well. \n\nIt is tempting to assume the reason a query-independent confounder works well is that a good scoring function should be \nroughly monotonic in query extensions, i.e., one might expect that Sθ(c∥x) ≥ Sθ(c) for almost any suffix x. This intuition \nis not correct. In our experiments, we found that Sθ(c∥x) < Sθ(c) for many x and some of the routers discussed below. \nNevertheless, by ensuring that Sθ(c) is pretty high (set the number of iterations T higher) the resulting query-independent \nconfounder works well. That is, we at least get that Sθ(c∥x) > Sθ(x). ", + "page_start": 5, + "page_end": 5, + "source_file": "arxiv1.pdf" + }, + { + "text": "(Input adaptation) For each query xi, submit ˆxi = c∥xi instead to obtain a response ˆyi. (2) \n\nThe confounder is applied to all queries, i.e., the adversary does not need to guess whether the original query would \nhave been routed to the weak or strong model. In the rest of the paper, we demonstrate the confounders rarely result in \n“downgrades,” i.e., rerouting of queries from the strong to weak model. \n\nWe have experimented with variations of this approach that don’t work quite as well, for example adding c as a suffix \ninstead of a prefix. See Appendix B for details. \n\n5 Open-Source Routers: Experimental Setup \n\nTo evaluate efficacy of confounder gadgets generated using the method from Section 4, we perform experiments with \nseveral LLM routers. This section explains our experimental setup for the open-source routers proposed in the research \nliterature [47]; results of this evaluation appear in Section 6. \nIn Section 7, we discuss experiments with proprietary, \ncommercial routers. Figure 3 shows the summary of our experimental setup. \n\n6 ", + "page_start": 5, + "page_end": 5, + "source_file": "arxiv1.pdf" + }, + { + "text": "LLM responses are sometimes affected by the confounder gadget. In some cases, the LLM responded with, for example, \n“I can’t answer that question as it appears to be a jumbled mix of characters”. Still, the response continued with “However, \nI can help you with the actual question you’re asking,” followed by the actual answer. We observed very few cases where \nIn most cases, the response did not mention anything \nan LLM refused to answer due to the presence of the gadget. \n\n1Some responses had abnormally high perplexity values (> 100), which we found do not correlate with quality, but these variations \ndisproportionately contribute to the average. We thus filter out such high-perplexity responses as outliers in both benign and attack \nsettings. We provide examples of filtered responses in Appendix D. ", + "page_start": 9, + "page_end": 9, + "source_file": "arxiv1.pdf" + }, + { + "text": "Then, we perform a hill-climbing style approach to find a good confounder for xi. For each iteration t ∈ [T ], where T is \nthe total number of iterations, do the following: \n\n(1) Select a target index j ∈ [1, n] uniformly. \n\n(2) Generate a set B of B + 1 candidates. First set ˜c0 = c(t) \ni \n\n, the current confounder. To generate B additional \nb=1. Replace the jth token in the \n\n\n \n \n \n \n [html]\n
TableCanadation ( s )
Table1,......................................................................................................................................................................................................
TableTable
", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv1.pdf" + }, + { + "text": "The black-box setting: confounders that transfer. Finally, the attacks so far are in the white-box setting, where the \nattacker can optimize directly against Sθ. While in some cases routing control planes will be public knowledge, in others, \nincluding the proprietary control planes we explore in Section 7, they are hidden. This gives rise to the black-box setting. \nWhile an attacker might seek to perform model extraction attacks [43, 65] to learn θ, we instead explore attacks that \ntransfer from one router to another. \nIn more detail, we assume the adversary has access to a router R′ \nω′, called the surrogate, that is trained on data similar to \nthat used for the target router. Then the attack is the same as above, except that we use the surrogate’s scoring function \nS′ \nθ′ instead of the target’s Sθ. Again, we will see that this works surprisingly well: the query-independent confounders \nfound for the surrogate transfer to successfully reroute queries against the target router. \n\nPutting it all together. In summary, our methodology for input adaptation attacks is: \n\n(Preprocessing) Develop a single query-independent confounder gadget c, using either the target router or surrogate \nto score the confounder. \n(1) ", + "page_start": 5, + "page_end": 5, + "source_file": "arxiv1.pdf" + }, + { + "text": "C Optimization-Free Gadget Generation \n\nWe evaluate optimization-free alternatives to our black-box optimization method for generating confounder gadgets. \n\nFixed gadget. A simple way to create a gadget without resorting to optimization is to repeat n tokens. We use ! as the \ninitialization token, so the gadget in this case is !!!!!!!!!!. Another possibility is to select n tokens uniformly at random. \nTable 14 shows the upgrade rates for both options, were in the latter setting we repeat the process 10 times and report the \naverage result and the standard error. While they are non-negligible, especially for the randomly sampled gadgets, they \nsignificantly underperform the upgrade rates reported in Table 1 for optimized gadgets. \n\nInstruction injection. Prompt injection is a known attack on LLMs [50, 64], thus we consider a gadget consisting of a \ndirect instruction to the router to treat the query as a complex one and obtain a high-quality response. \n\nWe evaluated 4 differently phrased instructions: two created manually and two generated by, respectively, Gemini [61] \nand GPT-4o [2], denoted as “ours-1”, “ours-2”, “Gemini”, and “GPT”. \n\nTable 15 reports the results. This method works well in a few cases but poorly in most. This highlights the difference \nbetween attacking LLMs and attacking LLM routers. ", + "page_start": 23, + "page_end": 23, + "source_file": "arxiv1.pdf" + }, + { + "text": "Table 7: Differences between average benchmark specific scores of responses to the original and confounded queries, \nwhen the confounder gadget was generated for a different surrogate router than the target (black-box setting) for three \nLLM pairs. Positive values indicate a higher average score for responses to the confounded queries; higher values are \nbetter for the attacker. Results are averaged across gadgets. Standard errors were omitted for readability and are on \naverage 0.1, 0.8, and 1.8 for MT-bench, MMLU and GSM8K, respectively. Aligned with the white-box setting, results \nshow almost no decrease in performance, and improvement when there is a performance gap for the LLM pair. ", + "page_start": 11, + "page_end": 11, + "source_file": "arxiv1.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2670.pdf", + "query": "What is called bad-cavity Ramsey laser ?", + "target_page": 1, + "target_passage": "We considerthe case of a two-level atomic beam interacting with a single-mode Ramsey cavity of separated-oscillating-field resonators with the cavity mode linewidth is much wider than the atomic gain linewidth. Thus we call it bad-cavity Ramsey laser. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "*Theoretical framework:*We consider the case of a two-level \natomic beam interacting with a single-mode Ramsey cavity \nof separated-oscillating-field resonators with the cavity mode \nlinewidth is much wider than the atomic gain linewidth. Thus \nwe call it bad-cavity Ramsey laser. All atoms are pumped \nonto the upper lasing state**a**before entering the first cavity \nof seperated field, and the lower lasing state is**b**. We assume \nall the atoms have the same velocities υ, that means what we \nconsider here is a homogeneous laser system. And for the \nsake of simplicity, we consider the two-standing waves linear \noptical Ramsey configuration with a grid as spatial selector \n[20, 21]. Our treatment can be extended to other configura- \ntions as in [22–24]. The length of each oscillating part is*l*, \nand the length of the free drift region is*L*. The corresponding \nHamiltonian is \n\n[ω*j*\n*a*(*t*)σ*j* *a*+ ω*j*\n*b*(*t*)σ*j*\n*b*] \n*H*= ~ωˆ*a*† ˆ*a*+ ~ \n\nX*j*\nΓ*j*(*t*)(ˆ*a*† ˆσ*j*\n− \n+ ~*g*\nX*j*", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2670.pdf" + }, + { + "text": "**The Linewidth of Ramsey Laser with Bad Cavity**\n\nYang Li, Wei Zhuang, Jinbiao Chen,∗ and Hong Guo† \n*CREAM Group, State Key Laboratory of Advanced Optical Communication*\n*Systems and Networks (Peking University) and Institute of Quantum Electronics,*\n*School of Electronics Engineering and Computer Science,*\n*and Center for Computational Science and Engineering (CCSE), Peking University, Beijing 100871, P. R. China*\n(Dated: October 29, 2018) \n\nWe investigate a new laser scheme by using Ramsey separated-field technique with bad cavity. By studying \nthe linewidth of the stimulated-emission spectrum of this kind of laser inside the cavity, we find its linewidth \nis more than two orders of magnitude narrower than atomic natural linewidth, and it is far superior to that \nof conventional optical Ramsey method and any other available subnatural linewidth spectroscopy at present. \nSince any cavity related noise is reduced to cavity-pulling effect in bad cavity laser, this Ramsey laser provides \nthe possibility of precision subnatural linewidth spectroscopy, which is critical for the next generation of optical \nclock and atom interferometers. \n\nPACS numbers: 42.55.Ah, 42.50.Ar, 42.60.Da, 32.30.-r ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2670.pdf" + }, + { + "text": "In summary, we propose a new subnatural \nlinewidth spectroscopy technique, which is a laser by us- \ning Ramsey seperated-field cavity to realize the output of \nstimulated-emission radiation via multiple coherent interac- \ntion with atomic beam. We find the linewidth of Ramsey laser \nis subnatural if we choose an appropriate atomic level, and the \nbad-cavity laser mechanism will dramatically reduce cavity- \nrelated noise as discussed in active optical clock [15–19]. Our \nresults show that this new subnatural linewidth spectroscopy \nis superior to conventional optical Ramsey seperated-field \nspectroscopy and any other available subnatural spectroscopy \ntechnique at present [3–10]. Considering one have to ap- \nply the separated-field method in any phase detection as in \nRamsey-Bord*e*´interferometer [2], to investigate the effects of \nphase differences between the two oscillating fields [31] in \nthis stimulated separated-field method with such subnatural \nlinewidth will be our next research aim. \n\n*Conclusion:*\n\n[18] Y. Wang, Chinese Science Bulletin**54**, 347 (2009). \n[19] D. Meiser, J. Ye, D. R. Carlson, and M. J. Holland, Phys. Rev. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2670.pdf" + }, + { + "text": "Our method of Ramsey laser is suitable for any atoms with \nmetastable energy level, as an example, we choose the tran- \nsition from the metastable state 4*s*4*p*3*P*1 to the ground state \n4*s*2 1*S*0 of 40Ca to check the striking feature of this laser: sub- \nnatural linewidth. As mentioned in [29], the corresponding \nnatural linewidth of the metastable state 4*s*4*p*3*P*1 is 320Hz. \nAs in the recently proposed active optical clock with atomic \nbeam [15], the velocity of the atoms in thermal atomic beam is \nabout 500m/s, and the length of the interaction region is about \n1mm, then the time for the atom to traverse each coherent- \ninteraction region is on the order of magnitude of 1 µs. \nIf \na bad cavity with κ is on the order of 107Hz, the relation \n1 is satisfied. Then when*g*is on the order of the \nκ/2 \nmagnitude of kHz, which can be easily achieved for current \ntechnique [30], from the linewidth expression of Eq.(16) the \norder of magnitude of linewidth is below 1 Hz. This means \nthe linewidth of a Ramsey laser can be more than two or- \nders of magnitude narrower than the atomic natural linewidth, \ntherefore our Ramsey method provides a new subnatural spec- \ntroscopy technique. And since it is stimulated-emission spec- \ntrum, it overcomes the difficulty in other subnatural linewidth \nspectroscopy schemes where the quick reduction of signal to \nnoise ratio is a formidable limit. We should point out that \nthis Ramsey laser does not escape the limitation of all active \noptical clock: in order to pump atoms to the excited state ef- \nfectively and to be stimulated emit photon during the lifetime \nof a metastable state, this new method will only be applicable \nto some special transitions [17]. \n\nτ− \n≫ ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "Though, the natural linewidth of quantum transition was \nregarded as the ultimate limit to high-resolution laser spec- \ntroscopy [4], several methods of subnatural linewidth spec- \ntroscopy have been proposed to gain subnatural linewidth [3– \n10]. However, in all these efforts, including optical Ramsey \nspectroscopy, subnatural line is realized at the expense of a \nquick reduction in signal-to-noise (SNR) ratio due to the ex- \nponential decaying of signal, thus all these schemes can only \nget the linewidth several times narrower than the atomic nat- \nural linewidth. In the past three decades, this situation does \nnot change in the field of the precision laser spectroscopy. \nOn the other hand, the thermal noise of the cavity mirrors is \nthe main obstacle for further linewidth reduction of a laser \n[11, 12], and it is a challenge to substantially reduce this noise \nfurther[13]. Recently, a new scheme, called active optical \nclock [14–18], was proposed to substantially reduce the laser \nlinewidth. With lattice trapped atoms, it is possible to reach \nmHz linewidth laser based on the mechanism of active optical \nclock [14, 15, 19]. The principal mechanism of active optical \nclock is to directly extract light emitted from the ultranarrow \natomic transition with a cavity mode linewidth much wider \nthan that of lasing. This bad cavity ensures that any frequency \nshift due to cavity noise reduces to cavity-pulling effect [15– \n17], then the thermal noise is not the major obstacle again for \nreducing the linewidth. This means the bad cavity can play an \nindispensable role in new subnatural linewidth spectroscopy. \nIn this Letter, we propose a new scheme called Ramsey \nlaser with bad cavity. Distinct from any previous applications \nof conventional Ramsey separated oscillating fields method \n[1], which focuses on the absorption spectrum, we here fo- ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2670.pdf" + }, + { + "text": "0 \n1 \n0 \n2 \n\nn \na \nJ \n\n5 \n1 \n\n*Introduction:*Since the invention of the separated-field \ntechnique [1], it has played an important role in the field of \nprecision spectroscopy due to its linewidth narrowing effect \nvia multiple coherent interaction. Atomic clocks based on \nthis technique have greatly extended our ability for frequency \nmeasurement, further, almost all the atom interferometers are \nbased on this technique [2]. \n\ncus on the stimulated emission spectrum via multiple coher- \nent interactions inside the cavity. We find this Ramsey laser \ncan provide a stimulated-emission spectrum with a linewidth \nmuch narrower than that of any conventional optical Ramsey \nseperated-field spectroscopy, which is commonly applied in \noptical atomic clock. Our results also show that a subnatural \nlinewidth spectroscopy, superior to any other available subnat- \nural spectroscopy technique at present [3–10], can be reached \nby this kind of laser, if a suitable atomic level structure is cho- \nsen. Thus, this method can provide an effective subnatural \nspectroscopy, and the possibilities for the new optical clock \nscheme [15] and atom interferometers [2]. \n\n] \nh \np \n- \nt \nn \na \nu \nq \n[ \n\n1 \nv \n0 \n7 \n6 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2670.pdf" + }, + { + "text": "where Ω*R*\nresonance, \nthe Rabi \n*DS T*=*g*2 ˜*Nass*/*I*0γ*ab*\n,*DRam*\nand \n*ab*, \n∆2 = ω \nω*b*2) presents the detuning in the free \n(ω*a*2 − \ndrift region.*p*is a parameter, which characterizes the pump- \ning statistics: a Poissonian excitation statistics corresponds to \n*p*= 0 , and for a regular statistics we have*p*= 1. \n\nis \n\n− \n\n*Laser linwidth:*Suppose the quantum fluctuation is small, \nthe evolution of the fluctuations can be obtained by making a \nlinearization of the c-number Langevin equations around the \nsteady-state solution. Then the measured spectra of field fluc- \ntuations will be directly related to these quantities. By Fourier \ntransformations of the linearized equation, we get the ampli- \ntude and phase quadrature components δ*X*(ω) and δ*Y*(ω) [26]. \nWell above threshold, one can neglect the amplitude fluctu- \nations, and the linewidth inside the cavity is related to the \nphase-diffusion coefficient [25]. For small fluctuation of laser \nphase, the spectrum of phase fluctuations is simply related to \nthe spectrum of the phase quadrature component of the field \nfluctuations, namely, \n\nThen the linewidth of Ramsey laser with bad cavity is given \nby \n\nγ2 \n*ab*\n(κ/2 + γ*ab*)2 { \n\n. \n} \n(11) \nSince*DS T*/*DRam*≪ \n1 in our situation, and in the case of max- \nimal photon number, the steady state value of ˜*Nass*is about \n*R*τ/2. Then we get the \n\n2*g*2 \nκ ≈ − ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "where ˆ*a*, ˆ*a*† are the annihilation and creation operators of the \nfield mode inside the cavity, with the frequency ω, σ*j*\n*a*= \n)*j*are the projection operators for the \n( \n*a*\n| \n| \njth atom corresponding to the upper and lower lasing levels, \n)*j*and σ*j*\n| \n*b*= ( \n*a*\ni h \n*b*\n*b*\ni h | ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2670.pdf" + }, + { + "text": "[28] N. A. Abraham, P. Mandel, and L. M. Narducci,*Dynamic In-*\n*stabilities and Pulsations in Lasers*, Progress in Optics XXV, \nedited by E. Wolf (Elsevier, Amsterdam, 1988). \n**13**4345 (1980). \n[29] L. Pasternack, D. M. Silver, D. R. Yarkony, and P. J. Dagdigian, \n[6] H. -W. Lee, P. Meystre, and M. O. Scully, Phys. Rev. A**24**, 1914 \nJ. Phys. B**13**, 2231 (1980). \n(1981). \n\n[30] K. An and M. S. Feld, Phys. Rev. A**56**, 1662(1997). \n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev.**84**, 506(1951). \n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A**28**, 2248 \n(1983). \n[8] W. Gawlik, J. Kowalski, F. Tr¨ager, and M. Vollmer, Phys. Rev. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2670.pdf" + }, + { + "text": "*t*′) + ˜*D*(1) \n*kl*δ(*t*\n− \n*t*′ + τ) + ˜*D*(3) \n*kl*δ(*t*\n− \n*t*′ + τ +*T*) + ˜*D*(5) \n*kl*δ(*t*\n− \n*t*′ + 2τ +*T*) + ˜*D*(7) \n*kl*δ(*t*\n*t*′ +*T*), \n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n\nτ *t*′ *T*) \n− − \n2τ *t*′ *T*) \n\n− \n*t*′ − \n*T*) \n− − \n(8) \n− \n\nwhere ˜*D*(*i*) \nrelated to quantum Langevin diffusion coefficients*D*(*i*) \n[27]. \n*a*(*t*), \n\n*Steady-state solutions:*The steady-state solutions for the \nmean values of the field and atomic variables for laser op- \neration are obtained by dropping the noise terms of the c- \nnumber Langevin equations and setting the time derivatives \nequal to zero. The analytical solutions are very complex, and \none could numerically solve the steady-state equations. In this \npaper, we only care about the bad cavity limit γ*max*≪ \n≪ \nτ− \nκ/2. Since the atomic transit time is much shorter than \nthe damping times of atomic variables, one could ignore the \neffect of the spontaneous emission of the atom. By the stan- \ndard way [25], We get the following steady-state values: \n, \n\n, \n\n, \n\n, ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2670.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2670.pdf", + "query": "How the steady-state solutions for the mean values of the field and atomic variables for laser operation are obtained ?", + "target_page": 2, + "target_passage": "The steady-state solutions for the mean values of the field and atomic variables for laser operation are obtained by dropping the noise terms of the c-number Langevin equations and setting the time derivatives equal to zero.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "*t*′) + ˜*D*(1) \n*kl*δ(*t*\n− \n*t*′ + τ) + ˜*D*(3) \n*kl*δ(*t*\n− \n*t*′ + τ +*T*) + ˜*D*(5) \n*kl*δ(*t*\n− \n*t*′ + 2τ +*T*) + ˜*D*(7) \n*kl*δ(*t*\n*t*′ +*T*), \n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n\nτ *t*′ *T*) \n− − \n2τ *t*′ *T*) \n\n− \n*t*′ − \n*T*) \n− − \n(8) \n− \n\nwhere ˜*D*(*i*) \nrelated to quantum Langevin diffusion coefficients*D*(*i*) \n[27]. \n*a*(*t*), \n\n*Steady-state solutions:*The steady-state solutions for the \nmean values of the field and atomic variables for laser op- \neration are obtained by dropping the noise terms of the c- \nnumber Langevin equations and setting the time derivatives \nequal to zero. The analytical solutions are very complex, and \none could numerically solve the steady-state equations. In this \npaper, we only care about the bad cavity limit γ*max*≪ \n≪ \nτ− \nκ/2. Since the atomic transit time is much shorter than \nthe damping times of atomic variables, one could ignore the \neffect of the spontaneous emission of the atom. By the stan- \ndard way [25], We get the following steady-state values: \n, \n\n, \n\n, \n\n, ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2670.pdf" + }, + { + "text": "where Ω*R*\nresonance, \nthe Rabi \n*DS T*=*g*2 ˜*Nass*/*I*0γ*ab*\n,*DRam*\nand \n*ab*, \n∆2 = ω \nω*b*2) presents the detuning in the free \n(ω*a*2 − \ndrift region.*p*is a parameter, which characterizes the pump- \ning statistics: a Poissonian excitation statistics corresponds to \n*p*= 0 , and for a regular statistics we have*p*= 1. \n\nis \n\n− \n\n*Laser linwidth:*Suppose the quantum fluctuation is small, \nthe evolution of the fluctuations can be obtained by making a \nlinearization of the c-number Langevin equations around the \nsteady-state solution. Then the measured spectra of field fluc- \ntuations will be directly related to these quantities. By Fourier \ntransformations of the linearized equation, we get the ampli- \ntude and phase quadrature components δ*X*(ω) and δ*Y*(ω) [26]. \nWell above threshold, one can neglect the amplitude fluctu- \nations, and the linewidth inside the cavity is related to the \nphase-diffusion coefficient [25]. For small fluctuation of laser \nphase, the spectrum of phase fluctuations is simply related to \nthe spectrum of the phase quadrature component of the field \nfluctuations, namely, \n\nThen the linewidth of Ramsey laser with bad cavity is given \nby \n\nγ2 \n*ab*\n(κ/2 + γ*ab*)2 { \n\n. \n} \n(11) \nSince*DS T*/*DRam*≪ \n1 in our situation, and in the case of max- \nimal photon number, the steady state value of ˜*Nass*is about \n*R*τ/2. Then we get the \n\n2*g*2 \nκ ≈ − ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "where ˆ*a*, ˆ*a*† are the annihilation and creation operators of the \nfield mode inside the cavity, with the frequency ω, σ*j*\n*a*= \n)*j*are the projection operators for the \n( \n*a*\n| \n| \njth atom corresponding to the upper and lower lasing levels, \n)*j*and σ*j*\n| \n*b*= ( \n*a*\ni h \n*b*\n*b*\ni h | ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2670.pdf" + }, + { + "text": "*Theoretical framework:*We consider the case of a two-level \natomic beam interacting with a single-mode Ramsey cavity \nof separated-oscillating-field resonators with the cavity mode \nlinewidth is much wider than the atomic gain linewidth. Thus \nwe call it bad-cavity Ramsey laser. All atoms are pumped \nonto the upper lasing state**a**before entering the first cavity \nof seperated field, and the lower lasing state is**b**. We assume \nall the atoms have the same velocities υ, that means what we \nconsider here is a homogeneous laser system. And for the \nsake of simplicity, we consider the two-standing waves linear \noptical Ramsey configuration with a grid as spatial selector \n[20, 21]. Our treatment can be extended to other configura- \ntions as in [22–24]. The length of each oscillating part is*l*, \nand the length of the free drift region is*L*. The corresponding \nHamiltonian is \n\n[ω*j*\n*a*(*t*)σ*j* *a*+ ω*j*\n*b*(*t*)σ*j*\n*b*] \n*H*= ~ωˆ*a*† ˆ*a*+ ~ \n\nX*j*\nΓ*j*(*t*)(ˆ*a*† ˆσ*j*\n− \n+ ~*g*\nX*j*", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2670.pdf" + }, + { + "text": "Phys.**9**, 171 (1976). \n[24] J. C. Bergquist, S. A. Lee, and L. L. Hall, Phys. Rev. Lett.**38**, \n159 (1977). \n\n∗ E-mail: jbchen@pku.edu.cn \n† E-mail: hongguo@pku.edu.cn. \n[25] L. Davidovich, Rev. Mod. Phys.**68**, 127 (1996). \n[26] M. I. Kolobov, L. Davidovich, E. Giacobino, and C. Fabre, \n\n[1] N. F. Ramsey, Phys. Rev.**76**, 996 (1949). \n[2] B. Dubetsky and P. R. Berman, In*Atom Interferometry*, edited \nby P. R. Berman (Academic Press, Cambridge, MA, 1997). \n\nPhys. Rev. A**47**, 1431 (1993). \n[27] M. Sargent III, M. O. Scully, and W. E. Lamb,*Laser Physics*\n(Addition Wesley, Reading, MA, 1974). \n\n[3] M. M. Salour, Rev. Mod. Phys.**50**, 667 (1978). \n[4] J. Wong and J. C. Garrison, Phys. Rev. Lett.**44**, 1254 (1980). \n[5] P. L. Knight and P. E. Coleman, J. Phys. B: Atom. Molec. Phys. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2670.pdf" + }, + { + "text": "[28] N. A. Abraham, P. Mandel, and L. M. Narducci,*Dynamic In-*\n*stabilities and Pulsations in Lasers*, Progress in Optics XXV, \nedited by E. Wolf (Elsevier, Amsterdam, 1988). \n**13**4345 (1980). \n[29] L. Pasternack, D. M. Silver, D. R. Yarkony, and P. J. Dagdigian, \n[6] H. -W. Lee, P. Meystre, and M. O. Scully, Phys. Rev. A**24**, 1914 \nJ. Phys. B**13**, 2231 (1980). \n(1981). \n\n[30] K. An and M. S. Feld, Phys. Rev. A**56**, 1662(1997). \n[31] N. F. Ramsey and H. B. Silsbee, Phys. Rev.**84**, 506(1951). \n[7] F. Shimizu, K. Shimizu, and H. Takuma, Phys. Rev. A**28**, 2248 \n(1983). \n[8] W. Gawlik, J. Kowalski, F. Tr¨ager, and M. Vollmer, Phys. Rev. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2670.pdf" + }, + { + "text": "From the expression above, we find that the pumping statis- \ntic can influence the linewidth. For regular injection (*p*= 1), \nthe linewidth is the narrowest, while for Poissonian injection \n(*p*= 0), the linewidth is the broadest. But even for regular \ninjection, the linewidth is larger than the case of one cavity. \nThat means the mechanism of separated-field does not play \nthe role in reducing the linewidth as in the conventional opti- \ncal Ramsey method, which is counter-intuitive. However, the \nseparated fields are indispensable for any phase detection like \natom interferometry. The details about the method of active \natom interferometry will appear elsewhere. \n\n1 \n*I*0 \n(δϕ2)ω = (δ*Y*2)ω. \n\n1 1 \n\nκ/2, as in the recently \nτ− \nIn the region γ*ab*≪ \nproposed active optical clock [15] with atomic beam. The \nphase quadrature component of the field fluctuations can be \nexpressed as \n\n*T*− \n≪ ≪ \n\n*g*2 \n4(κ/2 + γ*ab*)2 { \n4γ*ab*˜*Nass*", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "4 \n\n) \nu \nm \ne \n\nH = 0 \n2 \n4 \n5 \n- 0 \n\n0 \n1 \n( \nT (K) \n0 \nt \n\nn \ne \nm \no \nM \n\n300 \n\n) \ne \nO \n200 \n( \nE \nH \n100 \n\n0 \n0 20 40 \nd (nm) \n\n1000 \n\n Applied field (Oe) ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2449.pdf" + }, + { + "text": "which depends only on the free-energy density f (0) \nand \nv \nRDF g(0) of the reference fluid, with β = (kBT )− \n1 and \nρi the concentration of species i. The Gibbs-Bogoliubov \ninequality [15] ensures that the right-hand side of Eq. (1) \nis actually a strict upper bound. Once a reference system \nhas been chosen, the expression on the right-hand side of \nEq. (1) must be minimized with respect to the parameters \ndefining the reference. This procedure yields the best \nfirst-order approximation to the free energy of the system \nunder consideration. \n\nFor a system of charged particles in solution, the nat- \nural reference is the PM, defined in terms of the charge \nand diameter (σi) of each species. In this case, the per- \nturbing potentials are just the short-range effective po- \ntentials computed above (∆Vij = V SR \nij ). We use the \nMSA [3] solution to the PM, since it provides analyti- \ncal expressions for both the free energy and the RDF. \nThe perturbation term is evaluated using an exponential \napproximation to the RDF obtained within the MSA, \ng(r) = exp [gMSA(r) − 1], which removes any unphysical \nnegative regions and improves the comparison with HNC \ncalculations. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2648.pdf" + }, + { + "text": "*Fk*(*t*)*Fl*(*t*′) \n(cid:11) \n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*t*′) +*D*(1) \n*kl*δ(*t*\n− \n*t*′ + τ) +*D*(3) \n*kl*δ(*t*\n− \n*t*′ + τ +*T*) +*D*(5) \n*kl*δ(*t*\n− \n*t*′ + 2τ +*T*) +*D*(7) \n*kl*δ(*t*\n*t*′ +*T*), \n\nτ) *t*′ \n− \nτ *t*′ *T*) \n− − \n2τ *t*′ *T*) \n\n− \n*t*′ − \n*T*) \n− − \n(7) \n− \n\nwhere*D*(*i*) \nfusion coefficients. \n\nBy the standard way [25], we can get the Heisenberg- \nLangevin equations of the motion for the single-atom and \nfiled operators. By introducing the macroscopic atomic oper- \nator,*M*(*t*) = \n*aa*(*t*),*Nb*(*t*) = \n*j*Γ*j*(*t*)σ*j*\n*bb*(*t*), the dynamic equations for the field and macro- ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2670.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2670.pdf", + "query": "What are the consequences on the linewidth for regular and Poissonian injections ?", + "target_page": 3, + "target_passage": " For regular injection (p = 1), the linewidth is the narrowest, while for Poissonian injection (p = 0), the linewidth is the broadest.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "From the expression above, we find that the pumping statis- \ntic can influence the linewidth. For regular injection (*p*= 1), \nthe linewidth is the narrowest, while for Poissonian injection \n(*p*= 0), the linewidth is the broadest. But even for regular \ninjection, the linewidth is larger than the case of one cavity. \nThat means the mechanism of separated-field does not play \nthe role in reducing the linewidth as in the conventional opti- \ncal Ramsey method, which is counter-intuitive. However, the \nseparated fields are indispensable for any phase detection like \natom interferometry. The details about the method of active \natom interferometry will appear elsewhere. \n\n1 \n*I*0 \n(δϕ2)ω = (δ*Y*2)ω. \n\n1 1 \n\nκ/2, as in the recently \nτ− \nIn the region γ*ab*≪ \nproposed active optical clock [15] with atomic beam. The \nphase quadrature component of the field fluctuations can be \nexpressed as \n\n*T*− \n≪ ≪ \n\n*g*2 \n4(κ/2 + γ*ab*)2 { \n4γ*ab*˜*Nass*", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "where Ω*R*\nresonance, \nthe Rabi \n*DS T*=*g*2 ˜*Nass*/*I*0γ*ab*\n,*DRam*\nand \n*ab*, \n∆2 = ω \nω*b*2) presents the detuning in the free \n(ω*a*2 − \ndrift region.*p*is a parameter, which characterizes the pump- \ning statistics: a Poissonian excitation statistics corresponds to \n*p*= 0 , and for a regular statistics we have*p*= 1. \n\nis \n\n− \n\n*Laser linwidth:*Suppose the quantum fluctuation is small, \nthe evolution of the fluctuations can be obtained by making a \nlinearization of the c-number Langevin equations around the \nsteady-state solution. Then the measured spectra of field fluc- \ntuations will be directly related to these quantities. By Fourier \ntransformations of the linearized equation, we get the ampli- \ntude and phase quadrature components δ*X*(ω) and δ*Y*(ω) [26]. \nWell above threshold, one can neglect the amplitude fluctu- \nations, and the linewidth inside the cavity is related to the \nphase-diffusion coefficient [25]. For small fluctuation of laser \nphase, the spectrum of phase fluctuations is simply related to \nthe spectrum of the phase quadrature component of the field \nfluctuations, namely, \n\nThen the linewidth of Ramsey laser with bad cavity is given \nby \n\nγ2 \n*ab*\n(κ/2 + γ*ab*)2 { \n\n. \n} \n(11) \nSince*DS T*/*DRam*≪ \n1 in our situation, and in the case of max- \nimal photon number, the steady state value of ˜*Nass*is about \n*R*τ/2. Then we get the \n\n2*g*2 \nκ ≈ − ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "σ*j* σ*j* = \n\n*a*(*t j*+ τ) \n*q*\nE \n*a*(*t j*+ 2τ +*T*) \n\n= \n\n*a*(*t j*+ τ +*T*) \nD \n= \n*b*(*t j*+ τ) \nσ*j*\n*b*(*t j*+ 2τ +*T*) \nD \n*i*σ*j*\n(*t j*+ τ +*T*) \nD− \n− \n\nwith*A*0 ,*A*1 \n\n*q*\nE \n*q*\nE \n*q*\nE \n*q*\nE \n*C*2 = \n*R*is the mean pumping \n. \n*q*\nE \nrate, which is defined in [26]. It is very easy to check that the \naverage values of the above Langevin forces are all zero. \n\nD \nσ*j* σ*j* = \n*A*2 , *B*0 \n\n*q*\nE \n,*B*2 \n\nD \nσ*j*\n*b*(*t j*+ τ +*T*) \nD \n*i*σ*j*\n(*t j*+ τ) \nD− \n− \n*i*σ*j*\n(*t j*+ 2τ +*T*) \n− \n\nD \n= = \n*B*1 \n\n*q*\nE \n,*C*1 \n*q*\n= = \n*C*0 \nE \n\nD− ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2670.pdf" + }, + { + "text": "**The Linewidth of Ramsey Laser with Bad Cavity**\n\nYang Li, Wei Zhuang, Jinbiao Chen,∗ and Hong Guo† \n*CREAM Group, State Key Laboratory of Advanced Optical Communication*\n*Systems and Networks (Peking University) and Institute of Quantum Electronics,*\n*School of Electronics Engineering and Computer Science,*\n*and Center for Computational Science and Engineering (CCSE), Peking University, Beijing 100871, P. R. China*\n(Dated: October 29, 2018) \n\nWe investigate a new laser scheme by using Ramsey separated-field technique with bad cavity. By studying \nthe linewidth of the stimulated-emission spectrum of this kind of laser inside the cavity, we find its linewidth \nis more than two orders of magnitude narrower than atomic natural linewidth, and it is far superior to that \nof conventional optical Ramsey method and any other available subnatural linewidth spectroscopy at present. \nSince any cavity related noise is reduced to cavity-pulling effect in bad cavity laser, this Ramsey laser provides \nthe possibility of precision subnatural linewidth spectroscopy, which is critical for the next generation of optical \nclock and atom interferometers. \n\nPACS numbers: 42.55.Ah, 42.50.Ar, 42.60.Da, 32.30.-r ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2670.pdf" + }, + { + "text": "*t*′) + ˜*D*(1) \n*kl*δ(*t*\n− \n*t*′ + τ) + ˜*D*(3) \n*kl*δ(*t*\n− \n*t*′ + τ +*T*) + ˜*D*(5) \n*kl*δ(*t*\n− \n*t*′ + 2τ +*T*) + ˜*D*(7) \n*kl*δ(*t*\n*t*′ +*T*), \n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n*kl*δ(*t*\n\nτ *t*′ *T*) \n− − \n2τ *t*′ *T*) \n\n− \n*t*′ − \n*T*) \n− − \n(8) \n− \n\nwhere ˜*D*(*i*) \nrelated to quantum Langevin diffusion coefficients*D*(*i*) \n[27]. \n*a*(*t*), \n\n*Steady-state solutions:*The steady-state solutions for the \nmean values of the field and atomic variables for laser op- \neration are obtained by dropping the noise terms of the c- \nnumber Langevin equations and setting the time derivatives \nequal to zero. The analytical solutions are very complex, and \none could numerically solve the steady-state equations. In this \npaper, we only care about the bad cavity limit γ*max*≪ \n≪ \nτ− \nκ/2. Since the atomic transit time is much shorter than \nthe damping times of atomic variables, one could ignore the \neffect of the spontaneous emission of the atom. By the stan- \ndard way [25], We get the following steady-state values: \n, \n\n, \n\n, \n\n, ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2670.pdf" + }, + { + "text": "AJA and MJR gratefully acknowledge RCUK and EPSRC, respectively, for financial support. We \n\nacknowledge support by the European Union via the FP6 and FP7 Marie Curie schemes [Grants \n\nMRTN-CT-2004005728 (PATTERNS) and PITN-GA-2008-214919 (MULTIFLOW)]. ", + "page_start": 24, + "page_end": 24, + "source_file": "1001.2669.pdf" + }, + { + "text": "*kl*are the c-number Langevin diffusion coefficients, \n*kl*as in \n\n˙Γ*j*(*t*)σ*j* Γ*j*(*t*)*f j* *Fa*(*t*) = \n*A*0 +*A*1 − \n*A*2) + *a*(*t*) \n*R*(1 \n− − \nX*j* X*j*\n\n˙Γ*j*(*t*)σ*j* Γ*j*(*t*)*f j* *Fb*(*t*) = \n*b*(*t*) +*R*(*B*0 − \n*B*1 +*B*2) + \n*b*(*t*), \nX*j* X*j*\n\n1 \n*T*− \n\n˙Γ*j*(*t*) ˜σ*j*\n− \nΓ*j*(*t*)*f j* *FM*(*t*) = \n(*t*) +*R*(*C*0 − \n*C*1 +*C*2) σ(*t*), \n*i* *i* 1 \n− − \n≪ X*j* X*j*", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2670.pdf" + }, + { + "text": "λx Hperturbation, x = λx[Sj1 \n\nSk1 + sgn(Jx) \nSj2 + Sk1 (Sj2 \n· \nSk2). \n\nSk2)] \n· · \nJx(Sj1 \n\n− \nJx| · \n\n· · \n\nwhere λx = \nof Jx. \n\n12 Jcluster, sgn(Jx) = 1 is the sign \np | ± \n\nThe perturbation on y-links is ", + "page_start": 6, + "page_end": 6, + "source_file": "1001.0266.pdf" + }, + { + "text": "1 \n) \n\n∞ \nW \n( \n\n0.6 \n/ \n) \nc \n\nω \nW \n( \n\n0.2 \n\n0 \n0.5 \nω \n in eV \nc \n\nFIG. 11: The evolution of the optical integral in the NS (top) \nand the SCS (bottom) in the original MFLI model. Parame- \nters are the same as above. Note that only \n80% of the \nspectral weight is recovered up to 1eV . \n75 \n∼ − \n\nNS and SCS ∆W (Original MFLI) \n\nwith lattice \nwithout lattice \n\n) \nc \n20 \nω \n( \n\nS \nN \nW \n− \n) \n10 \n\nnot not a generic one. There exists a range of parame- \nters α and Γ where ∆WK is still positive, but ∆W (ωc) \nchanges the sign twice and is negative at intermediate \nfrequencies. We show an example of such behavior in \nFig14. Still, for most of the parameters, the behavior of \n∆W (ωc) is the same as in Fig. 12. \n\nc \nω \n( \n\nC \nS \nW \n0 \n0.2 \n0.6 \n0.4 \nω \n in eV \nc \n\nFIG. 12: Evolution of the difference of the optical integrals in \nthe SCS and the NS with the upper cut-off ωc. Parameters are \nthe same as before. Observe that the optical sum in the SCS \nis larger than in the NS and that ∆W has not yet reached \n∆WK up to the bandwidth. The dashed line is the FGT \nresult. ", + "page_start": 8, + "page_end": 8, + "source_file": "1001.0764.pdf" + }, + { + "text": "Fig 5 shows the optical sum in NS and SCS in clean \nand dirty limits (the parameters are stated in the fig- \nure). This plot shows that the Kubo sums are almost \ncompletely recovered by integrating up to the bandwidth \nof 1eV : the recovery is 95% in the clean limit and ∼ 90% \nin the dirty limit. In Fig 6 we plot ∆W (ωc) as a function \nof ωc in clean and dirty limits. ∆W (∞) is now non-zero, \nin agreement with Fig. 4 and we also see that there is For completeness, we first present some well known \nresults about the conductivity and optical integral for a ", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0764.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2449.pdf", + "query": "Give me the advantages of Ferromagnetic semiconductors", + "target_page": 1, + "target_passage": "Ferromagnetic (FM) semiconductors offer the prospect of combining high-density storage and gate-controlled logic in a single material.", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "The development of FM metal/FM semiconductor het- \nerostructures has the potential to bring together the \nbenefits of metal and semiconductor based spintron- \nics, offering access to new functionalities and physi- \ncal phenomena. Recent studies of MnAs/(Ga,Mn)As \nand NiFe/(Ga,Mn)As bilayer films have shown FM in- \nterlayer coupling and independent magnetization be- \nhavior, respectively4,5. Of particular interest is the \nFe/(Ga,Mn)As system, since the growth of epitaxial \nFe/GaAs(001) films is well-established6. Remarkably, a \nrecent x-ray magnetic circular dichroism (XMCD) study \nhas shown that Fe may induce a proximity polariza- \ntion in the near-surface region of (Ga,Mn)As, antipar- \nallel to the Fe moment and persisting even above room \ntemperature7. Devices incorporating Fe/(Ga,Mn)As \ntherefore offer the prospect of obtaining non-volatile \nroom temperature spin-polarization in a semiconductor. \nUntil now, no information has been revealed about the \ncoupling of Fe to (Ga,Mn)As layers away from the near- \nsurface region. At the surface, the (Ga,Mn)As layer may \nbe highly non-stoichiometric and Mn-rich, due to its non- \nequilibrium nature8,9. Previously, Fe/(Ga,Mn)As layers \nwere produced by a process including exposure to air fol- \nlowed by sputtering and annealing prior to Fe deposition, ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2449.pdf" + }, + { + "text": "Similar behavior is observed for bilayer samples con- \ntaining a 10 nm or 50 nm (Ga,Mn)As layer, with a \nbias field which is approximately inversely proportional \nto the thickness d of the ferromagnetic semiconductor \nlayer (Fig. 1, inset). This 1/d dependence of HE was \nfound previously for MnAs/(Ga,Mn)As bilayers4, and \nis generally observed in exchanged-biased thin films12. \nFrom this dependence it is possible to describe the ex- \nchange bias in terms of an interface energy per unit area, \n∆E = MF SHEd = 0.003 erg/cm2. This value is rather \nsmall compared to typical exchange bias systems12, re- \nflecting the low moment density MF S of the diluted \nFM semiconductor layer. However, the bias field for a \ngiven (Ga,Mn)As thickness is larger than is observed for \nMnO/(Ga,Mn)As structures13, while the reproducibility \nand flexibility of the present structures is much higher \ndue to the single-crystalline ferromagnetic nature of the \nFe layer. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "] \ni \nc \ns \n- \nl \nr \nt \n\nFerromagnetic (FM) semiconductors offer the prospect \nof combining high-density storage and gate-controlled \nlogic in a single material. The realization of spin-valve \ndevices from FM semiconductors requires the controlled \nswitching of magnetization in adjacent layers between \nantiferromagnetic (AFM) and FM configurations. This \nhas motivated several theoretical investigations of inter- \nlayer coupling in all-semiconductor devices1, and AFM \ncoupling has recently been demonstrated in (Ga,Mn)As \nmultilayers separated by p-type non-magnetic spacers2. \nHowever, the Curie temperature TC of (Ga,Mn)As is \ncurrently limited to 185 K in single layers3, and is \ntypically much lower for layers embedded within a \nheterostructure2, which is an obstacle to the practical \nimplementation of semiconductor spintronics. \n\nm \n\n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\nHere, we demonstrate an antiferromagnetic coupling \nand exchange bias in Fe/(Ga,Mn)As bilayer films, by \ncombining element-specific XMCD measurements and \nbulk-sensitive superconducting quantum interference de- \nvice (SQUID) magnetometry. As with previous studies \nof FM metal/FM semiconductor bilayers4,5 (and in con- \ntrast to AFM coupled FM metal/FM metal exchange bias \nstructures10,11) the layers are in direct contact without \na non-magnetic spacer in between. We distinguish in- \nterface and bulk (Ga,Mn)As layers that are respectively \nstrongly and weakly antiferromagnetically coupled to the \nFe overlayer. In agreement with Ref.7, the interface layer \nremains polarized at room temperature. \n\n1 \nv \n9 \n4 \n4 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2449.pdf" + }, + { + "text": "measurements were performed on beamline I06 at the \nDiamond Light Source, and on beamline 4.0.2 at the Ad- \nvanced Light Source. Total-electron yield (TEY) and \nfluorescence yield (FY) were monitored simultaneously \nusing the sample drain current and the photocurrent of a \ndiode mounted at 90◦ to the incident beam, respectively. \nwere \nmagnetometry \nand \ncontrol Fe/GaAs(001) \nfirst \non \nperformed \ngrown under \nthe \nsamples, \n(Ga,Mn)As/GaAs(001) \nsame conditions as the bilayers, \nto determine the \nmagnetic anisotropies of the individual layers and the \nCurie temperature of the (Ga,Mn)As layer. The Fe film \nhas a uniaxial magnetic anisotropy with easy axis along \nthe [110] orientation, similar to previous studies6. For \nthe (Ga,Mn)As control sample, there is a competition \nbetween cubic and uniaxial magnetic anisotropies, with \nthe former dominant at low temperatures and favoring \neasy axes along the in-plane h100i orientations, and the \nlatter dominant close to TC (∼35 K) giving an easy axis \nalong the [1¯10] orientation. Figure 1 shows [110] magne- \ntization versus temperature curves and low temperature \nhysteresis loops for a bilayer film containing a 20 nm \nthick (Ga,Mn)As layer. The total remnant moment of \nthe bilayer film decreases on cooling under zero magnetic \nfield below the TC of the (Ga,Mn)As, indicating that \nthis layer aligns antiparallel to the Fe magnetization \nat zero field. The hysteresis curve shows a two-step \nmagnetization reversal, indicating different behavior of \nthe Fe and (Ga,Mn)As layers, with the smaller loop \nattributed to the dilute moment (Ga,Mn)As film. The \nminor hysteresis loop shown in Fig. 1 clearly shows a \nshift from zero field by a bias field HE, indicating that \nthe Fe layer induces an exchange bias in the magnetic \nsemiconductor. The shape and size of the minor loop \nis in agreement with the hysteresis loop for the control \n(Ga,Mn)As sample, also shown in Fig. 1. This strongly \nindicates that the exchange bias affects the whole of the \n(Ga,Mn)As layer in the bilayer sample. \n\nSQUID ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "The Fe and (Ga,Mn)As layers of the present study \nwere both grown by molecular beam epitaxy in the same \nultra-high vacuum system, in order to ensure a clean in- \nterface between them. The (Ga,Mn)As layer of thickness \n10 to 50 nm was deposited on a GaAs(001) substrate \nat a temperature of 260◦C, using previously established \nmethods3,8. A low Mn concentration of x ≈ 0.03 was \nchosen in order to avoid the formation of compensating \nMn interstitials. The substrate temperature was then \nreduced to ∼0◦C, before depositing a 2 nm Fe layer, \nplus a 2 nm Al capping layer. \nIn-situ reflection high \nenergy electron diffraction and ex-situ x-ray reflectivity \nand diffraction measurements confirmed that the layers \nare single-crystalline with sub-nm interface roughness. \nSQUID magnetometry measurements were performed us- \ning a Quantum Design Magnetic Property Measurement \nSystem. Mn and Fe L2,3 x-ray absorption and XMCD ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2449.pdf" + }, + { + "text": "In summary, we have demonstrated antiferromagnetic \ncoupling between Fe and (Ga,Mn)As layers in bilayer \nstructures. A markedly different coupling is observed for \nthe bulk of the (Ga,Mn)As layer and for Mn moments \nin the near-interface region. A thickness-dependent ex- \nchange bias field is observed to affect the whole of the \nbulk (Ga,Mn)As layer, which aligns antiparallel to the \nFe layer at low fields, and switches to parallel when the \nexternal field is large enough to overcome the bias field \nand the magnetocrystalline anisotropy fields. In contrast, \nthe interfacial Mn moments remain aligned antiparallel \nto the Fe layer even at 20 kOe, the largest field studied, \nand are polarized at temperatures well above the TC of \nthe bulk (Ga,Mn)As layer. The latter observation con- \nfirms the recently reported result of Ref. 7, in which \nthe Fe/(Ga,Mn)As bilayers were produced by a different \nmethod but showed qualitatively similar behavior of the \ninterfacial moments. Our results shed new light on the \nmagnetic coupling in Fe/(Ga,Mn)As hybrid layers which \nare of potential interest for room temperature spintron- \nics, and also offer a means of controlling the spin orien- \ntation in a FM semiconductor. \nfrom EU grants \nacknowledge \nand \nSemiSpinNet-215368 \nSTFC studentship grant CMPC07100. The Advanced \nLight Source is supported by the U.S. Department of \nEnergy under Contract No. \nDE-AC02-05CH11231. \nWe thank Leigh Shelford for help during the Diamond \nbeamtime. \n\nWe ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2449.pdf" + }, + { + "text": "which may further disrupt the interface order. The ori- \ngin of the interface magnetism then had to be inferred by \ncomparison to a series of reference samples7. Demonstra- \ntion of coupling between the bulk of the layers, i.e., an \nexchange bias effect, would provide direct evidence of the \ninterface magnetic order. Moreover, such coupling would \noffer new means of manipulating the FM semiconductor \nspin state and utilizing the proximity polarization effect \nin a spintronic device. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2449.pdf" + }, + { + "text": "samples15, the projected Mn 3d magnetic moments are \nobtained as −1.4 µB and +0.8 µB per ion at remanence \nand 1000 Oe, respectively. \n\nmonolayers, assuming a uniform distribution of Mn ions \nand magnetic moments throughout the (Ga,Mn)As film. \nThis is around a factor of three thinner than in Ref.7, \nwhich could be due to the lower Mn concentration or the \ndifferent preparation method of the present samples. \n\nThe difference between these values can be understood \nas being due to an interface layer which is strongly anti- \nferromagnetically coupled to the Fe layer. At zero field, \nboth the interfacial and bulk Mn are aligned antiparallel \nto the Fe layer. At high fields, the bulk of the (Ga,Mn)As \nlayer away from the interface is re-oriented into the exter- \nnal field direction. However, the interfacial Mn remains \nantiparallel to the Fe layer and thus partially compen- \nsates the XMCD signal from the bulk of the (Ga,Mn)As. \nFrom the size of the remanent and 1000 Oe magnetic \nmoments, it can be estimated that around 25-30% of the \nTEY XMCD signal can be ascribed to the interfacial Mn \nwhich is strongly coupled to the Fe moments. ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2449.pdf" + }, + { + "text": "FIG. 1. \n(color) Main figure: Major (red/black) and minor \n(green) hysteresis loops along the [110] axis at 5 K, for a \nFe (2 nm)/(Ga,Mn)As (20 nm) film, and the hysteresis loop \nfor a control (Ga,Mn)As (20 nm) film along the same axis \n(blue). Left inset: Magnetization versus temperature for the \nFe/(Ga,Mn)As film at remanence (black) and under a 500 Oe \napplied field (red). Right inset: Exchange bias field versus \nthickness d of the (Ga,Mn)As film (points) and fit showing \n1/d dependence (dashed line). ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2449.pdf" + }, + { + "text": "The interfacial Mn moments are ascribed to the prox- \nimity polarization of the (Ga,Mn)As interface by the Fe \nlayer, such as was shown previously by XMCD as well as \nab initio theory7. Evidence for this can be observed from \nmeasurement of the Mn L2,3 XMCD signal at tempera- \ntures above the (Ga,Mn)As TC . Similar to the previous \nstudy7, we observe a small but not negligible signal at \nroom temperature (Fig. 3), with opposite sign to the Fe \nL2,3 XMCD. Its spectral shape is characteristic of a local- \nized electronic configuration close to d5, similar to bulk \n(Ga,Mn)As7,9,15 but in contrast to Mn in more metallic \n7 or MnAs16. A slight \nenvironments such as MnxFe1−x \nbroadening is observed on the low energy side of the Mn \nL3 peak, which may be due to the different screening in- \nduced by proximity to the Fe layer. Since the measured \nintensity is attenuated with distance z from the surface \nas I = I0 exp(−z/λT EY ), the thickness of the strongly \ncoupled interface layer is estimated to be ∼0.7 nm or 2-3 ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2449.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2449.pdf", + "query": "I do not remember on wich samples SQUID magnetometry measurements were first performed", + "target_page": 2, + "target_passage": "SQUID magnetometry measurements were first performed on control Fe/GaAs(001) and (Ga,Mn)As/GaAs(001) samples", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "Clear differences are observed between the Mn XMCD \nhysteresis loops obtained using TEY and FY detection \nmodes. For FY the magnitude of the XMCD is similar \n(but of opposite sign) at remanence and at high mag- \nnetic fields, whereas for TEY at remanence it is approx- \nimately a factor of two larger than at 1000 Oe. The \nMn L2,3 XMCD spectra recorded at remanence and at \n1000 Oe, shown in Fig. 3, confirm this result. At re- \nmanence the FY and TEY detected XMCD have similar \nmagnitudes. However, under a large external field the \nXMCD is substantially smaller in TEY than in FY, con- \nfirming that the net magnetization of the Mn ions near \nthe interface is significantly less than in the bulk of the \n(Ga,Mn)As film. This is the case even up to the high- \nest field applied (20 kOe). By applying the XMCD sum \nrules14 to the TEY data, and by comparing the spectra to \nprevious measurements on well-characterized (Ga,Mn)As ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "75, 4650 (1995). \n45 Ar. Abanov, A. Chubukov, and J. Schmalian, Adv. Phys. Phys. Rev. B 58 2452 (1998). \n\n19 J. Hirsch, Physica C, 201, 347 (1992) and Ref 4. \n20 for a review see F. Marsiglio, J. Superconductivity and \n52, 119 (2003). \n46 Dessau et al., Phys. Rev. Lett 66, 2160(1991), Norman et \nal, Phys. Rev. Lett. 79, 3506(1997). Novel Magnetism 22, 269 (2009). \n21 F. Marsiglio, E. van Heumen, A. B. Kuzmenko, Phys. Rev. \n47 M.R. Norman and H. Ding, Phys. Rev. B 57, 11089(1998). \n48 C. Timm, D. Manske and K. H. Bennemann, Phys. Rev. B 77 144510 (2008). \nB 66, 094515(2002). \n49 A.V. Chubukov, M.R. Norman, Phys. Rev. B 70, ", + "page_start": 14, + "page_end": 14, + "source_file": "1001.0764.pdf" + }, + { + "text": "dependence of different samples during the measurement \nstage. For each temperature we have usually performed \nthree independent simulations, each one containing at \nleast 2×105 measurements, taken after discarding up to \n5×104 Monte Carlo steps in order to assure thermal equi- \nlibration. \n\nIn the proximity of the critical region the multiple his- \ntogram (MH) technique was also employed21, as it allows \nus to estimate the physical observables of interest over a \nwhole temperature range in a substantially continuous \nway by interpolating results obtained from sets of simu- \nlations performed at some different temperatures. \n\nFor all the quantities of interest, the average value and \nthe error estimate were obtained by the bootstrap re- \nsampling method22 given that, as pointed out in Ref. 23, \nfor a large enough number of measurements, this method \nturns out to be more accurate than the usual blocking \ntechnique. In our implementation, we pick out randomly \na sizable number of measurements (typically, between 1 \nand 1×103 for the single simulation, and between 1 and \n5×104 for the MH technique), and iterate the re-sampling \nat least one hundred times. ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0510.pdf" + }, + { + "text": "measurements were performed on beamline I06 at the \nDiamond Light Source, and on beamline 4.0.2 at the Ad- \nvanced Light Source. Total-electron yield (TEY) and \nfluorescence yield (FY) were monitored simultaneously \nusing the sample drain current and the photocurrent of a \ndiode mounted at 90◦ to the incident beam, respectively. \nwere \nmagnetometry \nand \ncontrol Fe/GaAs(001) \nfirst \non \nperformed \ngrown under \nthe \nsamples, \n(Ga,Mn)As/GaAs(001) \nsame conditions as the bilayers, \nto determine the \nmagnetic anisotropies of the individual layers and the \nCurie temperature of the (Ga,Mn)As layer. The Fe film \nhas a uniaxial magnetic anisotropy with easy axis along \nthe [110] orientation, similar to previous studies6. For \nthe (Ga,Mn)As control sample, there is a competition \nbetween cubic and uniaxial magnetic anisotropies, with \nthe former dominant at low temperatures and favoring \neasy axes along the in-plane h100i orientations, and the \nlatter dominant close to TC (∼35 K) giving an easy axis \nalong the [1¯10] orientation. Figure 1 shows [110] magne- \ntization versus temperature curves and low temperature \nhysteresis loops for a bilayer film containing a 20 nm \nthick (Ga,Mn)As layer. The total remnant moment of \nthe bilayer film decreases on cooling under zero magnetic \nfield below the TC of the (Ga,Mn)As, indicating that \nthis layer aligns antiparallel to the Fe magnetization \nat zero field. The hysteresis curve shows a two-step \nmagnetization reversal, indicating different behavior of \nthe Fe and (Ga,Mn)As layers, with the smaller loop \nattributed to the dilute moment (Ga,Mn)As film. The \nminor hysteresis loop shown in Fig. 1 clearly shows a \nshift from zero field by a bias field HE, indicating that \nthe Fe layer induces an exchange bias in the magnetic \nsemiconductor. The shape and size of the minor loop \nis in agreement with the hysteresis loop for the control \n(Ga,Mn)As sample, also shown in Fig. 1. This strongly \nindicates that the exchange bias affects the whole of the \n(Ga,Mn)As layer in the bilayer sample. \n\nSQUID ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "1 R. Kubo, J. Phys. Soc. Jpn 12, 570(1957). \n2 R.A. Ferrrel and R.E. Glover, Phys. Rev.109, 1398 (1958). \n3 M. Tinkham and R.A. Ferrrel, Phys. Rev. Lett. 2, 331 \n(1959), M. Tinkham, Introduction to Superconductivity \n(McGraw-Hill, New York, 1975). \n\nand Phys. Rev. B 62, 15131 (2000). \n\n24 A. Toschi, M. Capone, M. Ortolani, P. Calvani, S. Lupi \nand C. Castellani, Phys. Rev. Lett. 95, 097002 (2005). \n25 F. Marsiglio, F. Carbone, A. Kuzmenko and D. van der \nMarel, Phys. Rev. B 74, 174516 (2006). \n26 L. Benfatto, S. G. Sharapov, N. Andrenacci and H. Beck, \nPhys. Rev. B 71, 104511 (2005). ", + "page_start": 14, + "page_end": 14, + "source_file": "1001.0764.pdf" + }, + { + "text": "which may further disrupt the interface order. The ori- \ngin of the interface magnetism then had to be inferred by \ncomparison to a series of reference samples7. Demonstra- \ntion of coupling between the bulk of the layers, i.e., an \nexchange bias effect, would provide direct evidence of the \ninterface magnetic order. Moreover, such coupling would \noffer new means of manipulating the FM semiconductor \nspin state and utilizing the proximity polarization effect \nin a spintronic device. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2449.pdf" + }, + { + "text": "A possible framework to analyze the results presented \nin the previous Section is suggested by Fig. 5, where we \ni) high \ncan easily distinguish three significant regions: \nthickness, n > 16, where the films substantially display a \nbulk behaviour, with the single planes ordering tempera- \nture coinciding with the helical phase transition one; ii) \nintermediate thickness, 6 ≤ n . 15, where the tempera- \nture corresponding to the onset of in-plane order, TC (n), \nis still ≃ T Ho \nN , but where the helical/fan arrangement sta- \nbilizes only below a finite temperature TN (n) < TC (n); \niii) low thickness,1 ≤ n ≤ 5, where TC(n) . T Ho \nN but no \nfan phase is present at any temperature. \n\nThe scenario just outlined for n = 8 results to be cor- \nrect in the thickness range 6 ≤ n . 15, where a clear \nseparation between TN (n) and TC(n) can be easily fig- \nured out. In such temperature window, the strong sur- \nface effects produce a quasi-FM set-up of the magnetic \nfilm structure along the z-direction. While leaving to the \nnext Section a more detailed discussion of this regime, we \nreport in Fig. 5 a plot of TN (n) and TC(n) vs. n for all \nthe simulated thicknesses. The separation between the \ntwo critical temperatures is maximum for n = 6, where \nTN (6) = 38(4), that is TN (6) ∼ 1 \n3 TC(6). For films with \nless than six layers no fan order is observed, i.e. for n = 5 \nand below the chirality does not display any typical fea- \nture of fan ordering at any temperature below TC(n). As \na representative quantity we finally look at the rotation ", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0510.pdf" + }, + { + "text": "For this purpose, we look at the temperature depen- \ndence of the rotation angle of the magnetization between \nNN planes. \nIn Fig. 7, ∆ϕl(T ) for n = 8 and n = 16 \n(continuous and dashed lines, respectively), is plotted for \nthe outermost planes, l = 1 . . . 4. For both thicknesses, a \nmonotonic trend is observed for all l, but at variance with \nwhat happens for the highest thickness, for n = 8 we see, \nstarting from a temperature T . TN (8), an abrupt drop \nof ∆ϕ3 and ∆ϕ4, which rapidly reach an almost con- \nstant value, only slightly larger than ∆ϕ1. In the tem- \nperature range TN (8) . T < TC(8) we thus substantially \nobserve the same small magnetic phase shifts between all \nNN layers, testifying an energetically stable quasi-FM \nconfiguration giving no contribution to the helical order \nparameters. The latter point can be made clearer by \nlooking at the the peak position Qz,max of the structure \nfactor S(0, 0, qz). In Fig. 8 the average of Qz,max vs T is \nreported, again for n = 8 and for different lateral dimen- \nsions L26. As expected from the previous argument, we \nsee that Qz,max = 0 for TN (8) < T < TC(8), while it be- \ngins to shift to higher values as soon as the temperature \ndecreases below TN (8), making apparent a progressive \nfan stabilization with Qz,max 6= 0 and reaching a value \nof about 21◦ for T = 10 K. ", + "page_start": 5, + "page_end": 5, + "source_file": "1001.0510.pdf" + }, + { + "text": "L2,3 absorption edges in order to determine the magnetic \nresponse of the individual elements. In L2,3 XMCD, elec- \ntrons are excited from a 2p core level to the unoccupied \n3d valence states of the element of interest by circularly \npolarized x-rays at the resonance energies of the transi- \ntions. The difference in absorption for opposite polariza- \ntions gives a direct and element-specific measurement of \nthe projection of the 3d magnetic moment along the x- \nray polarization vector. The absorption cross-section is \nconventionally obtained by measuring the decay products \n– either fluorescent x-rays or electrons – of the photoex- \ncited core hole. The type of decay product measured \ndetermines the probing depth of the technique. For Mn \nL2,3 absorption, the probing depths for FY and TEY de- \ntection are λF Y ≈ 100 nm and λT EY ≈ 3 nm. \nIn the \ncurrent experiment, the Mn XMCD measured using FY \nand TEY are thus sensitive to the bulk of the (Ga,Mn)As \nfilm and the near-interface layers, respectively. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "FIG. 6: Rotation angle ∆ϕl between magnetic moments on \nNN layers (l + 1, l) at some low temperatures, for thickness \nn = 5 and n = 6, and lateral dimension L = 64. \n\nthe same is true for the crossing point of the Binder cu- \nmulant of the average magnetization M (not reported in \nfigure), which is located at TC(8) = 133.3(3) K. These \ndata give a first rough indication that also for n = 8 all \nthe planes of the sample are still ordering almost at the \nsame temperature; such property has been observed for \nall the investigated thicknesses n below 16, so that TC(n) \nresults quite n-independent (see also Fig. 5) . \nl , M y \n\nwhere (M x \nl ) is the magnetic vector profile for each \nplane l. ∆ϕl is displayed in Fig. 6a and Fig. 6b, for \nn = 6 and n = 5, respectively. In Fig. 6a, a quite clear \nfan stabilization is observed when the temperature de- \nfor n = 5, ∆ϕl keeps an \ncreases, while in Fig. 6b, i.e. \nalmost temperature independent very small value; what’s \nmore, ∆ϕl seems to loose any temperature dependence \nas T = 0 is approached. We attribute the absence of fan \narrangement for n ≤ 5 as simply due to the lack of “bulk \nplanes” inside the film, so that we are left with only a 2d \ntrend at TC(n), i.e. at the temperature where the order \nparameters defined in Eqs. (2) and (3) show a critical \nbehaviour. ", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0510.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.2449.pdf", + "query": "What are the differences observed between the Mn XMCD hysteresis loops obtained using TEY and FY detection modes ?", + "target_page": 2, + "target_passage": "For FY the magnitude of the XMCD is similar (but of opposite sign) at remanence and at high mag netic fields, whereas for TEY at remanence it is approx imately a factor of two larger than at 1000 Oe.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Clear differences are observed between the Mn XMCD \nhysteresis loops obtained using TEY and FY detection \nmodes. For FY the magnitude of the XMCD is similar \n(but of opposite sign) at remanence and at high mag- \nnetic fields, whereas for TEY at remanence it is approx- \nimately a factor of two larger than at 1000 Oe. The \nMn L2,3 XMCD spectra recorded at remanence and at \n1000 Oe, shown in Fig. 3, confirm this result. At re- \nmanence the FY and TEY detected XMCD have similar \nmagnitudes. However, under a large external field the \nXMCD is substantially smaller in TEY than in FY, con- \nfirming that the net magnetization of the Mn ions near \nthe interface is significantly less than in the bulk of the \n(Ga,Mn)As film. This is the case even up to the high- \nest field applied (20 kOe). By applying the XMCD sum \nrules14 to the TEY data, and by comparing the spectra to \nprevious measurements on well-characterized (Ga,Mn)As ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "FIG. 1. \n(color) Main figure: Major (red/black) and minor \n(green) hysteresis loops along the [110] axis at 5 K, for a \nFe (2 nm)/(Ga,Mn)As (20 nm) film, and the hysteresis loop \nfor a control (Ga,Mn)As (20 nm) film along the same axis \n(blue). Left inset: Magnetization versus temperature for the \nFe/(Ga,Mn)As film at remanence (black) and under a 500 Oe \napplied field (red). Right inset: Exchange bias field versus \nthickness d of the (Ga,Mn)As film (points) and fit showing \n1/d dependence (dashed line). ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.2449.pdf" + }, + { + "text": "Figure 2(a)-(c) shows the magnetic field dependence of \nXMCD asymmetry, defined as (Il − Ir)/(Il + Ir) where \nIl(r) is the absorption for left- (right-) circularly polarized \nx-rays. This is measured at the Fe and Mn L3 absorption \npeaks for a Fe(2 nm)/(Ga,Mn)As(10 nm) sample at 2 K. \nThe external field is applied along the photon incidence \ndirection, which is at 70◦ to the surface normal with \nan in-plane projection along the [110] axis. The XMCD \ndata show that the Fe film displays a square hysteresis \nloop with a single magnetization switch, as expected for \na monocrystalline Fe film with strong uniaxial magnetic \nanisotropy. The Mn XMCD shows a more complicated \nloop due to the effect of the interlayer coupling. The pro- \njected Mn moment aligns antiparallel to the Fe moment \nat remanence, and undergoes a magnetization reversal of \nopposite sign to the Fe. With further increase of the ex- \nternal magnetic field, the Mn moment gradually rotates \naway from antiparallel alignment with the Fe layer, and \ninto the field direction. Qualitatively similar behavior \nis observed for the Fe(2 nm)/(Ga,Mn)As(20 nm) sam- \nple: the (Ga,Mn)As layer is aligned antiparallel to the \nFe layer at zero field, although the bias field is lower by \napproximately a factor of two. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "samples15, the projected Mn 3d magnetic moments are \nobtained as −1.4 µB and +0.8 µB per ion at remanence \nand 1000 Oe, respectively. \n\nmonolayers, assuming a uniform distribution of Mn ions \nand magnetic moments throughout the (Ga,Mn)As film. \nThis is around a factor of three thinner than in Ref.7, \nwhich could be due to the lower Mn concentration or the \ndifferent preparation method of the present samples. \n\nThe difference between these values can be understood \nas being due to an interface layer which is strongly anti- \nferromagnetically coupled to the Fe layer. At zero field, \nboth the interfacial and bulk Mn are aligned antiparallel \nto the Fe layer. At high fields, the bulk of the (Ga,Mn)As \nlayer away from the interface is re-oriented into the exter- \nnal field direction. However, the interfacial Mn remains \nantiparallel to the Fe layer and thus partially compen- \nsates the XMCD signal from the bulk of the (Ga,Mn)As. \nFrom the size of the remanent and 1000 Oe magnetic \nmoments, it can be estimated that around 25-30% of the \nTEY XMCD signal can be ascribed to the interfacial Mn \nwhich is strongly coupled to the Fe moments. ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2449.pdf" + }, + { + "text": "measurements were performed on beamline I06 at the \nDiamond Light Source, and on beamline 4.0.2 at the Ad- \nvanced Light Source. Total-electron yield (TEY) and \nfluorescence yield (FY) were monitored simultaneously \nusing the sample drain current and the photocurrent of a \ndiode mounted at 90◦ to the incident beam, respectively. \nwere \nmagnetometry \nand \ncontrol Fe/GaAs(001) \nfirst \non \nperformed \ngrown under \nthe \nsamples, \n(Ga,Mn)As/GaAs(001) \nsame conditions as the bilayers, \nto determine the \nmagnetic anisotropies of the individual layers and the \nCurie temperature of the (Ga,Mn)As layer. The Fe film \nhas a uniaxial magnetic anisotropy with easy axis along \nthe [110] orientation, similar to previous studies6. For \nthe (Ga,Mn)As control sample, there is a competition \nbetween cubic and uniaxial magnetic anisotropies, with \nthe former dominant at low temperatures and favoring \neasy axes along the in-plane h100i orientations, and the \nlatter dominant close to TC (∼35 K) giving an easy axis \nalong the [1¯10] orientation. Figure 1 shows [110] magne- \ntization versus temperature curves and low temperature \nhysteresis loops for a bilayer film containing a 20 nm \nthick (Ga,Mn)As layer. The total remnant moment of \nthe bilayer film decreases on cooling under zero magnetic \nfield below the TC of the (Ga,Mn)As, indicating that \nthis layer aligns antiparallel to the Fe magnetization \nat zero field. The hysteresis curve shows a two-step \nmagnetization reversal, indicating different behavior of \nthe Fe and (Ga,Mn)As layers, with the smaller loop \nattributed to the dilute moment (Ga,Mn)As film. The \nminor hysteresis loop shown in Fig. 1 clearly shows a \nshift from zero field by a bias field HE, indicating that \nthe Fe layer induces an exchange bias in the magnetic \nsemiconductor. The shape and size of the minor loop \nis in agreement with the hysteresis loop for the control \n(Ga,Mn)As sample, also shown in Fig. 1. This strongly \nindicates that the exchange bias affects the whole of the \n(Ga,Mn)As layer in the bilayer sample. \n\nSQUID ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "FIG. 3. (color online) (a) Polarization-averaged Mn L2,3 spec- \ntrum for a Fe/(Ga,Mn)As film; (b) XMCD spectra measured \nin remanence at 2 K; (c) XMCD spectra measured under a \n1000 Oe applied field at 2 K; (d) XMCD spectrum measured \nunder a 2000 Oe applied field at 300 K. XMCD spectra are \nobtained using TEY (thick red lines) and FY (thin blue lines) \ndetection. ", + "page_start": 5, + "page_end": 5, + "source_file": "1001.2449.pdf" + }, + { + "text": "L2,3 absorption edges in order to determine the magnetic \nresponse of the individual elements. In L2,3 XMCD, elec- \ntrons are excited from a 2p core level to the unoccupied \n3d valence states of the element of interest by circularly \npolarized x-rays at the resonance energies of the transi- \ntions. The difference in absorption for opposite polariza- \ntions gives a direct and element-specific measurement of \nthe projection of the 3d magnetic moment along the x- \nray polarization vector. The absorption cross-section is \nconventionally obtained by measuring the decay products \n– either fluorescent x-rays or electrons – of the photoex- \ncited core hole. The type of decay product measured \ndetermines the probing depth of the technique. For Mn \nL2,3 absorption, the probing depths for FY and TEY de- \ntection are λF Y ≈ 100 nm and λT EY ≈ 3 nm. \nIn the \ncurrent experiment, the Mn XMCD measured using FY \nand TEY are thus sensitive to the bulk of the (Ga,Mn)As \nfilm and the near-interface layers, respectively. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "Similar behavior is observed for bilayer samples con- \ntaining a 10 nm or 50 nm (Ga,Mn)As layer, with a \nbias field which is approximately inversely proportional \nto the thickness d of the ferromagnetic semiconductor \nlayer (Fig. 1, inset). This 1/d dependence of HE was \nfound previously for MnAs/(Ga,Mn)As bilayers4, and \nis generally observed in exchanged-biased thin films12. \nFrom this dependence it is possible to describe the ex- \nchange bias in terms of an interface energy per unit area, \n∆E = MF SHEd = 0.003 erg/cm2. This value is rather \nsmall compared to typical exchange bias systems12, re- \nflecting the low moment density MF S of the diluted \nFM semiconductor layer. However, the bias field for a \ngiven (Ga,Mn)As thickness is larger than is observed for \nMnO/(Ga,Mn)As structures13, while the reproducibility \nand flexibility of the present structures is much higher \ndue to the single-crystalline ferromagnetic nature of the \nFe layer. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2449.pdf" + }, + { + "text": "] \ni \nc \ns \n- \nl \nr \nt \n\nFerromagnetic (FM) semiconductors offer the prospect \nof combining high-density storage and gate-controlled \nlogic in a single material. The realization of spin-valve \ndevices from FM semiconductors requires the controlled \nswitching of magnetization in adjacent layers between \nantiferromagnetic (AFM) and FM configurations. This \nhas motivated several theoretical investigations of inter- \nlayer coupling in all-semiconductor devices1, and AFM \ncoupling has recently been demonstrated in (Ga,Mn)As \nmultilayers separated by p-type non-magnetic spacers2. \nHowever, the Curie temperature TC of (Ga,Mn)As is \ncurrently limited to 185 K in single layers3, and is \ntypically much lower for layers embedded within a \nheterostructure2, which is an obstacle to the practical \nimplementation of semiconductor spintronics. \n\nm \n\n. \nt \na \nm \n- \nd \nn \no \nc \n[ \n\nHere, we demonstrate an antiferromagnetic coupling \nand exchange bias in Fe/(Ga,Mn)As bilayer films, by \ncombining element-specific XMCD measurements and \nbulk-sensitive superconducting quantum interference de- \nvice (SQUID) magnetometry. As with previous studies \nof FM metal/FM semiconductor bilayers4,5 (and in con- \ntrast to AFM coupled FM metal/FM metal exchange bias \nstructures10,11) the layers are in direct contact without \na non-magnetic spacer in between. We distinguish in- \nterface and bulk (Ga,Mn)As layers that are respectively \nstrongly and weakly antiferromagnetically coupled to the \nFe overlayer. In agreement with Ref.7, the interface layer \nremains polarized at room temperature. \n\n1 \nv \n9 \n4 \n4 \n2 \n. \n1 \n0 \n0 \n1 \n: \nv \ni \nX \nr \na ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.2449.pdf" + }, + { + "text": "FIG. 2. (color online) XMCD asymmetry versus applied field \nalong the [110] axis at 2 K, for a Fe (2 nm)/(Ga,Mn)As \n(a) Fe L3, total electron yield; (b) Mn L3, \n(10 nm) film. \ntotal electron yield; (c) Mn L3, fluorescent yield. Black and \nred points are data for increasing and decreasing fields respec- \ntively; lines are to guide the eye. ", + "page_start": 4, + "page_end": 4, + "source_file": "1001.2449.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_KCN_2013.pdf", + "query": "What is Kingsgate ?", + "target_page": 2, + "target_passage": "Kingsgate is a highly successful gold mining, development and exploration company with two operating gold mines and two advanced development projects.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "***Kingsgate is a highly successful gold***\n***mining, development and exploration***\n***company with two operating gold mines***\n***and two advanced development projects.***\n***Shareholders can look forward to the***\n***benefits of this strong operating and***\n***development platform, where Kingsgate***\n***aims to build value though operating,***\n***earnings and dividend growth for***\n***the benefit of all stakeholders.***", + "page_start": 1, + "page_end": 1, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Your Directors present their report on the Group consisting of Kingsgate Consolidated Limited and the entities it controlled at the end of, \nor during, the year ended 30 June 2013. \n\nDirectors \n\nReview of operations \nand results \n\nThe following persons were Directors of \nKingsgate Consolidated Limited during the \nwhole of the financial year and up to the date of \nthis report. \n\nOperational performance \nKingsgate is a gold mining, development and \nexploration company based in Sydney, Australia. \nKingsgate owns and operates two gold mines, \nthe world class Chatree Mine in Thailand and the \nunderground Challenger Mine in South Australia. \nIn addition, the Company has two advanced \ndevelopment projects, the Nueva Esperanza \nSilver / Gold Project, in the highly prospective \nMaricunga Gold / Silver Belt in Chile, and the \nBowdens Silver Project in New South Wales, \nAustralia. From this operating and development \nplatform, Kingsgate aims to build value for all \nshareholders. \n\n〉〉 Ross Smyth-Kirk Chairman \n〉〉 Peter Alexander Non-Executive Director \n〉〉 Craig Carracher Non-Executive Director \n〉〉 Peter McAleer Non-Executive Director \n〉〉 Gavin Thomas Executive Director \n\nThe principal activities of Kingsgate \nConsolidated Limited are mining and mineral \nexploration in Australia, South East Asia and \nSouth America. \n\nGroup gold production was 199,897 ounces, a \ndecrease of 4% on the previous corresponding \nyear. The contribution from Chatree was \n133,681 ounces with 66,216 ounces from \nChallenger. \nDividends \n\nDividends paid to members during the financial \nyear were as follows: ", + "page_start": 42, + "page_end": 42, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Looking Ahead \n\nOver the current financial year and beyond, \nKingsgate remains focused on optimising \nproduction within an uncertain metal price \nenvironment, continuing to build resources \nand reserves and advancing the development \nproject pipeline of Nueva Esperanza and \nBowdens. These initiatives are designed to \ngrow earnings per share for the benefit of all \nshareholders. ", + "page_start": 6, + "page_end": 6, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "29. Key management personnel disclosures \n\n(a) Directors \nThe following persons were Directors of Kingsgate during the financial year. \n\n〉〉 Ross Smyth-Kirk \n〉〉 Peter Alexander \n〉〉 Craig Carracher \n〉〉 Peter McAleer \n〉〉 Gavin Thomas \n\nChairman \n\nNon-Executive Director \n\nNon-Executive Director \n\nNon-Executive Director \n\nManaging Director ", + "page_start": 104, + "page_end": 104, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Independent auditor’s report to the members \nof Kingsgate Consolidated Limited \n\nReport on the financial report \n\nWe have audited the accompanying financial report of Kingsgate Consolidated Limited (the company), \nwhich comprises the statement of financial position as at 30 June 2013, the statement of comprehen- \nsive income, statement of changes in equity and statement of cash flows for the year ended on that \ndate, a summary of significant accounting policies, other explanatory notes and the directors’ declara- \ntion for Kingsgate Group (the consolidated entity). The consolidated entity comprises the company \nand the entities it controlled at year’s end or from time to time during the financial year. \n\nDirectors’ responsibility for the financial report \nThe directors of the company are responsible for the preparation of the financial report that gives a \ntrue and fair view in accordance with Australian Accounting Standards and the*Corporations Act 2001*\nand for such internal control as the directors determine is necessary to enable the preparation of the \nfinancial report that is free from material misstatement, whether due to fraud or error. In Note 1, the \ndirectors also state, in accordance with Accounting Standard AASB 101 Presentation of Financial \nStatements, that the financial statements comply with International Financial Reporting Standards. ", + "page_start": 112, + "page_end": 112, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "General Manager – Human Resources \nBrett Dunstone joined Kingsgate in December \n2012 and has over 25 years experience in senior \nhuman resource management roles across a \ndiverse industry portfolio. Brett was formerly \nhead of Human Resources for Crown Casino, \nMelbourne, the Myer group, key Village \nRoadshow entities and head of Employee \nRelations for the Coles Myer group. Brett has \nexperience in supporting both large and \nemerging resource company development \nprojects locally and overseas (BHP Billiton, \nWoodside, Equinox Minerals and Chalice Gold). \n\nChief Executive Officer – \nAkara Resources PCL \nPakorn Sukhum joined the management team of \nAkara Resources PCL as Chief Executive Officer \nat the end of 2009. He brings to Akara over 24 \nyears of industrial commercial managerial experi- \nence in various industries such as metallurgy, \nchemicals and ceramics in international and \ndomestic markets of Thailand, having held \nsenior management positions in both Thai and \nMultinational joint venture companies such as \nBasell Poyolefins, Bayer AG as well as Padeang \nIndustry of Thailand. His major contributions \nand responsibilities have ranged from project \nmanagement, commercial marketing and sales \nto business development. ", + "page_start": 40, + "page_end": 40, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
The Financial Report of Kingsgate Consolidated Limited ( Kingsgate or the “ Company ”) for the year ended 30 June 2013 was authorised forin Australian dollars, which is the Company ' s functional currency and presentation currency.amounts related to the settlement of a pre - existing relationship. Such amounts are generally recognised in profit or loss.
issue in accordance with a resolution of Directors on 23 September 2013.Rounding of amountsCosts related to the acquisition, other than those associated with the issue of debt or equity securities, that the Group incurs in connection with a business combination are expensed as incurred. Any contingent consideration payabled
Kingsgate is a Company limited by shares incorporated in Australia whose shares are publicly traded on the Australian Securities ExchangeThe Company is of a lind referred to in ASIIC Class Order 98 ( 100 dated 10 ) ( uly 3998 and in accordance with that Class Order, all financial information presented in Australian dollars has been rounded to the nearest thousand, or in certain cOritical accounting estimates
Acquisitions of non - controlling interests are their care their capacity as owners and theneficiency gross - will is recognised as a nesult of ouch transactions. The non - controlling interact in the adjust mental health in the controlleto as the “ Group ” and individually as “ Group entities ”). A description of the nature of theThe preparation of financial statements requires to preventions. The preparations to preparations that informations that impaired to exercise the judgement in the process of applying the Group ' s accounting policies. The areas invol
1. BASIS OF PREPARATIONThe general purpose financial statements have been prepared in accordance with Australian Accounting Standards, other authoritative pronouncements of the Australian Accounting Standards Board and the Corjoretties Act 20032. SIGNIFICANT ACCOUNTING
The acquisition of an asset or group of assets that is not a business is accounted for by allocating the cost of the transaction to the net identifiable assets and liabilities acquired based on their fair values.purpose of preparing : the financial statements.The principal accounting policies adopted in the preparation of the financial statements are set out below. These policies have been consistently applied to all the years presented.
( II ) SubsidiariesThe financial statements comply with International Financial Reporting StandardsSubsidiaries are entities controlled by the first - infantements of subsidiaries are included in the consolidated financial state - ments from the date that control commences until the date that control ceases.
Standards Board ( IASB ).TTTTCTCTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTHistorical cost convention
( i ) Business combinationsThe financial statements have been prepared under the historical cost : convention, as modified by the revaluation of available - for - sale financial assets and financial instruments ( including denviative instruments ) at fair value tBusiness combinations are accounted for using the acquisition method as at the acquisition to activities and the acquisition to activities. The activities and their transferred to the Group. Control is the prewer to govern the financin
The accounting policies of subsidiaries have been changed when necessary to align them with the policies adopted by the Group. Losses applicable to the non - controlling interests in a subsidiary are allocated to the non - controlling intFunctional and presentation currencycurrently are exercisable.
The financial statements of the Group entities are measured using the currency of the primary economic environment in which the entity operates (“ the functional currency ”). The consolidated financial statements are presentedThe consideration transferred for the acquisition of a subsidiary comprises the fair values of the assets transferred, the liabilities incurred and the equity interests issued by the Group. The consideration transferred does not inclIntra group balances and transactions, and any unrealised gains anising from intra - group trans - actions, are eliminated in preparing the consclidated financial statements. Unrealised losses are also eliminated unless the transact
", + "page_start": 69, + "page_end": 69, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Summary \n\nKingsgate has recorded the following financial \nperformance for the year to 30 June 2013: \n\n〉〉 Revenue of $329.3 million. \n〉〉 \nEBITDA (before significant items) of $115.8 \nmillion. \n\n〉〉 Profit before tax and significant items of \n$17.2 million. \n\n〉〉 \n\nLoss after tax and significant items of $323.7 \nmillion. This includes a net tax benefit of \n$20.6 million, relating to the Challenger Gold \nOperations (“Challenger”) impairment. \n〉〉 Non-cash asset impairments and other \n\nsignificant items of $356.8 million pre-tax, \nwith $311.9 million principally relating to \nChallenger ($291.3 million post-tax). \n〉〉 No final dividend has been declared. An \n\ninterim dividend of 5 cents per share was \ndeclared for the half year to 31 December \n2012. ", + "page_start": 9, + "page_end": 9, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
The Financial Report of Kingrate Consolidated Limited ( Kingsgate or the “ Company ”) for the year ended 30 June 2013 was authorised for issue in accordance with a resolution of Directors on 23 September 2013.in Australian dollars, which is functional currency and presRounding of amounts
Kingsgate is a Company limited by shares incorporated in Australia whose shares are publicly tradied on the Australian Securities Exchange using the ASX code KCN. The consolidated financial statements of the Company as at andThe Company is of a lind reficiass Order 98 ( 100 dated 10 accordance with that Class I information presented in Aus been rounded to the nearest certain cases, the nearest dortain cases, the nearest do
for the year ended 30 lune 2013 comprise the Company and its subsidiaries ( together referred to as the “ Group ” and individually as “ Group entities ”). A description of the nature of the Group ’ s operations and its principal activities is isCritical accounting estimates
The preparation of financial sthe use of certain critical accolt : also requires management judgement in the process of Croup ’ s accounting policies. a higher degree of judgemen1. BASIS OF PHEPARAIION
The general purpose financial statements have been prepared in accordance with Australian Accounting Standards, other authoritative pronouncements of the Australian Accounting Standards Board and the Corjoretties Act 2003Allelested
purpose of preparing : the financial statements.The principal accounting po preparation of the financial
Compliance with IFRSThe financial statements comply with International Financial Beporting Standards ( IFRS ) adopted by the International Accounting Standards Board ( IASB ).
Princinleenferencea.
Principles of consc( i )
Business combinationsHistorical cost convention
Business combinations are the acquisition method as a the acquisition method as a there intervention the Croup. Community transferred to the Group. Covern the financial and open the forest consideration potential vortical and considiThe financial statements have been prepared under the historical cost convention, as modified by the nevaluation of available - for - sale financial available for sale financial available for entity and financial interventions and fil
In assessing control, the Cro consideration potential votir currently are exercisable.The financial statements of the Group entities are measured using the currency of the primary economic environment in which the entity operates (“ the functional currency ”). The consolidated financial statements are presented
The consideration transferre of a subsidiary comprises the assets transferred, the liabilitie equity interests issued b consideration transferred do
", + "page_start": 69, + "page_end": 69, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "As a consequence, feasibility work has transi- \ntioned to assess a lower capital cost and lower \npower requirement option, namely the potential \nfor heap leach processing. Recently completed \nmetallurgical testwork demonstrated that \nprocessing of mineralisation from all three \ndeposits by heap leaching has the potential to \nbe technically and economically feasible and, as \na consequence, may become the preferred \nalternative for development. \n\nSale of Exploration Assets \nOn 28 March 2013, the Group sold its explora- \ntion assets in Western Australia and Queensland \nthrough the sale of shares in its subsidiary \ncompany, Quadrio Resources Limited, to Caravel \nMinerals Limited (“Caravel”), an Australian \ncompany listed on the ASX. \n\nKingsgate received 135,000,000 fully paid \nordinary shares in the issued capital of Caravel \nand 20,000,000 unlisted options to acquire \nCaravel shares exercisable at 10 cents on or \nbefore three years from the date of issue. \nSubsequent to the sale, Kingsgate became the \nlargest shareholder in Caravel with 35.54% held \nat 30 June 2013. Kingsgate’s holding in Caravel \nreduced to 27.04% post 30 June 2013 following \na rights issue by Caravel that Kingsgate did not \nparticipate in. \n\nEnvironmental approval for the original Arqueros \nProject was granted in July 2013. ", + "page_start": 43, + "page_end": 43, + "source_file": "ASX_KCN_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_KCN_2013.pdf", + "query": "What does demonstatre the feasibility study on the Nueva Esperanza Project ?", + "target_page": 6, + "target_passage": "The study demonstrated that open pit mining at two million tonnes per year and processing by milling and agitation leaching in cyanide was technically feasible, although high capital and power costs negatively impacted project economic returns. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Nueva Esperanza \nThe Nueva Esperanza Project was advanced \nduring the year with the completion of a draft \nfeasibility study. This study included a decision \nto mine the Arqueros and Teterita portions of \nNueva Esperanza. The study demonstrated that \nopen pit mining at two million tonnes per year \nand processing by milling and agitation leaching \nin cyanide was technically feasible, although \nhigh capital and power costs negatively \nimpacted project economic returns. ", + "page_start": 5, + "page_end": 5, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "The development projects continued to advance \nduring the year. At Nueva Esperanza, the feasi- \nbility work shifted to focus on identifying the \nlowest cost and lowest power consumption \ndevelopment alternatives. This included \nreviewing a heap leach process option with \non-site power generation. Further work is \nexpected to be completed in the December \nquarter 2013. At Bowdens, the feasibility work \nhas confirmed the optimum process route. \nCompletion of the technical feasibility study \nincluding mine planning, infrastructure and \nmetallurgy, and lodging of the Environmental \nImpact Statement (“EIS”) are scheduled for \n2014. ", + "page_start": 42, + "page_end": 42, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "\nNUEVA NUEVA \n\nESPERANZA ESPERANZA ", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Nueva Esperanza Silver / Gold Project \nThe Nueva Esperanza Silver / Gold Project \nadvanced during the year with an initial scoping \nstudy for a decision to mine the Arqueros and \nTeterita portions of Nueva Esperanza completed \nin late 2012. The study demonstrated that open \npit mining at two million tonnes per year and \nprocessing by milling and agitation leaching in \ncyanide was technically feasible although high \ncapital and power costs negatively impacted \nproject economic returns. \nExploration \nThe Group has a portfolio of exploration tene- \nments and applications in Thailand, Chile and \nLao PDR. Following the sale of exploration \ntenements to Caravel (refer below), exploration \nin Australia is currently only conducted in the \nvicinity of the Challenger Mine in South Australia \nand the Bowdens Silver Project in New South \nWales. \n\nTotal mill throughput for the year was 5.7 million \ntonnes, 11.4% higher than 2012, despite the \nimpact of the 63 day delay during which Plant #2 \nwas not operating. The overall plant availability \nof 98.1% was slightly lower than the previous \nyear’s 98.4%. The expanded plant is operating \naround 24% above the annual “nameplate” \nthroughput rate at 6.2 million tonnes per annum \nand this is expected to continue. ", + "page_start": 43, + "page_end": 43, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Summary \n\nThe Nueva Esperanza Project is 100% owned \nby Kingsgate since February 2012. Nueva \nEsperanza is located in the Maricunga Gold Belt \nnear Copiapó, a regional mining centre in \nNorthern Chile. The silver-rich mineralisation is \nhosted by the Esperanza high-sulphidation \nepithermal alteration system associated with \nthe Cerros Bravos volcanic complex. \n\nThe project consists of three well-defined miner- \nalised deposits and a number of undeveloped \nexploration targets. The main deposits are \nArqueros, Chimberos and Teterita. Arqueros was \npreviously mined on a limited scale by under- \nground methods and Chimberos was exploited \nas an open pit mine, delivering about 40 million \nounces of silver in 1998/99. All three deposits \ncurrently have a combined Mineral Resources of \nabout 93 million ounces of silver equivalent or \n1.6 million ounces of gold equivalent (EQ60)1. \n\nA feasibility study for a decision to mine the \nArqueros portion of Nueva Esperanza was \ncompleted in late 2012, demonstrating that open \npit mining at two million tonnes per year and \nprocessing by milling and agitation leaching in \ncyanide was technically feasible. Work remained \nto integrate the Teterita and Chimberos deposits \ninto the project, as well as to test lower cost \noptions for processing. Continued metallurgical \ntestwork has shown that mineralisation from all \nthree deposits by heap leaching is technically and \neconomically feasible and the preferred alterna- \ntive for development. ", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Environmental approvals to commence \nconstruction and mining at Nueva Esperanza \nwere granted in July 2013 for the original \nArqueros project. Work is underway to modify \nand update the environmental assessment to \nincorporate the heap leach process. ", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "A Definitive Feasibility Study commenced on the \nproject at the end of May 2011 with the focus \non Arqueros, and open pit mining of that deposit \nwith processing by traditional mill and agiitation \nleaching in cyanide. Subsequent acquisition of \nthe Teterita and Chimberos deposits resulted in \nan expansion of the feasibility study to incorpo- \nrate their resources. \nThe environmental permitting process for the \noriginal Arqueros project has been completed, \nwith approval to commence construction and \nmining granted by the Chilean authorities. \nA modification of the environmental assessment \nis being prepared to have the approvals modified \nfor heap leaching and on-site power generation. \n\nExtensive community consultation has been \nundertaken with positive outcomes, and rela- \ntionships with indigenous rural and urban \ncommunities remain a priority. \n\nIn late 2012, a decision was taken to examine \nlower cost options for processing using heap \nleaching. With major engineering already done, \ntechnical studies focussed on metallurgical \ntestwork and heap leach design. It has been \nestablished that the mineralisation from the \nthree deposits can be processed by HPGR (High \nPressure Grinding Rolls) crushing and heap \nleaching with silver and gold recoveries of the \norder of 70% to 75% for silver and 65% to 70% \nfor gold. The project development plan is now \nfocussed on a 3 million tonne per annum heap \nleach operation with an initial mine life of over 6 \nyears. Annualised production levels (post ramp- \nup) are estimated at 6.0–8.0 million ounces of \nsilver and 18,000–22,000 ounces of gold, at an \nindicative start-up capital cost between \nUS$130–150 million (inclusive of 25% \ncontingency). ", + "page_start": 29, + "page_end": 29, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Resource \n\nKingsgate has updated the project resource \nbase to incorporate the recent drilling on the \nChimberos project and using the current gold/ \nsilver ratio of 60 (previously 45) for its gold \nequivalent (AuEq60) and silver equivalent \n(AgEq60) calculations.The combined Measured, \nIndicated and Inferred mineral resource for the \nNueva Esperanza Project is based on resource \nblock modelling of Arqueros, Chimberos and \nTeterita, and has been estimated at a cut-off \ngrade of 0.5 grams per tonne (g/t), gold equiva- \nlent (AuEq60) to be 28.9 million tonnes at \n0.27 g/t gold and 84 g/t silver. \n\nThis represents about 250,000 ounces of gold \nand 78.5 million ounces of silver. \n\nThe Measured, Indicated and Inferred resource \nmay be expressed in gold or silver equivalent \nounces as: \n〉〉 Gold equivalent ounces (AuEQ60): 1.6 \nmillion ounces at 1.7 g/t gold equivalent; and \n\n〉〉 Silver equivalent ounces (AgEQ60): 93.5 ", + "page_start": 29, + "page_end": 29, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Looking Ahead \n\nOver the current financial year and beyond, \nKingsgate remains focused on optimising \nproduction within an uncertain metal price \nenvironment, continuing to build resources \nand reserves and advancing the development \nproject pipeline of Nueva Esperanza and \nBowdens. These initiatives are designed to \ngrow earnings per share for the benefit of all \nshareholders. ", + "page_start": 6, + "page_end": 6, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "The Company is currently in the process of obtaining land and developing plans for \nthe permanent casino facility. The design, budget and schedule of the permanent \nfacility are not finalized, and the ultimate timing, cost and scope of the project are \nsubject to risks attendant to large-scale projects. The ability to construct the perma- ", + "page_start": 70, + "page_end": 70, + "source_file": "NYSE_MGM_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_KCN_2013.pdf", + "query": "What is the Kingsgate net cash outflows from finiancing activities in 2013 ?", + "target_page": 11, + "target_passage": " Net cash outflows from financing activities was $1.7 million", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Summary \n\nKingsgate has recorded the following financial \nperformance for the year to 30 June 2013: \n\n〉〉 Revenue of $329.3 million. \n〉〉 \nEBITDA (before significant items) of $115.8 \nmillion. \n\n〉〉 Profit before tax and significant items of \n$17.2 million. \n\n〉〉 \n\nLoss after tax and significant items of $323.7 \nmillion. This includes a net tax benefit of \n$20.6 million, relating to the Challenger Gold \nOperations (“Challenger”) impairment. \n〉〉 Non-cash asset impairments and other \n\nsignificant items of $356.8 million pre-tax, \nwith $311.9 million principally relating to \nChallenger ($291.3 million post-tax). \n〉〉 No final dividend has been declared. An \n\ninterim dividend of 5 cents per share was \ndeclared for the half year to 31 December \n2012. ", + "page_start": 9, + "page_end": 9, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
The Financial Report of Kingsgate Consolidated Limited ( Kingsgate or the “ Company ”) for the year ended 30 June 2013 was authorised forin Australian dollars, which is the Company ' s functional currency and presentation currency.amounts related to the settlement of a pre - existing relationship. Such amounts are generally recognised in profit or loss.
issue in accordance with a resolution of Directors on 23 September 2013.Rounding of amountsCosts related to the acquisition, other than those associated with the issue of debt or equity securities, that the Group incurs in connection with a business combination are expensed as incurred. Any contingent consideration payabled
Kingsgate is a Company limited by shares incorporated in Australia whose shares are publicly traded on the Australian Securities ExchangeThe Company is of a lind referred to in ASIIC Class Order 98 ( 100 dated 10 ) ( uly 3998 and in accordance with that Class Order, all financial information presented in Australian dollars has been rounded to the nearest thousand, or in certain cOritical accounting estimates
Acquisitions of non - controlling interests are their care their capacity as owners and theneficiency gross - will is recognised as a nesult of ouch transactions. The non - controlling interact in the adjust mental health in the controlleto as the “ Group ” and individually as “ Group entities ”). A description of the nature of theThe preparation of financial statements requires to preventions. The preparations to preparations that informations that impaired to exercise the judgement in the process of applying the Group ' s accounting policies. The areas invol
1. BASIS OF PREPARATIONThe general purpose financial statements have been prepared in accordance with Australian Accounting Standards, other authoritative pronouncements of the Australian Accounting Standards Board and the Corjoretties Act 20032. SIGNIFICANT ACCOUNTING
The acquisition of an asset or group of assets that is not a business is accounted for by allocating the cost of the transaction to the net identifiable assets and liabilities acquired based on their fair values.purpose of preparing : the financial statements.The principal accounting policies adopted in the preparation of the financial statements are set out below. These policies have been consistently applied to all the years presented.
( II ) SubsidiariesThe financial statements comply with International Financial Reporting StandardsSubsidiaries are entities controlled by the first - infantements of subsidiaries are included in the consolidated financial state - ments from the date that control commences until the date that control ceases.
Standards Board ( IASB ).TTTTCTCTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTHistorical cost convention
( i ) Business combinationsThe financial statements have been prepared under the historical cost : convention, as modified by the revaluation of available - for - sale financial assets and financial instruments ( including denviative instruments ) at fair value tBusiness combinations are accounted for using the acquisition method as at the acquisition to activities and the acquisition to activities. The activities and their transferred to the Group. Control is the prewer to govern the financin
The accounting policies of subsidiaries have been changed when necessary to align them with the policies adopted by the Group. Losses applicable to the non - controlling interests in a subsidiary are allocated to the non - controlling intFunctional and presentation currencycurrently are exercisable.
The financial statements of the Group entities are measured using the currency of the primary economic environment in which the entity operates (“ the functional currency ”). The consolidated financial statements are presentedThe consideration transferred for the acquisition of a subsidiary comprises the fair values of the assets transferred, the liabilities incurred and the equity interests issued by the Group. The consideration transferred does not inclIntra group balances and transactions, and any unrealised gains anising from intra - group trans - actions, are eliminated in preparing the consclidated financial statements. Unrealised losses are also eliminated unless the transact
", + "page_start": 69, + "page_end": 69, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Cash provided by operating activities decreased in 2014 compared with 2013, which was primarily due to higher state tax payments made in \n2014 compared with 2013, as well as changes in working capital in 2014. \n\nCash provided by operating activities increased in 2013 compared with 2012, resulting from less state tax payments made in 2013 due to \nadditional payments made in 2012 as a result of the 53rd week, along with increased property incentives received from developers and \nchanges in working capital. \n\n**Investing Activities**\nNet cash used in investing activities was $889 in 2014, $822 in 2013 and $369 in 2012. Our investing cash flows primarily consist of capital \nexpenditures, changes in restricted cash accumulated for debt maturities and changes in credit card receivables associated with cardholder \npurchases outside of Nordstrom using our Nordstrom Visa credit cards. \n\nCapital Expenditures \nOur capital expenditures over the last three years totaled $2,177, with $861 in 2014, $803 in 2013 and $513 in 2012. Capital expenditures \nincreased in 2014 compared with 2013 primarily due to ongoing store expansion and increased technology investments. ", + "page_start": 38, + "page_end": 38, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Independent auditor’s report to the members \nof Kingsgate Consolidated Limited \n\nReport on the financial report \n\nWe have audited the accompanying financial report of Kingsgate Consolidated Limited (the company), \nwhich comprises the statement of financial position as at 30 June 2013, the statement of comprehen- \nsive income, statement of changes in equity and statement of cash flows for the year ended on that \ndate, a summary of significant accounting policies, other explanatory notes and the directors’ declara- \ntion for Kingsgate Group (the consolidated entity). The consolidated entity comprises the company \nand the entities it controlled at year’s end or from time to time during the financial year. \n\nDirectors’ responsibility for the financial report \nThe directors of the company are responsible for the preparation of the financial report that gives a \ntrue and fair view in accordance with Australian Accounting Standards and the*Corporations Act 2001*\nand for such internal control as the directors determine is necessary to enable the preparation of the \nfinancial report that is free from material misstatement, whether due to fraud or error. In Note 1, the \ndirectors also state, in accordance with Accounting Standard AASB 101 Presentation of Financial \nStatements, that the financial statements comply with International Financial Reporting Standards. ", + "page_start": 112, + "page_end": 112, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Your Directors present their report on the Group consisting of Kingsgate Consolidated Limited and the entities it controlled at the end of, \nor during, the year ended 30 June 2013. \n\nDirectors \n\nReview of operations \nand results \n\nThe following persons were Directors of \nKingsgate Consolidated Limited during the \nwhole of the financial year and up to the date of \nthis report. \n\nOperational performance \nKingsgate is a gold mining, development and \nexploration company based in Sydney, Australia. \nKingsgate owns and operates two gold mines, \nthe world class Chatree Mine in Thailand and the \nunderground Challenger Mine in South Australia. \nIn addition, the Company has two advanced \ndevelopment projects, the Nueva Esperanza \nSilver / Gold Project, in the highly prospective \nMaricunga Gold / Silver Belt in Chile, and the \nBowdens Silver Project in New South Wales, \nAustralia. From this operating and development \nplatform, Kingsgate aims to build value for all \nshareholders. \n\n〉〉 Ross Smyth-Kirk Chairman \n〉〉 Peter Alexander Non-Executive Director \n〉〉 Craig Carracher Non-Executive Director \n〉〉 Peter McAleer Non-Executive Director \n〉〉 Gavin Thomas Executive Director \n\nThe principal activities of Kingsgate \nConsolidated Limited are mining and mineral \nexploration in Australia, South East Asia and \nSouth America. \n\nGroup gold production was 199,897 ounces, a \ndecrease of 4% on the previous corresponding \nyear. The contribution from Chatree was \n133,681 ounces with 66,216 ounces from \nChallenger. \nDividends \n\nDividends paid to members during the financial \nyear were as follows: ", + "page_start": 42, + "page_end": 42, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Net Cash Flows \n\nThe following table is included to aid in review of Applied’s \n\nstatements of consolidated cash flows; all amounts are in \n\nthousands. \n\nYear Ended June 30, \n\nNet Cash Provided by (Used in): **2012** 2011 2010 \n\nOperating Activities $ **90,422**$ 76,842 $ 184,324 \n\nInvesting Activities **(39,434 )** (47,887 ) (6,784 ) \n\nFinancing Activities **(60,816 )** (116,523 ) (30,514 ) \n\nExchange Rate Effect **(2,822 )** 2,883 1,109 \n(Decrease) Increase in Cash \n**(12,650 )**$ (84,685 ) $ 148,135 $ and Cash Equivalents ", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "The Group also has a three year $25,000,000 Convertible Revolving Credit Facility available. At the date of this report the facility is undrawn. Under the \nterms of this facility, Kingsgate has the option of repaying any funds drawn down under the facility through either cash or by issuing ordinary shares. It is \nintended that this facility will be utilised during the 2014 financial year for corporate and working capital purposes. It is the current intention of the Company \nto repay any cash drawdown under the facility by issuance of fully paid ordinary shares which would rank parri pasu with all existing ordinary shares, although \nthis position will be reviewed at the appropriate time. The number of shares has not yet been determined and they will be issued at a 2.5% discount to VWAP \nover a period by reference to the draw down date. Shareholder approval is not required. \n\nAs indicated in Note 16, Kingsgate’s Thai operating subsidiary, Akara, established a six year amortising multi-currency loan facility equivalent to \nUS$125,000,000 (fully drawn as at year end) and an additional Thai Baht denominated working capital facility equivalent to US$15,000,000 (undrawn as at \nyear end) during the period. The proceeds from these borrowings were used to fully repay the outstanding balance on the US$100,000,000 Baht denomi- \nnated syndicated loan facility in existence at the beginning of the period as well as to repay part of the corporate loan facility noted above. ", + "page_start": 103, + "page_end": 103, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "Pre-tax cash flow was up 1% this year compared to last year due to \nhigher adjusted operating profit, partially offset by higher additions to \nproperty, plant and equipment and higher interest on our long-term \ndebt. After-tax free cash flow was 6 percent lower than last year \nbecause of higher cash income taxes. *Dividends*\nIn 2013, we declared and paid dividends on each of our outstanding \nClass A Voting and Class B Non-Voting shares. We paid $876 million in \ncash dividends, an increase of $73 million from 2012. See “Dividend \nand Share Information”. \n\n*Shelf Prospectuses*\nOur \ntwo shelf prospectuses expired in January 2014. One shelf \nprospectus qualified the public offering of our debt securities in each of \nthe provinces of Canada (Canadian Shelf) and the other \nshelf \nprospectus (together with a corresponding registration statement filed \nwith the US Securities and Exchange Commission) qualified the public \noffering of our debt securities in the United States and Ontario (US \nShelf). We issued an aggregate of US$2.5 billion of debt securities \nunder the US Shelf during 2013 and, in 2012, we issued an aggregate \n\n**PRE-TAX FREE CASH FLOW**\n(IN MILLIONS OF DOLLARS) \n\n**2013** **$2,044**\n\n2012 $2,029 \n\n2011 $1,973 ", + "page_start": 63, + "page_end": 63, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "**CONSOLIDATED STATEMENT OF CASH FLOWS**\n\n\n \n \n \n \n [html]\n
For the year ended 31 DecemberNote2014 US $’ 0002013 US $‘ 000
CASH FLOWS FROM OPERATING ACTIVITIES
Receipts from sales170.44284.703
Payments to suppliers and employees( 29.967 )( 21.765 )
Interest received201126
Derivative proceeds, net( 3 )253
Income taxes paid, net.( 12.586 )( 671 )
NET CASH PROVIDED BY OPERATING ACTIVITIES30128.08762.646
CASH FLOWS FROM INVESTING ACTIVITIES
Payments for development expenditure( 361.950 )( 154.700 )
Payments for exploration expenditure( 39.616 )( 20.006 )
Payments for acquisition of oil and gas properties( 35.606 )( 141.963 )
Sale of non - current assets115.28437.848
Transaction costs related to sale of non - current assets( 278 )( 161 )
Cash acquired from merger-114.690
Cash ( paid ) received from escrow and deposit accounts, net( 102 )837
Payments for plant and equipment( 967 )( 900 )
NET CASH USED IN INVESTING ACTIVITIES_ ( 323.235 )__ ( 164.355 )
CASH FLOWS FROM FINANCING ACTIVITIES
Proceeds from the issuance of shares72.43848.211
Payments for costs of capital raisings( 3.778 )( 2.654 )
Payments for acquisition related costs-( 533 )
Borrowing costs paid( 1.065 )( 569 )
Proceeds from borrowings165.00015.000
Repayments from borrowings___ ( 65.000 )___ ( 15.000 )
NET CASH PROVIDED BY FINANCING ACTIVITIES__167.595___44.455
Net decrease in cash held( 27.553 )( 57.254 )
Cash at beginning of period96.871154.110
Effect of exchange rates on cash( 101 )________________________________________________________________________________________________________________________________________________________________________________________________________
CASH AT END OF PERIOD11. 69.217.____96.871
", + "page_start": 59, + "page_end": 59, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Cash Flows from Operating Activities \n\nNet cash provided by operating activities increased by $1.22 billion to $10.11 billion during the nine months ended \n\nSeptember 30, 2024 from $8.89 billion during the nine months ended September 30, 2023. This increase was primarily due to \nfavorable changes in net operating assets and liabilities of $1.78 billion, partially offset by a decrease in net income excluding \nnon-cash expenses, gains and losses of $558 million. \n\nCash Flows from Investing Activities \n\nNet cash flows from investing activities and their variability across each period related primarily to capital expenditures, \n\nwhich were $8.56 billion and $6.59 billion for the nine months ended September 30, 2024 and 2023, respectively, mainly for \nAI-related capital expenditures, global factory expansion, machinery and equipment as we expand and enhance our product \nroadmap. We also purchased $2.62 billion and $4.12 billion of short-term investments, net of proceeds from maturities and \nsales, for the nine months ended September 30, 2024 and 2023, respectively. \n\nCash Flows from Financing Activities \n\nNet cash flows from financing activities increased by $1.17 billion to $2.87 billion during the nine months ended \nSeptember 30, 2024 from $1.70 billion during the nine months ended September 30, 2023. The increase was primarily due to a \n$1.83 billion increase in proceeds from issuances of debt, partially offset by a $896 million increase in repayments of debt. See \nNote 7, Debt, to the consolidated financial statements included elsewhere in this Quarterly Report on Form 10-Q for further \ndetails regarding our debt obligations. Additionally, there was an increase of $240 million in proceeds from exercises of stock \noptions and other stock issuances compared to the prior period. ", + "page_start": 44, + "page_end": 44, + "source_file": "tesla_form_10q.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20210538_en.pdf", + "query": "To which countries extend the marriage regulations ?", + "target_page": 1, + "target_passage": "These Regulations extend to England and Wales. ", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "(**a**) 1949 c. 76 (12 & 13 Geo 6). Section 74 was amended by Schedule 2 to the Registration Service Act 1953 (c. 37) and by \nparagraph 5(1)(d) of Schedule 2 to the Transfer of Functions (Registration) Order 2008 (S.I. 2008/678) and subsequently \nrenumbered as section 74(1) by article 12 of the Registration of Marriages etc. (Electronic Communications and Electronic \nStorage) Order 2009 (S.I. 2009/2821). Section 74(1) was amended by paragraph 19 of Schedule 15 to the Immigration Act \n2016 (c. 19) and paragraph 43 of Schedule 1 to the Registration of Marriages Regulations 2021 (S.I. 2021/411), which also \ninserted subsection (1A). \n(**b**) See section 68(2) of the Marriage Act 1949. The certification function of the Admiralty under that section was transferred to \nthe Secretary of State by the Defence (Transfer of Functions) Act 1964 (c. 15). \n(**c**) Section 78(2) of the Marriage Act 1949 provides for references to the Church of England to be construed as including ", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations provide for records of marriages to be kept in churches and chapels of the \nChurch of England and the Church in Wales, other than chapels to which Part 5 of the Marriage \nAct 1949 applies (naval, military and air force chapels). \n\nRegulation 2 requires parochial church councils to provide books known as “registers of marriage \nservices” to churches and chapels in their parish in which banns of matrimony may be published, \nfor the purposes of keeping the records required by regulation 3. Regulation 2 also imposes \nrequirements relating to the durability and pre-printed content of these registers, and provides that \nthey belong to the parochial church council. \n\nRegulation 3 requires specified information to be recorded in a register of marriage services when \na marriage has been solemnized on or after 4th May 2021 according to the rites of the Church of \nEngland or Church in Wales in a church or chapel in which banns of matrimony may be \npublished. The record must be made and signed by the member of the clergy by whom the \nmarriage was solemnized. ", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "*Made* *-* *-* *-* *-* *29th April 2021*\n\n*Coming into force -* *-* *4th May 2021*\n\nThe Registrar General makes these Regulations with the approval of the Secretary of State in \nexercise of the powers conferred by section 74(1)(c)(v), (1A)(a) and (3) of the Marriage Act \n1949(**a**). \n\n**Citation, commencement, extent and interpretation**\n\n**1.**—(1) These Regulations may be cited as the Marriage (Keeping of Records in Churches and \n\nChapels) Regulations 2021. \n\n(2) These Regulations come into force on 4th May 2021. \n(3) These Regulations extend to England and Wales. \n(4) In these Regulations, “chapel” does not include a chapel to which Part 5 of the Marriage Act \n1949 (marriages in naval, military and air force chapels) applies(**b**). \n\n**Duty of parochial church councils to provide registers of marriage services**\n\n**2.**—(1) The parochial church council of a parish must provide books for the purpose of making \nrecords under regulation 3 to each church and chapel of the Church of England(**c**) in that parish in \nwhich banns of matrimony may be published. \n\n(2) Books provided under paragraph (1) are to be known as “registers of marriage services”. \n(3) A register of marriage services provided under paragraph (1) must meet the requirements of \nparagraphs (4) and (5). \n\n(4) The register must be made of durable material. \n(5) For the purposes of enabling a record to be made in the register under regulation 3 in respect \n\nof a marriage, the register must be printed in such a way that it— ", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "\n \n \n \n \n [html]SCHEDULESPortugal, including the Azores and MadeiraSaint Helena, Ascension and Tristan da CunhaSingaporeCategory 2 countries and territories\n
SCHEDULE 1Regulation 2 ( 1 )
Category 1 countries and territories
Australia
Brunei
Falkland Islands
Faroe Islands
Gibraltar
Iceland
Israel
New Zealand
South Georgia and the South Sandwich IslandsSCHEDULE 2
Regulation 2 ( 1 )
Any country or territory outside the common travel area not listed in Schedule 1 or Schedule 3.SCHEDULE 3
Regulation 2 ( 1 )
Category 3 countries and territories
Angola
Argentina
Bangladesh
Bolivia
Botswana
Brazil
Burundi
Cape Verde
", + "page_start": 31, + "page_end": 31, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**5.**The countries or territories referred to in paragraph 3(1) are— \n\nTurkey \n\n**6.**A controller who contravenes paragraph 2(1) or 3(1) commits an offence punishable on \n\nsummary conviction by a fine. ", + "page_start": 84, + "page_end": 84, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Unambiguously, the data show that all eastern and southern European countries are senders (exception \nMalta). The central European countries Germany, France, Belgium and Austria and the two Nordic \ncountries Sweden and Finland are the receivers. Some smaller countries like Denmark, Ireland and \nLuxembourg are exceptions, and the Netherlands has an equal amount of sent and received posted \nworkers. ", + "page_start": 113, + "page_end": 113, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "(**a**) S.I. 2013/2033. \n(**b**) S.I. 2004/1031, to which there are amendments not relevant to these Regulations. \n(**c**) S.I. 2002/618. ", + "page_start": 44, + "page_end": 44, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "(**a**) 1988 c. 52. There are amendments to section 192 but none is relevant. \n(**b**) OJ No. L 300, 14.11.2009, p. 72. \n(**c**) The latest edition of Annex 9, which is published by the International Civil Aviation Organization, is the 15th edition, \nwhich applied from 23rd February 2018 (ISBN 978-92-9258-301-9). ", + "page_start": 37, + "page_end": 37, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThe Regulations amend the International Tax Compliance Regulations 2015 (“the principal \nRegulations”) which give effect to agreements and arrangements reached between the United \nKingdom and other jurisdictions to improve international tax compliance. \n\nRegulation 2(2) extends the application of the principal Regulations to arrangements entered into \nby the United Kingdom for the exchange of financial account information with other jurisdictions \nup to 19th April 2020, the date before the Regulations are made. \n\nRegulation 2(5) omits various accounts from the category of excluded accounts. Regulation \n2(4)(b) amends the definitions of “new account” and “pre-existing account” in relation to those ", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200438_en.pdf" + }, + { + "text": "**Requirements about the keeping of registers of marriage services**\n\n**4.**—(1) The rector, vicar or curate in charge of a church or chapel to which a register of marriage \n\nservices has been provided under regulation 2(1) must— \n\n(a) ensure that the register is kept in that church or chapel, and \n(b) do everything that is reasonably practicable to ensure that the register is protected against \n\ntheft, loss or damage. \n\n(2) Where there is no rector, vicar or curate in charge of a church or chapel to which a register of \nmarriage services has been provided under regulation 2(1), the obligations under paragraph (1) in \nrespect of that register fall on the churchwardens of the parish in which the church or chapel is \nsituated. ", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20210538_en.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20210538_en.pdf", + "query": "What the parochial church council must provide to make marriage records ?", + "target_page": 1, + "target_passage": " The parochial church council of a parish must provide books for the purpose of making records under regulation 3 to each church and chapel of the Church of England(c) in that parish in which banns of matrimony may be published.", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations provide for records of marriages to be kept in churches and chapels of the \nChurch of England and the Church in Wales, other than chapels to which Part 5 of the Marriage \nAct 1949 applies (naval, military and air force chapels). \n\nRegulation 2 requires parochial church councils to provide books known as “registers of marriage \nservices” to churches and chapels in their parish in which banns of matrimony may be published, \nfor the purposes of keeping the records required by regulation 3. Regulation 2 also imposes \nrequirements relating to the durability and pre-printed content of these registers, and provides that \nthey belong to the parochial church council. \n\nRegulation 3 requires specified information to be recorded in a register of marriage services when \na marriage has been solemnized on or after 4th May 2021 according to the rites of the Church of \nEngland or Church in Wales in a church or chapel in which banns of matrimony may be \npublished. The record must be made and signed by the member of the clergy by whom the \nmarriage was solemnized. ", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "*Made* *-* *-* *-* *-* *29th April 2021*\n\n*Coming into force -* *-* *4th May 2021*\n\nThe Registrar General makes these Regulations with the approval of the Secretary of State in \nexercise of the powers conferred by section 74(1)(c)(v), (1A)(a) and (3) of the Marriage Act \n1949(**a**). \n\n**Citation, commencement, extent and interpretation**\n\n**1.**—(1) These Regulations may be cited as the Marriage (Keeping of Records in Churches and \n\nChapels) Regulations 2021. \n\n(2) These Regulations come into force on 4th May 2021. \n(3) These Regulations extend to England and Wales. \n(4) In these Regulations, “chapel” does not include a chapel to which Part 5 of the Marriage Act \n1949 (marriages in naval, military and air force chapels) applies(**b**). \n\n**Duty of parochial church councils to provide registers of marriage services**\n\n**2.**—(1) The parochial church council of a parish must provide books for the purpose of making \nrecords under regulation 3 to each church and chapel of the Church of England(**c**) in that parish in \nwhich banns of matrimony may be published. \n\n(2) Books provided under paragraph (1) are to be known as “registers of marriage services”. \n(3) A register of marriage services provided under paragraph (1) must meet the requirements of \nparagraphs (4) and (5). \n\n(4) The register must be made of durable material. \n(5) For the purposes of enabling a record to be made in the register under regulation 3 in respect \n\nof a marriage, the register must be printed in such a way that it— ", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "(a) indicates the descriptions of information required by each of sub-paragraphs (a) to (h) of \nregulation 3(2) in relation to the marriage, and \n\n(b) provides corresponding spaces for recording information required by each of those sub- \n\nparagraphs in relation to the marriage. \n\n(6) A register of marriage services provided under paragraph (1) by a parochial church council \nbelongs to that parochial church council. ", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "**Duty to record information about marriages solemnized according to the rites of the Church**\n**of England or Church in Wales**\n\n**3.**—(1) Paragraphs (2), (3) and (4) apply where a marriage has been solemnized according to the \nrites of the Church of England in a church or chapel in which banns of matrimony may be \npublished. \n\n(2) As soon as practicable after the marriage has been solemnized, the clergyman by whom the \nmarriage was solemnized must make a record of the following information in relation to that \nmarriage in a register of marriage services provided to the church or chapel under regulation \n2(1)— \n\n(a) the date and place of the marriage; \n(b) the name and surname of each party; \n(c) the date of birth of each party; \n(d) the occupation (if any) of each party; \n(e) the address of each party at the time of the marriage; \n(f) \n\nthe names and surnames of each party’s parents, so far as those names and surnames are \nknown to the clergyman who solemnized the marriage; \n\n(g) the name and surname of each of the witnesses in whose presence the marriage was \nsolemnized; \n\n(h) the name and surname of the clergyman by whom the marriage was solemnized. \n\n(3) The clergyman must record the information required by paragraph (2) in English, and may \nalso record information required by that paragraph in Welsh where the church or chapel is situated \nin Wales. \n\n(4) After making a record under paragraph (2) the clergyman must sign it. \n(5) This regulation does not apply in relation to a marriage solemnized before 4th May 2021. ", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "**Requirements about the keeping of registers of marriage services**\n\n**4.**—(1) The rector, vicar or curate in charge of a church or chapel to which a register of marriage \n\nservices has been provided under regulation 2(1) must— \n\n(a) ensure that the register is kept in that church or chapel, and \n(b) do everything that is reasonably practicable to ensure that the register is protected against \n\ntheft, loss or damage. \n\n(2) Where there is no rector, vicar or curate in charge of a church or chapel to which a register of \nmarriage services has been provided under regulation 2(1), the obligations under paragraph (1) in \nrespect of that register fall on the churchwardens of the parish in which the church or chapel is \nsituated. ", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "(**a**) 1949 c. 76 (12 & 13 Geo 6). Section 74 was amended by Schedule 2 to the Registration Service Act 1953 (c. 37) and by \nparagraph 5(1)(d) of Schedule 2 to the Transfer of Functions (Registration) Order 2008 (S.I. 2008/678) and subsequently \nrenumbered as section 74(1) by article 12 of the Registration of Marriages etc. (Electronic Communications and Electronic \nStorage) Order 2009 (S.I. 2009/2821). Section 74(1) was amended by paragraph 19 of Schedule 15 to the Immigration Act \n2016 (c. 19) and paragraph 43 of Schedule 1 to the Registration of Marriages Regulations 2021 (S.I. 2021/411), which also \ninserted subsection (1A). \n(**b**) See section 68(2) of the Marriage Act 1949. The certification function of the Admiralty under that section was transferred to \nthe Secretary of State by the Defence (Transfer of Functions) Act 1964 (c. 15). \n(**c**) Section 78(2) of the Marriage Act 1949 provides for references to the Church of England to be construed as including ", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "\n\nrequirements for ", + "page_start": 209, + "page_end": 209, + "source_file": "00-80T-80.pdf" + }, + { + "text": "(1) The High Court shall have jurisdiction to hear and determine any question \n\nwhether- \n(a) \n\nany person has been validly elected as an Elected Member of the National \nAssembly or the seat of any such Member has become vacant; \nany person has been validly elected as Speaker of the Assembly or, having \nbeen so elected, has vacated the office of Speaker. \n\n(2) Any question whether any person has been validly elected as a Specially \n\nElected Member of the National Assembly or whether the seat of any such Member has \nbecome vacant shall be determined by the Speaker. \n\n(3) Parliament may make provision with respect to- \n\nthe persons who may apply to the High Court for the determination of any \nquestion under this section; \nthe circumstances and manner in which the conditions upon which any such \napplication may be made; and \nthe powers, practice and procedure of the High Court in relation to any such \napplication. \n**70. Clerk of the Assembly**\n\n(a) \n\n(b) \n\n(c) \n\n(1) There shall be a Clerk of the National Assembly and an Assistant Clerk of the \n\nNational Assembly and their offices shall be offices in the public service. \n\n(2) There shall be such other offices in the department of the Clerk of the \nAssembly as may be prescribed by resolution of the National Assembly and such offices \nshall be offices in the public service. ", + "page_start": 33, + "page_end": 33, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
14.1. 1 What documents are needed318
14.1. 2 Who receives the documents318
14.1. 3 When the documents are retrieved and delivered318
14.1. 4 Where are they delivered319
14.1. 5 Cross - platform access319
14.2 Defining the objects with the Administrator Client319
14.2. 1 Adding a recipient320
14.2. 2 Adding a recipient list321
14.2. 3 Adding a report ID322
14.2. 4 Adding a distribution323
14.2. 5 Adding a report bundle325
14.3 Defining the objects by using batch administration327
14.3. 1 Recipient327
14.3. 2 Report ID328
14.3. 3.3 Distribution and report bundle328
14.4 Customizable user exits329
14.1 arsodfxa : Spool file dataset allocation attributes exit329
14.4. 2 arsodfxb : Banner, header, and trailer exit329
14.4. 3 arsodfxm : Bundle manifest exit330
14.4 ODFProcessDist, java : Processed distribution exit330
14.5 Status and monitor tool331
Chapter 15. Full text search335
15.1 Introduction to full text search in Content Manager OnDemand336
15.2 Full text search architecture in Content Manager OnDemand336
15.2. 1 Full Text Search Server337
15.2. 2 Index structure337
15.2. 3 Indexing document through FTS Exporter338
15.2. 4 Searching338
15.3 Planning and installing FTS338
15.3. 1 Component overview339
15.3. 2 Installing the FTS Server339
15.3. 3 Operating system resources340
15.3. 4 Workload340
15.3. 5 Memory heap size.340
15.3. 6 Index consideratio341
15.4 Configuring and operating full text search.342
15.4. 1 Base configuration in Content Manager OnDemand342
15.4. 2 Configuration of the Full Text Search Exporter344
15.5 Running the full text indexing process346
15.5. 1 Automatically indexing new data during the load346
15.5. 2 Indexing existing data through the arsdoc command346
15.5. 3 Indexing existing data through ODWEK347
15.5. 4 Running the FTS Exporter347
15.6 Using full text search in Content Manager OnDemand clients347
15.6. 1 Syntax348
15.6. 2 Boolean searches348
15.6. 3 Wildcard searches and optional terms348
15.6. 4 Fuzzy and proximity searches.349
15.6. 5 Weighted searches ( boosting terms )349
15.7 Troubleshooting tips349
15.7. 1 Content Manager OnDemand server log349
15.7. 2 Full Text Search Server log.350
", + "page_start": 9, + "page_end": 9, + "source_file": "sg246915.pdf" + }, + { + "text": "One of Louis's more infamous decrees was the*Grande Ordonnance sur les Colonies*of \n1685, the*Code Noir*(black code). Although it sanctioned slavery, it attempted to humanise \nthe practice by prohibiting the separation of families. Additionally, in the colonies, only \nRoman Catholics could own slaves, and these had to be baptised. \n\nLouis ruled through a number of councils: \n\nConseil d'en haut (\"High Council\", concerning the most important matters of \nstate)—composed of the king, the crown prince, the controller-general of \nfinances, and the secretaries of state in charge of various departments. The \nmembers of that council were called ministers of state. \nConseil des dépêches (\"Council of Messages\", concerning notices and administrative reports from the provinces). \nConseil de Conscience (\"Council of Conscience\", concerning religious affairs and episcopal appointments). \nConseil royal des finances (\"Royal Council of Finances\") headed by the \"chef du conseil des finances\" (an \nhonorary post in most cases)—this was one of the few posts in the council available to the high aristocracy.[38] \n\n**Early wars in the Low Countries**\n\n**Spain**\n\nThe death of Louis's maternal uncle King Philip IV of Spain in 1665 precipitated the War of Devolution. In 1660, Louis had \nmarried Philip IV's eldest daughter, Maria Theresa, as one of the provisions of the 1659 Treaty of the Pyrenees.[39] The marriage \ntreaty specified that Maria Theresa was to renounce all claims to Spanish territory for herself and all her descendants.[39] Mazarin ", + "page_start": 5, + "page_end": 5, + "source_file": "wikipedia5.pdf" + } + ] + }, + { + "references": { + "source_file": "legal4_opengouvernementlicense.pdf", + "query": "What is the prison population grew in average by year between 1993 and 2008 ?", + "target_page": 8, + "target_passage": "The prison population grew rapidly between 1993 to 2008, at an average of 4% a year.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**2. Recent trends in the population**\n\nThe ‘Story of the Prison Population 1993 to 2012’ is an in-depth look at what \nhappened to the prison population between 1993 and 2012 and the major \nfactors contributing to the changes.4 \n\nThe prison population grew rapidly between 1993 to 2008, at an average of \n4% a year. This rapid rise was driven by: \n\n \n\nincreased numbers of people sentenced to immediate custody from \n1993 to 2002; \n\n \n\nincreases in the average custodial sentence length and increased use \nof indeterminate sentences; and \n\n an increase in numbers recalled to prison following breaches of the \nconditions of licence and these offenders spending longer in prison \nonce recalled. ", + "page_start": 7, + "page_end": 7, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**4. Results**\n\nThe Central Scenario estimates that the prison population will rise to 87,700 \nby the end of June 2015 and to 90,200 by the end of June 2020. \n\nChart 2 presents Prison population projections from November 2014 to \nDecember 2020. \n\n**Chart 2: Projected monthly prison population (all scenarios)**", + "page_start": 12, + "page_end": 12, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "The rise in the prison population slowed considerably from the summer of \n2008, in part due to the introduction of the Criminal Justice and Immigration \nAct (CJIA) 20085 which changed sentencing and offender management in \nways which helped to reduce growth in the prison population. \n\nThis flatter trend continued until the public disorder seen in UK cities from 6 to \n9 August 2011 which had an immediate but temporary impact on the prison \npopulation. \n\nDuring 2012 and into 2013, the prison population began to fall due to a falling \nremand population and a continued decline in the number of under 18s in \ncustody. The falling remand population during 2012 reflected falling volumes \ngoing through the courts plus the introduction, in December 2012, of \nmeasures restricting the use of remand for all offenders who would be unlikely \nto receive a custodial sentence.6 \n\nFrom the end of August 2013 to the end of October 2013, the remand \npopulation rose sharply, driving an overall increase in the prison population. \nThis was being driven by an increase in demand in the Crown Courts, \nespecially among more serious tri-able either way cases. The total population \nhas continued to rise since the beginning of 2014 and reached 85,9257 on the ", + "page_start": 7, + "page_end": 7, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Total Prison Population**\n**Prison population projections from November 2014 to December 2020**\n105,000 \n\n100,000 \n\n95,000 \n\n**n**\n**o**\n**i**\n**t**\n**a**\n**u**\n**p**\n**o**\n**P**\n**n**\n**o**\n**s**\n\n90,000 \n**l**\n\n85,000 \n\n**i**\n**r**\n**P**\n80,000 \n\n75,000 \n\n70,000 \n\nN \no \nv \n- \n1 \n4 M \na \nr \n- \n1 \n5 \nJ \nu \nl \n- \n1 \n5 \nN \no \nv \n- \n1 \n5 M \na \nr \n- \n1 \n6 \nJ \nu \nl \n- \n1 \n6 \nN \no \nv \n- \n1 \n6 M \na \nr \n- \n1 \n7 \nJ \nu \nl \n- \n1 \n7 \nN \no \nv \n- \n1 \n7 M \na \nr \n- \n1 \n8 \nJ \nu \nl \n- \n1 \n8 \nN \no \nv \n- \n1 \n8 M \na \nr \n- \n1 \n9 \nJ \nu \nl \n- \n1 \n9 \nN \no \nv \n- \n1 \n9 \n**Month End**", + "page_start": 3, + "page_end": 3, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Total Prison Population**\n**Prison population projections from November 2014 to December 2020**\n105,000 \n\n100,000 \n\n95,000 \n\n**n**\n**o**\n**i**\n**t**\n**a**\n**l**\n**u**\n**p**\n**o**\n**P**\n**n**\n**o**\n**s**\n**i**\n**r**\n**P**\n\n90,000 \n\n85,000 \n\n80,000 \n\n75,000 \n\n70,000 \n\nN \no \nv \n- \n1 \n4 M \na \nr \n- \n1 \n5 \nJ \nu \nl \n- \n1 \n5 \nN \no \nv \n- \n1 \n5 M \na \nr \n- \n1 \n6 \nJ \nu \nl \n- \n1 \n6 \nN \no \nv \n- \n1 \n6 M \na \nr \n- \n1 \n7 \nJ \nu \nl \n- \n1 \n7 \nN \no \nv \n- \n1 \n7 M \na \nr \n- \n1 \n8 \nJ \nu \nl \n- \n1 \n8 \nN \no \nv \n- \n1 \n8 M \na \nr \n- \n1 \n9 \nJ \nu \nl \n- \n1 \n9 \nN \no \nv \n- \n1 \n9 \n**Month End**", + "page_start": 12, + "page_end": 12, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "Further statistics and commentary on the changes seen in prison population \nover the last year, is presented in the Offender Management Statistics \nQuarterly publication. This is available online on GOV.UK at: \nwww.gov.uk/government/collections/offender-management-statistics-quarterly ", + "page_start": 8, + "page_end": 8, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Prison Population Projections 2014 – 2020**\n\n\n \n \n \n \n [html]Males 21 years and overTotal PopulationDeterminatesScenarioIndeterminatesRemand_Recall\n
Scenario 1CentralScenario 2Scenario 1CentralScenario 2
Jun - 1576.50077.10078.70047.40048.20049.800
Jun ‐ 1675.80078.30082.00046.80049.50053.300
Jun ‐ 1774.40078.50083.70045.90050.40055.700
Jun ‐ 1873.20078.90085.80045.20051.30058.200
Jun ‐ 1972.20079.30087.50044.60052.00060.300
Jun - 2071.10079.40088.70044.00052.60062.000
ScenarioScenario 1CentralScenario 2Scenario 1CentralScenario 2
Jun ‐ 1511.70011.70011.70010.80010.2009.600
Jun - 1611.20011.20011.20010.80010.2009.600
Jun ‐ 1710.50010.50010.50010.80010.2009.500
Jun ‐ 1810.10010.10010.10010.80010.2009.600
Jun ‐ 199.6009.6009.60010.90010.2009.600
Jun - 209.2009.2009.20010.80010.2009.600
Non CriminalScenarioScenario 1CentralScenario 2Scenario 1Central
Scenario 2Jun - 154.9005.2005.8001.7001.700
1.700Jun - 165.2005.5006.1001.7001.700
1.700Jun ‐ 175.3005.6006.1001.7001.700
1.700Jun ‐ 185.3005.6006.1001.7001.700
1.700Jun ‐ 195.3005.6006.1001.7001.700
1.700Jun - 205.3005.6006.1001.7001.700
", + "page_start": 19, + "page_end": 19, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Key points**\n\nThis bulletin presents projections of the prison population in England and \nWales from November 2014 to December 2020. The prison population \nprojections are based on assumptions about future custodial convictions and \nincorporate the anticipated impacts of agreed policy and procedural initiatives. \n\nThe “Central Scenario” estimates that the prison population will increase from \nthe current position 85,9251 to 87,700 by June 2015. By the end of June 2020 \nthe prison population is projected to be 90,200. This Central Scenario is our \nbest estimate based on the available information. The projected prison \npopulation under our Central Scenario is shown in Chart 1. \n\nThe prison population projections are produced using a model of flows of \noffenders into and out of prison which counts the resulting prison population \neach month. \n\n**Chart 1: Projected prison population (Central Scenario)**", + "page_start": 3, + "page_end": 3, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "Scenario 1 Central Scenario \n\nIllustrative Scenario 1 estimates that the prison population will rise to 87,100 \nby the end of June 2015 and then fall to 81,400 by the end of June 2020. \n\nIllustrative Scenario 2 estimates that the prison population will rise to 88,900 \nby the end of June 2015 and to 98,900 by the end of June 2020. \n\nThe projected trends reflect the cumulative impacts of the various sentencing, \nlegislative and procedural assumptions that are used to generate the \nprojections. The seasonal pattern reflects the dip in the prison population \nwhich is always seen around the Christmas period. \n\nIn the Central Scenario, the prison population is expected to rise to 90,200 by \nJune 2020. The projected population increase is largely due to the recent \ntrends in case mix where we have seen more serious cases come before the \ncourts. This results in offenders receiving longer custodial sentence lengths, \nwhich in turn places an upward pressure on the prison population. The growth \nin this scenario is largely driven by the rise in the determinate population \nwhich is projected to grow to 60,200 by June 2020. This is partially due to the ", + "page_start": 12, + "page_end": 12, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Prison Population Projections 2014 – 2020**\n\n\n \n \n \n \n [html]\n
Contents
Key points2
1.Central Scenario
42.
Recent trends in the population6
3.Modelling methodology and projection scenarios
84.
Results11
5.Previous Projections
136.
Caveats on prison population projections14
", + "page_start": 2, + "page_end": 2, + "source_file": "legal4_opengouvernementlicense.pdf" + } + ] + }, + { + "references": { + "source_file": "legal4_opengouvernementlicense.pdf", + "query": "Do you know the prison population estimation for the and of June 2020 ?", + "target_page": 13, + "target_passage": "The Central Scenario estimates that the prison population will rise to 87,700 by the end of June 2015 and to 90,200 by the end of June 2020. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**4. Results**\n\nThe Central Scenario estimates that the prison population will rise to 87,700 \nby the end of June 2015 and to 90,200 by the end of June 2020. \n\nChart 2 presents Prison population projections from November 2014 to \nDecember 2020. \n\n**Chart 2: Projected monthly prison population (all scenarios)**", + "page_start": 12, + "page_end": 12, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Total Prison Population**\n**Prison population projections from November 2014 to December 2020**\n105,000 \n\n100,000 \n\n95,000 \n\n**n**\n**o**\n**i**\n**t**\n**a**\n**u**\n**p**\n**o**\n**P**\n**n**\n**o**\n**s**\n\n90,000 \n**l**\n\n85,000 \n\n**i**\n**r**\n**P**\n80,000 \n\n75,000 \n\n70,000 \n\nN \no \nv \n- \n1 \n4 M \na \nr \n- \n1 \n5 \nJ \nu \nl \n- \n1 \n5 \nN \no \nv \n- \n1 \n5 M \na \nr \n- \n1 \n6 \nJ \nu \nl \n- \n1 \n6 \nN \no \nv \n- \n1 \n6 M \na \nr \n- \n1 \n7 \nJ \nu \nl \n- \n1 \n7 \nN \no \nv \n- \n1 \n7 M \na \nr \n- \n1 \n8 \nJ \nu \nl \n- \n1 \n8 \nN \no \nv \n- \n1 \n8 M \na \nr \n- \n1 \n9 \nJ \nu \nl \n- \n1 \n9 \nN \no \nv \n- \n1 \n9 \n**Month End**", + "page_start": 3, + "page_end": 3, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Total Prison Population**\n**Prison population projections from November 2014 to December 2020**\n105,000 \n\n100,000 \n\n95,000 \n\n**n**\n**o**\n**i**\n**t**\n**a**\n**l**\n**u**\n**p**\n**o**\n**P**\n**n**\n**o**\n**s**\n**i**\n**r**\n**P**\n\n90,000 \n\n85,000 \n\n80,000 \n\n75,000 \n\n70,000 \n\nN \no \nv \n- \n1 \n4 M \na \nr \n- \n1 \n5 \nJ \nu \nl \n- \n1 \n5 \nN \no \nv \n- \n1 \n5 M \na \nr \n- \n1 \n6 \nJ \nu \nl \n- \n1 \n6 \nN \no \nv \n- \n1 \n6 M \na \nr \n- \n1 \n7 \nJ \nu \nl \n- \n1 \n7 \nN \no \nv \n- \n1 \n7 M \na \nr \n- \n1 \n8 \nJ \nu \nl \n- \n1 \n8 \nN \no \nv \n- \n1 \n8 M \na \nr \n- \n1 \n9 \nJ \nu \nl \n- \n1 \n9 \nN \no \nv \n- \n1 \n9 \n**Month End**", + "page_start": 12, + "page_end": 12, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "\n\n**Prison Population Projections**\n**2014 – 2020**\n**England and Wales**\n\nMinistry of Justice \nStatistics Bulletin ", + "page_start": 0, + "page_end": 0, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Key points**\n\nThis bulletin presents projections of the prison population in England and \nWales from November 2014 to December 2020. The prison population \nprojections are based on assumptions about future custodial convictions and \nincorporate the anticipated impacts of agreed policy and procedural initiatives. \n\nThe “Central Scenario” estimates that the prison population will increase from \nthe current position 85,9251 to 87,700 by June 2015. By the end of June 2020 \nthe prison population is projected to be 90,200. This Central Scenario is our \nbest estimate based on the available information. The projected prison \npopulation under our Central Scenario is shown in Chart 1. \n\nThe prison population projections are produced using a model of flows of \noffenders into and out of prison which counts the resulting prison population \neach month. \n\n**Chart 1: Projected prison population (Central Scenario)**", + "page_start": 3, + "page_end": 3, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Prison Population Projections 2014 – 2020**\n\n\n \n \n \n \n [html]\n
Eduction of the Extended Determinate Santence EDSS ) as part of the Legal Sentencing and Purishment of Offendersa1 ( ASPC ) Act which mannocate in December 2012. Some of the growth in the determinate ultation has been offset by a decline intA contains tables for annual projected end of June populations, rape francial year populations and total monthly populations for eachnarge along with detailed breakdown of the projections for our sub - ulations.
TableTable
", + "page_start": 13, + "page_end": 13, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Table A12: Projected female 18 years and over prison population (end of June**\n**figures)**\n\nSentencing Scenarios \nCentral \n4,100 \n4,100 \n4,100 \n4,100 \n4,200 \n4,200 Scenario 1 \n4,100 \n3,900 \n3,800 \n3,600 \n3,600 \n3,500 Scenario 2 \n4,300 \n4,600 \n4,700 \n4,800 \n4,900 \n4,900 Jun-15 \nJun-16 \nJun-17 \nJun-18 \nJun-19 \nJun-20 ", + "page_start": 20, + "page_end": 20, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Prison Population Projections 2014 – 2020**\n\n\n \n \n \n \n [html]Males 21 years and overTotal PopulationDeterminatesScenarioIndeterminatesRemand_Recall\n
Scenario 1CentralScenario 2Scenario 1CentralScenario 2
Jun - 1576.50077.10078.70047.40048.20049.800
Jun ‐ 1675.80078.30082.00046.80049.50053.300
Jun ‐ 1774.40078.50083.70045.90050.40055.700
Jun ‐ 1873.20078.90085.80045.20051.30058.200
Jun ‐ 1972.20079.30087.50044.60052.00060.300
Jun - 2071.10079.40088.70044.00052.60062.000
ScenarioScenario 1CentralScenario 2Scenario 1CentralScenario 2
Jun ‐ 1511.70011.70011.70010.80010.2009.600
Jun - 1611.20011.20011.20010.80010.2009.600
Jun ‐ 1710.50010.50010.50010.80010.2009.500
Jun ‐ 1810.10010.10010.10010.80010.2009.600
Jun ‐ 199.6009.6009.60010.90010.2009.600
Jun - 209.2009.2009.20010.80010.2009.600
Non CriminalScenarioScenario 1CentralScenario 2Scenario 1Central
Scenario 2Jun - 154.9005.2005.8001.7001.700
1.700Jun - 165.2005.5006.1001.7001.700
1.700Jun ‐ 175.3005.6006.1001.7001.700
1.700Jun ‐ 185.3005.6006.1001.7001.700
1.700Jun ‐ 195.3005.6006.1001.7001.700
1.700Jun - 205.3005.6006.1001.7001.700
", + "page_start": 19, + "page_end": 19, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**Prison Population Projections 2014 – 2020**\n\n\n \n \n \n \n [html]\n
Contents
Key points2
1.Central Scenario
42.
Recent trends in the population6
3.Modelling methodology and projection scenarios
84.
Results11
5.Previous Projections
136.
Caveats on prison population projections14
", + "page_start": 2, + "page_end": 2, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "Scenario 1 Central Scenario \n\nIllustrative Scenario 1 estimates that the prison population will rise to 87,100 \nby the end of June 2015 and then fall to 81,400 by the end of June 2020. \n\nIllustrative Scenario 2 estimates that the prison population will rise to 88,900 \nby the end of June 2015 and to 98,900 by the end of June 2020. \n\nThe projected trends reflect the cumulative impacts of the various sentencing, \nlegislative and procedural assumptions that are used to generate the \nprojections. The seasonal pattern reflects the dip in the prison population \nwhich is always seen around the Christmas period. \n\nIn the Central Scenario, the prison population is expected to rise to 90,200 by \nJune 2020. The projected population increase is largely due to the recent \ntrends in case mix where we have seen more serious cases come before the \ncourts. This results in offenders receiving longer custodial sentence lengths, \nwhich in turn places an upward pressure on the prison population. The growth \nin this scenario is largely driven by the rise in the determinate population \nwhich is projected to grow to 60,200 by June 2020. This is partially due to the ", + "page_start": 12, + "page_end": 12, + "source_file": "legal4_opengouvernementlicense.pdf" + } + ] + }, + { + "references": { + "source_file": "legal4_opengouvernementlicense.pdf", + "query": "What is the phone number of the Ministry of Justice press office ?", + "target_page": 30, + "target_passage": "Press enquiries should be directed to the Ministry of Justice press office, telephone: 020 3334 3536 ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Contact Points for further information**\n\nCurrent and previous editions of this publication are available for download \nfrom www.justice.gov.uk/publications/statistics-and-data/index.htm \n\nPress enquiries should be directed to the Ministry of Justice press office, \ntelephone: 020 3334 3536 \n\nOther enquiries about these statistics should be directed to: \n\nJustice Statistics Analytical Services \nMinistry of Justice \n7th Floor \n102 Petty France \nLondon \nSW1H 9AJ \n\nGeneral enquiries about the statistical work of the Ministry of Justice can be e- \nmailed to: statistics.enquiries@justice.gsi.gov.uk \n\nGeneral information about the official statistics system of the UK is available \nfrom www.statistics.gov.uk ", + "page_start": 29, + "page_end": 29, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "VerDate Sep 11 2014 15:46 Aug 08, 2019 Jkt 089139 PO 00030 Frm 00002 Fmt 6580 Sfmt 6580 E:\\PUBLAW\\PUBL030.116 PUBL030 ", + "page_start": 1, + "page_end": 1, + "source_file": "PLAW-116publ30.pdf" + }, + { + "text": "VerDate Sep 11 2014 15:46 Aug 08, 2019 Jkt 089139 PO 00030 Frm 00001 Fmt 6580 Sfmt 6581 E:\\PUBLAW\\PUBL030.116 PUBL030 ", + "page_start": 0, + "page_end": 0, + "source_file": "PLAW-116publ30.pdf" + }, + { + "text": "**GETTING IN TOUCH WITH THE EU**\n\n**In person**\n\nAll over the European Union there are hundreds of Europe Direct centres. You can find the address of the centre nearest you online \n(european-union.europa.eu/contact-eu/meet-us_en). \n\nOn the phone or in writing \n\nEurope Direct is a service that answers your questions about the European Union. You can contact this service: \n\n• by freephone: 00 800 6 7 8 9 10 11 (certain operators may charge for these calls), \n\n• at the following standard number: +32 22999696, \n\n• via the following form: european-union.europa.eu/contact-eu/write-us_en. \n\n**FINDING INFORMATION ABOUT THE EU**\n\n**Online**\n\nInformation about the European Union in all the official languages of the EU is available on the Europa website \n(european-union.europa.eu). \n\n**EU publications**\n\nYou can view or order EU publications at op.europa.eu/en/publications. Multiple copies of free publications can be obtained by \ncontacting Europe Direct or your local documentation centre (european-union.europa.eu/contact-eu/meet-us_en). \n\n**EU law and related documents**\n\nFor access to legal information from the EU, including all EU law since 1951 in all the official language versions, go to EUR-Lex \n(eur-lex.europa.eu). ", + "page_start": 162, + "page_end": 162, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
© Crown copyright
Produced by the Ministry of Justice
\n\n29 ", + "page_start": 30, + "page_end": 30, + "source_file": "legal4_opengouvernementlicense.pdf" + }, + { + "text": "**FOR FURTHER INFORMATION,**\n**PLEASE CONTACT**\n\n**Investor Relations**\n**Nissan Motor Co., Ltd.**\nGlobal Communications, CSR and IR Division \n17-1, Ginza 6-chome, Chuo-ku \nTokyo 104-8023, Japan \nphone: +81(0)3-5565-2334 \nfax: +81(0)3-3546-2669 \ne-mail: nissan-ir@mail.nissan.co.jp ", + "page_start": 111, + "page_end": 111, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**Corporate Headquarters**\n**110 SE 6th Street, 28th Floor, Fort Lauderdale, Florida 33301**\n\n**Phone: (954) 769-2400 • Fax: (954) 769-2664 • www.republicservices.com**", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**Corporate Headquarters**\n\n**110 SE 6th Street, 28th Floor, Fort Lauderdale, Florida 33301**\n\n**Phone: (954) 769-2400 • Fax: (954) 769-2664 • www.republicservices.com**", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**Corporate Headquarters**\n\n**110 SE 6th Street, 28th Floor, Fort Lauderdale, Florida 33301**\n\n**Phone: (954) 769-2400 • Fax: (954) 769-2664 • www.republicservices.com**", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "Challenger Mine \nChallenger Gold Operations Pty Ltd \n\nC/- 14 Lum Street \nExport Park SA 5950 \nAustralia \nTel: \nFax: +61 8 8450 0100 \n+61 8 8234 3956 \n\nChile Office \nLaguna Resources Chile Ltda \n\nSan Pio X 2460 oficina 508 \nProvidencia, Santiago \nChile \nTel: +56 2 2231 7565 ", + "page_start": 116, + "page_end": 116, + "source_file": "ASX_KCN_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf", + "query": "What is SOLR ?", + "target_page": 4, + "target_passage": "Search engine used for portal content search and dataset search ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**3.7.1 SPARQL Search**\n\n", + "page_start": 53, + "page_end": 53, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "*Figure 3-9 Text Search*\n\nBy using Text Search, a user can further qualify a search without adding the processing that \nis associated with adding and maintaining additional index fields to the database. Text search \nis performed on the documents that match the criteria for the other query fields. For example, \nif the other query fields are date and account number, a text search is performed on the \ndocuments that match the specified date and account number. If the document contains the \ntext search string, it is returned as part of the hit list. Text search fields are not mapped to \ndatabase fields. ", + "page_start": 80, + "page_end": 80, + "source_file": "sg246915.pdf" + }, + { + "text": "9.2 SPARQL Queries \nSPARQL is a powerful language, and one could write a whole book about it. In fact, there are books \nwritten about it. The best one I have seen is the O’Reilly book Learning SPARQL by Bob DuCharme. \nThis is an excellent book that not only goes into SPARQL but into topics such as RDF/RDFS and how \ntriples are used to represent all information in OWL. I will only touch on those issues here, there is much \nmore to say about them and DuCharme’s book is a great place to learn more. If some of the following is a \nbit hard to understand don’t be discouraged. This is just an attempt to give a very high level introduction \nto something that requires significant study to really understand. \n\nEssentially SPARQL is to the Semantic Web and Knowledge Graphs as SQL is to relational databases. \nJust as SQL can do more than just query, it can also assert new information into a database, so SPARQL \ncan as well. The current SPARQL plugins for Protégé are somewhat limited and don’t support the \nstatements such as INSERT for entering new data so we will just cover the basics of using SPARQL as a \nquery language but keep in mind there is a lot more to it than what we briefly cover here. ", + "page_start": 67, + "page_end": 67, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "To understand what is going on you first need to understand that each SPARQL query consists of two \nparts. The first part at the beginning consists of several namespace prefixes. These statements consist of \nthe prefix used for a particular namespace as well as the IRI associated with this namespace. Recall that \nthese concepts were described in chapter 7. You may be wondering where all these prefixes came from \nsince you didn’t add them to your ontology. The answer is that every OWL ontology comes with a set of \nnamespaces and prefixes that are required to define the ontology. \n\nAlso, to understand SPARQL you need to “peak under the hood” of OWL. So far, we have been \ndiscussing concepts in purely logical and set theoretic terms, i.e., at the semantic level. However, like any \nlanguage or database there is a lower level that describes how the concepts are mapped to actual data. In a \nrelational database the fundamental construct to represent data is a table. In OWL the fundamental \nconstruct is a triple. OWL is actually built on top of RDFS which is a language built on top of RDF. RDF \n(Resource Description Framework) is a language to describe graphs (in the mathematical sense of the \nterm). I.e., to describe nodes and links. ", + "page_start": 68, + "page_end": 68, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "**Text Search**\nText Search (Figure 3-9) is used to search documents that contain a specific word or phrase \nbefore the document hit list is built. Only documents that contain the specified word or phrase \nare returned as part of the hit list. The search takes place on the server. \n\nFigure 3-9 shows the Text Search option in the Field Definition tab of the Add a Folder \nwindow. ", + "page_start": 80, + "page_end": 80, + "source_file": "sg246915.pdf" + }, + { + "text": "**3.7 SPARQL Manager**\n\nThe SPARQL Manager provides a graphical user interface (GUI) for sending user defined queries to \nthe Virtuoso SPARQL query engine. \n\nThe powerful SPARQL Protocol and RDF Query Language are primarily aimed at professionals for \nquerying metadata as Linked Data. A basic knowledge of the DCAT-AP specification is highly \nrecommended. \n\nIn the future, users of the SPARQL Manager will be able to save their queries for scheduled \nexecution. Additionally a notification will be send to the user when a result has changed. \n\nClicking the info icon in the upper right corner will display a step-by-step walkthrough of all \ncomponents with a short info about their function. \n\nThis is possible in both of modes of the SPARQL Manager, the search and the assistant mode, which \nwill be described in the following sections. ", + "page_start": 53, + "page_end": 53, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "4 \n\nGraphical Data Visualisation \nTool \n\nHelp Desk \n\nMetadata Quality Assurance \n(MQA) \n\nMonitoring tool for the metadata quality: \nThe Global Dashboard View \nThe Catalogue details view \nHow to run SPARQL Queries using: \n\n- SPARQL Search \n\nEuropean Data Portal Version 4.3 – User Manual ", + "page_start": 5, + "page_end": 5, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "**Application group**\nAn*application group*contains the storage management attributes of and index fields for the \ndata that you load into Content Manager OnDemand. When you load a report into Content \nManager OnDemand, you must identify the application group where Content Manager \nOnDemand loads the index data and stores the documents. \n\nAn application group is a collection of one or more Content Manager OnDemand applications \nwith common indexing and storage management attributes. You typically group several \nrelated reports in an application group so that users can access the information that is \ncontained in the reports with a single query. All of the applications in the application group \nmust be indexed on one or more common fields, for example, customer name, account \nnumber, or date. ", + "page_start": 31, + "page_end": 31, + "source_file": "sg246915.pdf" + }, + { + "text": "**NoSQL Workbench & Local DynamoDB**\n\nNoSQL Workbench is a cross-platform visual application that provides data modeling, data \n\nvisualization, and query development features to help you design, create, query, and manage \n\nDynamoDB tables. ", + "page_start": 82, + "page_end": 82, + "source_file": "serverless-core.pdf" + }, + { + "text": "9.21 Some SPARQL Pizza Queries \nTo start with go to the SPARQL Query tab. If it isn’t already there you can as always add it using \nWindow>Tabs>SPARQL Query. This tab consists of two views, the top which holds the query and the \nbottom which holds the results. There should be some text already there. It may look confusing, but we’ll \nexplain it. Just to start with hit the Execute button at the bottom of the tab. You should see a bunch of \nclasses and class expressions returned. ", + "page_start": 67, + "page_end": 67, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + } + ] + }, + { + "references": { + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf", + "query": "What is the function of the Graphical Data Visualisation Tool module ?", + "target_page": 6, + "target_passage": "How to visualize graphical data from a dataset resource ", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "**3.4 Graphical Data Visualisation Tool**\n\nThis section describes the features of the graphical visualisation tool for numeric data. The features \nare currently available for XLS (Excel) and CSV files, except for the selection of the sheet name which \nis applicable only for Excel files. \n\nMost GUI elements from the “Graph” tab (records selection, search box, filters and fields buttons) \nare also available on the “Grid” tab and work in the same way. ", + "page_start": 42, + "page_end": 42, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "**3.4.1 How to visualize graphical data from a dataset resource**\n\nAs a result of a dataset search, the system displays on the “Dataset” tab all distributions \n(resource/data files) that are part of the selected dataset. Each XLS or CSV distribution of the dataset \ncan be further explored by clicking on “Open Visualization” under the “Options” button – if available. ", + "page_start": 42, + "page_end": 42, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "**3.3 Visualization of Geo-Spatial Data (map.apps)**\n\nThe visualization of geo-spatial data within the European Data Portal provides previewing \nfunctionality for spatial open data. The aim is to allow the user to assess if a dataset meets specific \nrequirements in terms of spatial and thematic coverage. The functionality that is provided in the \nheader (links to disclaimers and language switching) is consistent in the entire portal. \n\n**3.3.1 How to visualize geo-spatial data from a dataset resource**\n\nAccessing the geo-spatial visualization is achieved via the Data Platform interface. A user searches for \nspecific data, enters the dataset view of reasonable results and displays the available distributions \n(see Section 3.2.5). If a dataset distribution is supported by the geo-spatial visualization, a globe \nbutton is displayed (see Figure 3). This is the entry point into the map viewer application. Supported \nformats are OGC Web Map Service (WMS) and GeoJSON. If the user visits the geo-spatial \nvisualization for the first time, an interactive user tutorial is provided to guide the use through \nspecific functions of the user interface, similar to this written user manual. ", + "page_start": 37, + "page_end": 37, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "4 \n\nGraphical Data Visualisation \nTool \n\nHelp Desk \n\nMetadata Quality Assurance \n(MQA) \n\nMonitoring tool for the metadata quality: \nThe Global Dashboard View \nThe Catalogue details view \nHow to run SPARQL Queries using: \n\n- SPARQL Search \n\nEuropean Data Portal Version 4.3 – User Manual ", + "page_start": 5, + "page_end": 5, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "**3 Main User Functions of the Portal**\n\nThis section describes all of the main user functions supported by the Portal Version 3.0. \n\nThe table 1-3 below lists the described functions by module. \n\n**Module Name** **Function**\n\n- How to browse through the Editorial Content \n\n(how to access Resources on Open Data: eLearning \nmodules, Training Companion, Reports about Open \nData) \n\n- How to view / search for “Latest News” \n- How to view / search for “Open Data Events” \n- How to subscribe to the EDP Newsletter \n- How to view “Tweets” on the EDP \n- How to switch to another User Language \n- How to search for EDP Site Content \n- How to search for Datasets by Data Category \n- How to search for Datasets by Keyword \nEntering the Datasets-View \n\n1 Portal HomePage \n\n2 \n\nHow to filter datasets by using “Faceted Search” \n\nHow to store personal queries \n\nHow to filter datasets by geographical area \n\nHow to download dataset distributions \n\nHow to view licensing information \n\nHow to switch to another user language \n\nHow to browse by data catalogues \n\n3 \n\nVisualization of Geo-Spatial \nData (map.apps) \n\nHow to visualize geo-spatial data from a dataset resource ", + "page_start": 5, + "page_end": 5, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "**4.1 Data Entry**\n\nThe data entry tab provides the function to**input data**into the system through the use of**grids**. To display the grid, a \nnode has to be selected from the**navigation tree**. (Figure 23) ", + "page_start": 16, + "page_end": 16, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "***Figure 49. Consistency screen – message “Loading data”***\n\n", + "page_start": 33, + "page_end": 33, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
AcronymDescription
APIApplication Programmer Interface
CKAN( replaced by the “ Data Platform ”)
CSVComma separated values
Data PlatformSingle page web app for managing and displaying datasets
DCAT - APDCAT Application Profile - Metadata specification based on the Data Catalogue vocabulary [ DCAT ]
DRUPALContent Management System
ECAS / EU - LoginEU user login page
EDPEuropean Data Portal
FMEFeature Manipulation Engine
GUIGraphical User Interface
HTTPHypertext Transfer Protocol
JSONJavaScript Object Notation ( a lightweight data - interchange format )
maps. appGeo - spatial data visualization application
MQAMetadata Quality Assistant
RDFResource Description Framework
SOLRSearch engine used for portal content search and dataset search
", + "page_start": 3, + "page_end": 3, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "***Figure 41. My Data Export screen***\n\n", + "page_start": 28, + "page_end": 28, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "In some cases the user might experience the display of an error message. The geo-spatial \nvisualization tries to support all flavors of external services but cannot guarantee to work with \nbroken services. In these situations an error message dialog is presented and the user can decide if a \nsupport ticket shall be opened (see Figure 8). ", + "page_start": 40, + "page_end": 40, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + } + ] + }, + { + "references": { + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf", + "query": "How to view “Tweets” on the EDP ?", + "target_page": 20, + "target_passage": "The Home Page displays the latest tweets on the European Data Portal in the “Tweets” panel on the right hand side. ‐ ‐ Click on any of the tweets to display the complete tweet on twitter. Scroll vertically to see previous tweets. ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**3.1.5 How to view “Tweets” on the EDP**\n\nThe Home Page displays the latest tweets on the European Data Portal in the “Tweets” panel on the \nright hand side. \n\n‐**Click on any of the tweets to display the complete tweet on twitter.**\n\n‐ **Scroll vertically to see previous tweets.**", + "page_start": 19, + "page_end": 19, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "In this research, we were interested in tweets containing either #climatechange or #globalwarming, \nas these two hashtags exactly correspond to climate change and global warming, respectively, the two \ncompeting definitions of climate issues. We did not follow [79] to include #AGW (anthropogenic global \nwarming) as query hashtags in our research because we think that this refers to global warming in \na defined category so cannot be regarded in parallel with the two considered hashtags. We limited the \nscope of the search to English-language tweets generated between 1 January 2009 and 31 December \n2018. We only collected tweets containing either of the two hashtags in the body of the tweets rather \nthan those containing these hashtags in the retweeted or quoted text, as we think that retweeted text or \nquoted texts cannot directly represent the tweeter’s usage pattern of the two terminologies. \n\nTo collect these tweets, we used a Python-based crawler to send requests to the Twitter server to \nselect hashtags, language, start date, and end date as inputs. Once the first request was completed, \nthe server responded with a file in json format and the first 20 qualified tweets in a time-descending \norder. By parsing the json file, we obtained a string for the crawler to build the next request and obtain \nthe next 20 tweets. Thus, a loop was written to keep the crawler sending requests and the crawler \nwas automatically terminated when all the qualified tweets publicly available were collected. Our \ncrawler respected Twitter’s robot.txt and we did not collect, analyze or display any user information in \nour study. ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed10.pdf" + }, + { + "text": "138–166. \n\n62. Papacharissi, Z.; de Fatima Oliveira, M. Affective news and networked publics: The rhythms of news \n\nstorytelling on# Egypt. J. Commun.**2012**, 62, 266–282. \n\n63. Wang, X.; Wei, F.; Liu, X.; Zhou, M.; Zhang, M. Topic sentiment analysis in twitter: A graph-based hashtag \nsentiment classification approach. In Proceedings of the 20th ACM International Conference on Information \nand Knowledge Management, Scotland, UK, 24–28 October 2011; pp. 1031–1040. \n\n64. Laniado, D.; Mika, P. Making sense of twitter. In Proceedings of the International Semantic Web Conference \n\n2010, Shanghai, China, 7–11 November 2010; pp. 470–485. \n\n65. González-Ibánez, R.; Muresan, S.; Wacholder, N. Identifying sarcasm in Twitter: A closer look. In Proceedings \nof the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies: \nShort Papers—Volume 2, Portland, OR, USA, 19–24 June 2011; pp. 581–586. \n\n66. Conover, M.D.; Ratkiewicz, J.; Francisco, M.; Gonçalves, B.; Menczer, F.; Flammini, A. Political polarization on \ntwitter. In Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, Barcelona, \nSpain, 17–21 July 2011. \n\n67. Kitzie, V.; Ghosh, D. # Criming and# Alive: Network and content analysis of two sides of a story on twitter. \nIn Proceedings of the 78th ASIS&T Annual Meeting: Information Science with Impact: Research in and for \nthe Community, St. Louis, MO, USA, 6–10 October; 2015; p. 41. \n\n68. Burgess, J.; Galloway, A.; Sauter, T. Hashtag as hybrid forum: The case of# agchatoz. In Hashtag Publics. \n\nThe Power and Politics of Discursive Networks; Peter Lang: New York, NY, USA, 2015; pp. 61–76. \n\n69. Rushkoff, D. 17. Permanent revolution: Occupying democracy. In The Playful Citizen; Amsterdam University ", + "page_start": 19, + "page_end": 19, + "source_file": "pubmed10.pdf" + }, + { + "text": "http://www.facebook.com/IBMRedbooks \n\n(cid:2) Follow us on Twitter: \n\nhttp://www.twitter.com/ibmredbooks \n\n(cid:2) Look for us on LinkedIn: \n\nhttp://www.linkedin.com/groups?home=&gid=2130806 \n\n(cid:2) Explore new Redbooks publications, residencies, and workshops with the IBM Redbooks \nweekly newsletter: \n\nhttps://www.redbooks.ibm.com/Redbooks.nsf/subscribe?OpenForm \n\n(cid:2) Stay current on recent Redbooks publications with RSS Feeds: \n\nhttp://www.redbooks.ibm.com/rss.html ", + "page_start": 20, + "page_end": 20, + "source_file": "sg246915.pdf" + }, + { + "text": "**3**\n\n**Activity**\nFind notifications for all recent actions to stay on top of \nthings. You can manage your notifications according to \nyour preferences. \n\n**1** **6**\n\n**4**\n\n**Chat**\nMessage someone or a group of people. This tab brings \nup the list of all your chats. \n\n**2** **7**\n\n**5**\n\n**Teams**\nCreate teams and channels to gather people together \nin focused spaces with conversations and files. This tab \nbrings up a list of all the teams you are a part of. \n\n**3**\n\n**Help**\nLearn more about Teams with articles and training \ncontent. Stay up to date with the latest features, \nand report problems when things aren’t working out. \n\n**8**\n\n**6**\n\n**Calendar**\nBring up your calendar to view, create, and respond \nto meetings. \n\n**4**\n\n**Search**\nSearch for people, files, meetings, or conversations \nin Teams, then filter results to find just what you need. \n\n**9**\n\n**Calls**\nStart video and audio calls by dialing a phone number \nor placing a call over the internet. View your call history \nand voicemail. \n\n**5**\n\n**Profile**\nSelecting your profile picture shows you a menu where \nyou can customize your profile, find saved messages, or \nset your status and a message people can see when \nthey try to reach you. \n\n**10**\n\n**7**", + "page_start": 1, + "page_end": 1, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "Press: Amsterdam, The Netherlands, 2013; p. 335. \n\n70. Grundberg, M.D.; Lindgren, S. Translocal frame extensions in a networked protest: Situating the# IdleNoMore \n\nhashtag. IC Rev. Cient*í*fica De Inf. Y Comun.**2015**, 11, 49–57. \n\n71. Bruns, A.; Burgess, J.E. # ausvotes: How Twitter covered the 2010 Australian federal election. Commun. \n\nPolitics Cult.**2011**, 44, 37–56. \n\n72. Pearce, W.; Holmberg, K.; Hellsten, I.; Nerlich, B. Climate change on Twitter: Topics, communities and \n\nconversations about the 2013 IPCC Working Group 1 report. PLoS ONE**2014**, 9, e94785. [CrossRef] \n\n73. Zhao, W.X.; Jiang, J.; Weng, J.; He, J.; Lim, E.P.; Yan, H.; Li, X. Comparing twitter and traditional media using \ntopic models. In Proceedings of the European Conference on Information Retrieval, Dublin, Ireland, 18–21 \nApril 2011; pp. 338–349. \n\n74. Doctor, V. Hashtag History: When and What Started It? Available online: https://www.hashtags.org/featured/ \n\nhashtag-history-when-and-what-started-it/ (accessed on 16 January 2020). \n\n75. Newman, T.P. Tracking the release of IPCC AR5 on Twitter: Users, comments, and sources following the \nrelease of the Working Group I Summary for Policymakers. Public Underst. Sci.**2017**, 26, 815–825. [CrossRef] \nSegerberg, A.; Bennett, W.L. Social media and the organization of collective action: Using Twitter to explore \nthe ecologies of two climate change protests. Commun. Rev.**2011**, 14, 197–215. [CrossRef] \nStatista. Number of Monthly Active Twitter Users Worldwide from 1st Quarter 2010 to 1st Quarter 2019 (in \nMillions). 2019. Available online: https://www.statista.com/statistics/282087/number-of-monthly-active- \ntwitter-users/ (accessed on 10 October 2019). \n\n76. \n\n77. \n\n78. Liu, Y.; Kliman-Silver, C.; Mislove, A. The tweets they are a-changin’: Evolution of Twitter users and behavior. \nIn Proceedings of the Eighth International AAAI Conference on Weblogs and Social Media, Ann Arbor, MI, \nUSA, 1–4 June 2014. \n\n79. Williams, H.T.; McMurray, J.R.; Kurz, T.; Lambert, F.H. Network analysis reveals open forums and echo \nchambers in social media discussions of climate change. Glob. Environ. Chang.**2015**, 32, 126–138. [CrossRef] \n80. Guo, L.; Rohde, J.A.; Wu, H.D. Who is responsible for Twitter’s echo chamber problem? Evidence from 2016 \n\nUS election networks. Inf. Commun. Soc.**2020**, 23, 234–251. [CrossRef] \n\n81. Gephi. Websites of Gephi. Available online: https://gephi.org (accessed on 16 January 2020). \n82. Calabrese, C.; Anderton, B.N.; Barnett, G.A. Online Representations of “Genome Editing” Uncover \nOpportunities for Encouraging Engagement: A Semantic Network Analysis. Sci. Commun.**2019**, 41, \n222–242. [CrossRef] \nFruchterman, T.M.; Reingold, E.M. Graph drawing by force-directed placement. Softw. Pract. Exp.**1991**, 21, \n1129–1164. [CrossRef] \n\n83. \n\n84. Myers, J.L.; Well, A.D.; Lorch, R.F., Jr. Research Design and Statistical Analysis; Routledge: Abingdon, UK, 2013. \n85. Krackhardt, D. Predicting with networks: Nonparametric multiple regression analysis of dyadic data. Soc. \n\nNetw.**1988**, 10, 359–381. [CrossRef] \n\n86. Borgatti, S.P.; Everett, M.G.; Freeman, L.C. Ucinet for Windows: Software for Social Network Analysis; Analytic \n\nTechnologies: Harvard, MA, USA, 2002; Volume 6. \n\n87. Zaval, L.; Keenan, E.A.; Johnson, E.J.; Weber, E.U. How warm days increase belief in global warming. Nat. \n\nClim. Chang.**2014**, 4, 143. [CrossRef] \n\n88. Marx, S.M.; Weber, E.U.; Orlove, B.S.; Leiserowitz, A.; Krantz, D.H.; Roncoli, C.; Phillips, J. Communication \nand mental processes: Experiential and analytic processing of uncertain climate information. Glob. Environ. \nChang.**2007**, 17, 47–58. [CrossRef] \n\n89. Bostrom, A.; Morgan, M.G.; Fischhoff, B.; Read, D. What do people know about global climate change? 1. \n\nMental models. Risk Anal.**1994**, 14, 959–970. [CrossRef] \n\n90. Moser, S.C. Communicating climate change: History, challenges, process and future directions. Wiley \n\nInterdiscip. Rev. Clim. Chang.**2010**, 1, 31–53. [CrossRef] \n\n91. Huang, J.; Thornton, K.M.; Efthimiadis, E.N. Conversational tagging in twitter. In Proceedings of the 21st \nACM Conference on Hypertext and Hypermedia, Toronto, ON, Canada, 13–16 June 2010; pp. 173–178. \n\n92. Callon, M. Acting in an Uncertain World; MIT Press: Cambridge, MA, USA, 2009. \n93. O’Neill, S.; Williams, H.T.; Kurz, T.; Wiersma, B.; Boykoff, M. Dominant frames in legacy and social media \n\ncoverage of the IPCC Fifth Assessment Report. Nat. Clim. Chang.**2015**, 5, 380. [CrossRef] ", + "page_start": 19, + "page_end": 19, + "source_file": "pubmed10.pdf" + }, + { + "text": "**3.1.2 How to view / search for “Latest News”**\n\nThe Home Page displays the latest 4 news items in the “Latest News” panel on the left hand side. \n\n‐**Click on any of the 4 news items to display the complete news article (here: item#1).**\n\n‐**Or click on “More news” in order to find previously published news articles in the news**\n\n**archive.**", + "page_start": 16, + "page_end": 16, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + }, + { + "text": "\n\nFigure 8.2 Viewing the New Instances in the Individuals by Class tab ", + "page_start": 65, + "page_end": 65, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "You can navigate directly to the events menu by clicking**View All Events**option or see each \nevent message separately by clicking the**Details**icon of the specific message, analyze the \ncontent, and eventually run the suggested fix procedure (see Figure 5-13). ", + "page_start": 161, + "page_end": 161, + "source_file": "sg247938.pdf" + }, + { + "text": "All the hashtags in the tweets were automatically extracted with the Regular Expression Library \nin Python. Hashtags were transformed to lowercase letters, and clear synonyms were stemmed \n(e.g., #trump, #DonaldTrump, #donaldtrump). As all the tweets in the “climate change” dataset \ncontained the #climatechange hashtag and all the tweets in the “global warming” dataset contained the \n#globalwarming hashtag, we did not document these two hashtags when processing data. The number \nof hashtags contained in the two discourses in each year is displayed in Figure 1b. Hashtags whose \nfrequency was lower than ten times are excluded in the network analysis. As hashtags are intended \nto be a topic anchor [52], extremely low frequency means that the hashtag is not recognized socially, \nand excluding them helps researchers focus on meaningful rather than occasional associations. \n\n3.3. Measurement \n\n3.3.1. Hashtag Co-Occurrence Network ", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed10.pdf" + } + ] + }, + { + "references": { + "source_file": "welcome_to_word_template.pdf", + "query": "Where can we open a document saved on OneDrive ?", + "target_page": 2, + "target_passage": "When you save this document in OneDrive, you’ll be able to open it anywhere: on your computer, tablet, or phone. Your changes will be saved automatically.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Try it: Select File > Save As, and then select OneDrive and give this document a name. \n\nIf you sign in to Office 365 on another device, this document will be in your list of recent files. \nYou can pick up where you left off… even if you left the document open on the computer you’re \nusing now. ", + "page_start": 1, + "page_end": 1, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Access files anywhere \n\nNeed to work on the go and across different devices? Click**File**>**Account**to sign \nin with your Microsoft account and access your recently used files anywhere, on \nany device, through seamless integration between Office, OneDrive, OneDrive for \nBusiness, and SharePoint. ", + "page_start": 1, + "page_end": 1, + "source_file": "Word QS.pdf" + }, + { + "text": "With this document saved in OneDrive, you can share it with others. They don’t even need Word \nto open it. \n\nTry it: Select Share, and send a link to this document. (keyboard shortcut – Alt+F+Z or Alt+Z+S) \n\nYou can send the link by typing someone’s email address or by copying the link and pasting it \ninto a message or chat. If you want them to read the document but not edit it, set their \npermission to view-only. \n\nIf they don’t have Word, the document will open in their web browser, in Word Online. ", + "page_start": 2, + "page_end": 2, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Find recent files \n\nWhether you only work with files stored on your PC’s local hard drive or you store \nfiles in multiple shared locations, selecting**File**>**Open**takes you to your recently \nused documents and any files that you may have pinned to your list. ", + "page_start": 1, + "page_end": 1, + "source_file": "Word QS.pdf" + }, + { + "text": "**For Your Reference…**\n**For Your Reference…**\nTo***save a new document***: \nTo***enter text***: \n\n1. Click the cell pointer on the desired cell and \nand select**Save As**\n1. Click on the***File Tab***\n2. Locate the storage folder in the***Navigation***\n***pane***\n2. Press \n to \n3. Type a***File name***and click on**[Save]**\n\ntype the required information \n\n, an arrow key or \nconfirm the data entry and to move the cell \npointer to another cell ", + "page_start": 6, + "page_end": 6, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "View who else is typing \n\nCo-authoring Word documents that are shared on OneDrive or on a \nSharePoint site happens in real-time, which means you can easily view where \nother authors are making changes in the same document that you’re currently \nworking in. ", + "page_start": 2, + "page_end": 2, + "source_file": "Word QS.pdf" + }, + { + "text": "On the left-hand side navigation tree, click on ‘My Data Import’ which opens a list of imported data. \nThe status of the import process can be seen under “My Data import” (figure 41,b). \n\nClick on the “File” at column FileLink (figure 41, c) to open or save the file exported. ", + "page_start": 27, + "page_end": 27, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "On the left-hand side navigation tree, click on ‘My Data Export’ (figure 44, a) which opens a list of export data (figure \n44, b), \nThe user should be able to download the file by clicking on the “File” link (figure 44, c). ", + "page_start": 28, + "page_end": 28, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "Share your work with others \n\nTo invite others to view or edit your documents, select the**Share**button in the \ntop right corner of the app window. Then, you can choose to share a link to your \ndocument or send invitations directly to specific people. If someone doesn't have \nWord, they can use the free Word for the Web app to edit and comment. ", + "page_start": 3, + "page_end": 3, + "source_file": "Word QS.pdf" + }, + { + "text": "Save the current backup to a secure and safe location. The files can be downloaded using \nUNIX**scp**or**pscp**for Microsoft Windows, as shown in Example 13-3. Replace the IP address \nwith the cluster IP address of your Storwize V7000 and specify a local folder on your \nworkstation. In this example, we are saving to C:\\V7000Backup. \n\nExample 13-3 Saving config backup files to your workstation \n\nC:\\**putty>pscp -unsafe**\n**superuser@9.174.157.250:/dumps/svc.config.backup.*c:\\V7000backup**\nUsing keyboard-interactive authentication. \nPassword: \nsvc.config.backup.bak_782 | 133 kB | 33.5 kB/s | ETA: 00:00:00 | 100% \nsvc.config.backup.log_782 | 16 kB | 16.8 kB/s | ETA: 00:00:00 | 100% \nsvc.config.backup.sh_7822 | 5 kB | 5.9 kB/s | ETA: 00:00:00 | 100% \nsvc.config.backup.xml_782 | 105 kB | 52.8 kB/s | ETA: 00:00:00 | 100% ", + "page_start": 705, + "page_end": 705, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "welcome_to_word_template.pdf", + "query": "What is the bold keyboard shortcut on word ?", + "target_page": 4, + "target_passage": "Bold (keyboard shortcut: Ctrl+B)", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Pro tip: If you selected whole words for this exercise, did you notice that Word popped up a \nlittle toolbar, with the font formatting options? \n\nBetween that and keyboard shortcuts like Ctrl+B \nand Ctrl+I, you save time by not having to go up to \nthe Home tab all the time. ", + "page_start": 3, + "page_end": 3, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Try it: Apply the Heading 1 style: \n\n1. Put your cursor somewhere in the heading above (“Make magic: use Heading styles”) – \n\ndon’t select anything. \n\n2. On the Home tab, find Styles, and select Heading 1 (keyboard shortcut Ctrl+Alt+1). \n\nTa-da! Now it looks like a heading, and acts like one too. ", + "page_start": 4, + "page_end": 4, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "The Tell me search box takes you straight to commands and Help in Word. \n\nTry it: Get help: \n\n1. Go to Tell me what you want to do at the top of the window. \n\n2. Type what you want to do. \n\nFor example, type: \n\n Add watermark to quickly get to the watermark command. \n\n Help to go to Word help. \n\n Training to see the list of Word training courses. \n\n What’s new for a list of the most recent updates to Word ", + "page_start": 7, + "page_end": 7, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "name is meant to be entered into a field it will only be highlighted rather than highlighted and printed in \nConsolas font. \n\nMenu options are shown with the name of the top-level menu, followed by a > followed by the next level \ndown to the desired selection. For example, to indicate how to open the Individuals by class tab under the \nTabs section in the Window menu the following text would be used: Window>Tabs> Individuals by \nclass. \n\nWhen a word or phrase is emphasized, it is*shown in italics like this*. \n\nExercises are presented like this: \n\n**Exercise 1: Accomplish this**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___\n\n1. Do this. \n\n2. Then do this. \n\n3. Then do this. \n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___", + "page_start": 5, + "page_end": 5, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "column***B***to select it \n\n\n and click on the \n**6**", + "page_start": 18, + "page_end": 18, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**For Your Reference…**\nTo***apply font formatting***: \n\n1. Select the text \n\n 2. Click on the drop arrow for***Font***\n\n3. Point to a font to preview it \n4. Click on the font to apply it ", + "page_start": 21, + "page_end": 21, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "To format text, select it, and then select a button in the Font or Paragraph area on the Home \ntab. \n\nTry it: Select text in the lines below and choose formatting options so that the text is an \nexample of the formatting it’s describing: ", + "page_start": 3, + "page_end": 3, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Word works with Bing to give you access to thousands of pictures you can use in your \ndocuments. \n\nTry it: Hit enter after this line to make a blank line: \n\n1. With your cursor in the blank space above, go to the Insert tab, select Online Pictures, \n\nand then search for something, like puppy clip art. \n\n2. Select the picture you want, and select Insert. ", + "page_start": 2, + "page_end": 2, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "**4.4 Data input**\n\nData can be**entered**into the**white**grid cells only. It is also possible to**copy**and**paste**data from one cell to another \nby using the shortcut keys ‘**Ctrl + c**’ to copy and ‘**Ctrl + v**’ to paste.**Each value entered is automatically saved**. \nWhen the data is entered, it is first shown in bold, and then changes to normal font indicating that the value has been \nsaved.**Saving occurs immediately**(usually within 1 second), but in case the system becomes slower,**the user**\n**should wait until data are shown in regular font before exiting the grid**. Otherwise, the data entered will not be \nsaved. \n\nAs mentioned in the previous section, default values are provided for some parameters (yellow cells in the grid). \nThese values can be overwritten if the Party has more accurate data. \n\nNote: Data that has been entered will be automatically saved. ", + "page_start": 17, + "page_end": 17, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "*Continue using the previous*\n*file with this exercise, or open*\n*the file E722 Font*\n*Formatting_2.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Click in cell***A1***to make the \ncell with the main heading the \nactive cell \n\n Click on the drop arrow next to \nthe***Font Size***command \n\n in the***Font***group on \n\nthe***Home***tab to display a \ngallery of available sizes \n\n Point to various sizes and \n\nnotice how***Live Preview***\nshows you how the heading \nwill look \n\n Click on***16***to change the \n\n*You can also change the font*\n*size of parts of a document,*\n*and you can use the Mini*\n*toolbar...*\n\n Click in cell***A2***\n Click with the right-mouse \nbutton to display the mini- \ntoolbar and the shortcut menu \n\n Click on the drop arrow next to \n\n***Font Size***\nclick on***14***\n\n and \n\n Click in cell***A3***to hide the ", + "page_start": 22, + "page_end": 22, + "source_file": "Excel Training Manual 1.pdf" + } + ] + }, + { + "references": { + "source_file": "welcome_to_word_template.pdf", + "query": "What is the advise to make the style sets and themes work well ? ", + "target_page": 6, + "target_passage": "They work best when your document is formatted with styles", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Style sets and themes let you completely change the look of your document in an instant. They \nwork best when your document is formatted with styles (so it’s good that we fixed that Heading \nstyle, above). \n\nTry it: Explore style sets and themes: \n\n1. On the Design tab, select Themes, and choose a theme from the drop-down. \nNotice that the gallery of style sets updates to reflect the theme you picked. \n\n2. Select any theme you like from the drop-down and click to apply. ", + "page_start": 5, + "page_end": 5, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "\n\nT H E \n\nDESIGN COMMUNITY \n\nA N D G U N L O C K E ", + "page_start": 18, + "page_end": 18, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "To make a good summary, you need to: \n\n\n \n \n \n \n [html]\n
Keep it brief.
Make sure to use main headings and keywords.
Focus on the main ideas.
Classify and organise the information in a logical manner.
Use your own words where possible.
Include examples.
Remember that your summaries are there to help you.
", + "page_start": 28, + "page_end": 28, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "\n\n***Style 9***", + "page_start": 54, + "page_end": 54, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Try it: Apply the Heading 1 style: \n\n1. Put your cursor somewhere in the heading above (“Make magic: use Heading styles”) – \n\ndon’t select anything. \n\n2. On the Home tab, find Styles, and select Heading 1 (keyboard shortcut Ctrl+Alt+1). \n\nTa-da! Now it looks like a heading, and acts like one too. ", + "page_start": 4, + "page_end": 4, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "**For Your Reference…**\nTo***apply font formatting***: \n\n1. Select the text \n\n 2. Click on the drop arrow for***Font***\n\n3. Point to a font to preview it \n4. Click on the font to apply it ", + "page_start": 21, + "page_end": 21, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "\nCONFIGURATION EFFECTS ", + "page_start": 232, + "page_end": 232, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n\nthe design of ", + "page_start": 60, + "page_end": 60, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n\nBELOW DESIGN RANGE ", + "page_start": 256, + "page_end": 256, + "source_file": "00-80T-80.pdf" + }, + { + "text": "**For Your Reference…**\nTo***change***the***chart style***: \n\n1. Ensure the chart or chart sheet is selected \n2. Click on the***Chart Styles***tool to the right of \nthe chart \n\n3. Click on the desired style ", + "page_start": 54, + "page_end": 54, + "source_file": "Excel Training Manual 1.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0770.pdf", + "query": "Where are the peaks of the VHE blazars ?", + "target_page": 1, + "target_passage": " VHE blazars have double-humped spectral energy distributions (SEDs), with one peak at UV/X-ray energies and another at GeV/TeV energies.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Prior to the launch of Fermi VERITAS had discov- \nered VHE emission from 2 blazars. These included \nthe first VHE-detected IBL, W Comae [14, 15], and \nthe HBL 1ES 0806+524 [16]. VERITAS has discov- \nered 6 VHE blazars since the launch of Fermi. Three \nof these were initially observed by VERITAS prior to \nthe release of Fermi-LAT results, due to the X-ray \nbrightness of the synchrotron peaks of their SEDs. \n\n**4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are \nlargely high-frequency-peaked BL Lac objects. How- \never, the program also includes IBLs (intermediate- \npeaked) and LBLs (low-peaked), as well as flat spec- \ntrum radio quasars (FSRQs), in an attempt to in- \ncrease the types of blazars known to emit VHE γ-rays. \nThe observed targets are drawn from a target list con- \ntaining objects visible to the telescopes at reasonable \nzenith angles (−8◦ < δ < 72◦), without a previously \npublished VHE limit below 1.5% Crab, and with a \nmeasured redshift z < 0.3. To further the study of the ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**3. VERITAS Blazar KSP**\n\n• All nearby (z < 0.3) HBL and IBL recom- \nmended as potential VHE emitters in [5, 6, 7]. \n\n• The X-ray brightest HBL (z < 0.3) in the recent \nSedentary [8] and ROXA [9] surveys. \n\n• Several FSRQ recommended as potential VHE \nemitters in [6, 11]. \n\n• All nearby (z < 0.3) blazars detected by \n\n• All nearby (z < 0.3) blazars contained in the \nFermi-LAT Bright AGN Sample [13]. \n\n• All sources (|b| > 10◦) detected by Fermi-LAT \nwhere extrapolations of their MeV-GeV γ-ray \nspectrum (including EBL absorption; assuming \nz = 0.3 if the redshift is unknown) indicates a \npossible VERITAS detection in less than 20 h. \nThis criteria is the focus of the 2009-10 VERI- \nTAS blazar discovery program. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "The VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is \nused to study very high energy (VHE; E>100 GeV) γ-ray emission from astrophysical objects. VERITAS is \ncurrently the most sensitive VHE γ-ray observatory in the world and one of the VERITAS collaboration’s Key \nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class \nof identified VHE sources, with ∼30 known to emit VHE photons. More than 70 AGN, almost all of which \nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE \nexposure. These observations have resulted in the detection of VHE γ-rays from 16 AGN (15 blazars), including \n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected \nresults are presented. \n0 \n1 \n0 \n2 \n\nn \na \nJ \n**1. Introduction**\n\n5 \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + }, + { + "text": "vations of VHE blazars, can measure both SED peaks \nand are crucial for extracting information from the \nobservations of VHE blazars. They are used to con- \nstrain the size, magnetic field and Doppler factor of \nthe emission region, as well as to determine the origin \n(leptonic or hadronic) of the VHE γ-rays. In leptonic \nscenarios, such MWL observations are used to mea- \nsure the spectrum of high-energy electrons producing \nthe emission, as well as to elucidate the nature of the \nseed photons. Additionally, an accurate measure of \nthe cosmological EBL density requires accurate mod- \neling of the blazar’s intrinsic VHE emission that can \nonly be performed with contemporaneous MWL ob- \nservations. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + }, + { + "text": "**5.2. Discoveries Motivated by Fermi-LAT**\n\nThe successful VHE discovery observations by \nVERITAS of three blazars was motivated primarily \nby results from the first year of LAT data taking. In \nparticular, the VHE detections of PKS 1424+240 [21] \nand 1ES 0502+675 [22] were the result of VERITAS \nobservations triggered by the inclusion of these objects \nin the Fermi-LAT Bright AGN List [13]. The former \nis only the third IBL known to emit VHE gamma- \nrays, and the latter is the most distant BL Lac object \n\n**7. Multi-wavelength Studies of VHE**\n**Blazars**\n\nDuring the first three seasons of VERITAS obser- \nvations, pre-planned extensive MWL campaigns were \norganized for three blazars 1ES 2344+514 (2007-08), \n1ES 1218+304 (2008-09) and 1ES 0229+200 (2009- \n10 - ongoing). \nIn addition, numerous ToO MWL- \nobservation campaigns were performed. These include \ncampaigns for every blazar/AGN discovered by VER- \nITAS, and all include Swift (XRT and UVOT) data. \nAll MWL campaigns on the VHE blazars discovered 2RBS 0413 was observed further by VERITAS in Fall 2009. \n\neConf C091122 ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + }, + { + "text": "More than 50 VHE blazar candidates were observed \nby VERITAS between September 2007 and June 2009. \nThe total exposure on the 49 non-detected candi- \ndates is ∼305 h live time (average of 6.2 h per can- \ndidate). Approximately 55% of the total exposure is \nsplit amongst the 27 observed HBL. The remainder is \ndivided amongst the 8 IBL (26%), 5 LBL (6%), and 9 \nFSRQ (13%). There are no clear indications of signifi- \ncant VHE γ-ray emission from any of these 49 blazars \n[25]. However, the observed significance distribution is \nclearly skewed towards positive values (see Figure 1). \nA stacking analysis performed on the entire data sam- \nple shows an overall excess of 430 γ-rays, correspond- \ning to a statistical significance of 4.8σ, observed from \nthe directions of the candidate blazars. The IBL and \nHBL targets make up 96% of the observed excess. Ob- \nservations of these objects also comprise ∼80% of the \ntotal exposure. An identical stacked analysis of all \nthe extragalactic non-blazar targets observed, but not \nclearly detected (>5σ), by VERITAS does not show \na significant excess (∼120 h exposure). The stacked \nexcess persists using alternate methods for estimating \nthe background at each blazar location, and with dif- \nferent event selection criteria (e.g. soft cuts optimized \nfor sources with ΓVHE > 4). The distribution of VHE \nflux upper limits is shown in Figure 1. These 49 VHE \nflux upper limits are generally the most-constraining \never reported for these objects. ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + }, + { + "text": "Active galactic nuclei are the most numerous class \nof identified VHE γ-ray sources. These objects emit \nnon-thermal radiation across ∼20 orders of magnitude \nin energy and rank among the most powerful particle \naccelerators in the universe. A small fraction of AGN \npossess strong collimated outflows (jets) powered by \naccretion onto a supermassive black hole (SMBH). \nVHE γ-ray emission can be generated in these jets, \nlikely in a compact region very near the SMBH event \nhorizon. Blazars, a class of AGN with jets pointed \nalong the line-of-sight to the observer, are of par- \nticular interest in the VHE regime. Approximately \n30 blazars, primarily high-frequency-peaked BL Lacs \n(HBL), are identified as sources of VHE γ-rays, and \nsome are spectacularly variable on time scales com- \nparable to the light crossing time of their SMBH (∼2 \nmin; [1]). VHE blazar studies probe the environment \nvery near the central SMBH and address a wide range \nof physical phenomena, including the accretion and \njet-formation processes. These studies also have cos- \nmological implications, as VHE blazar data can be \nused to strongly constrain primordial radiation fields \n(see the extragalactic background light (EBL) con- \nstraints from, e.g., [2, 3]). \n\n**2. VERITAS**", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + }, + { + "text": "tion of correlated VHE and X-ray flux variability, as \nwell as correlated spectral hardening in both the VHE \nand X-ray bands. The VHE MWL observations were \nperformed in both ”quiescent” and flaring states for \nsome of the observed blazars. For the observed HBL \nobjects, the SEDs can be well described by a simple \nSSC model in both high and low states. However, an \nadditional external Compton component is necessary \nto adequately fit the SEDs of the IBL objects. \n\norating institutions in the construction and operation \nof the instrument. \n\n**References**\n\nThe Fermi-LAT is already having a significant im- \npact on the blazar KSP. In future seasons, the VER- \nITAS blazar discovery program will focus its dis- \ncovery program on hard-spectrum blazars detected \nby Fermi-LAT, and will likely have a greater focus \non high-risk/high-reward objects at larger redshifts \n(0.3 < z < 0.7). \nIn addition, the number of VHE \nblazars studied in pre-planned MWL campaigns will \nincrease as data from the Fermi-LAT will be publicly \navailable. \nIn particular, the extensive pre-planned \nMWL campaigns will focus on objects that are note- \nworthy for the impact their data may have on under- \nstanding the EBL. The simultaneous observations of \nblazars by VERITAS and Fermi-LAT will completely \nresolve the higher-energy SED peak, often for the first \ntime, enabling unprecedented constraints on the un- \nderlying blazar phenomena to be derived. ", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0770.pdf" + }, + { + "text": "The first two years of the VERITAS blazar KSP \nwere highly successful. Highlights include the detec- \ntion of more than a 16 VHE blazars with the obser- \nvations almost always having contemporaneous MWL \ndata. Among these detections are 8 VHE blazar dis- \ncoveries, including the first three IBLs known to emit \nVHE γ-rays. All but a handful of the blazars on the \ninitial VERITAS discovery target list were observed, \nand the flux limits generated for those not VHE de- \ntected are generally the most-constraining ever. The \nexcess seen in the stacked blazar analysis suggests \nthat the initial direction of the VERITAS discovery \nprogram was well justified, and that follow-up obser- \nvations of many of these initial targets will result in \nVHE discoveries. In addition, the Fermi-LAT is iden- \ntifying many new compelling targets for the VERITAS \nblazar discovery program. These new candidates have \nalready resulted in 3 VHE blazar discoveries. The \nfuture of the VERITAS blazar discovery program is \nclearly very bright. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration \nHarvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645, \nUSA ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0770.pdf", + "query": "What are the blazars observed in the discovery program ?", + "target_page": 2, + "target_passage": "The blazars observed in the discovery program are largely high-frequency-peaked BL Lac objects. How ever, the program also includes IBLs (intermediate peaked) and LBLs (low-peaked), as well as flat spec trum radio quasars (FSRQs), in an attempt to in crease the types of blazars known to emit VHE γ-rays.", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "The first two years of the VERITAS blazar KSP \nwere highly successful. Highlights include the detec- \ntion of more than a 16 VHE blazars with the obser- \nvations almost always having contemporaneous MWL \ndata. Among these detections are 8 VHE blazar dis- \ncoveries, including the first three IBLs known to emit \nVHE γ-rays. All but a handful of the blazars on the \ninitial VERITAS discovery target list were observed, \nand the flux limits generated for those not VHE de- \ntected are generally the most-constraining ever. The \nexcess seen in the stacked blazar analysis suggests \nthat the initial direction of the VERITAS discovery \nprogram was well justified, and that follow-up obser- \nvations of many of these initial targets will result in \nVHE discoveries. In addition, the Fermi-LAT is iden- \ntifying many new compelling targets for the VERITAS \nblazar discovery program. These new candidates have \nalready resulted in 3 VHE blazar discoveries. The \nfuture of the VERITAS blazar discovery program is \nclearly very bright. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "To select our sample, we identified objects in the \ncalibrator list that were also classified as BL Lacs or \nFSRQs by the Candidate Gamma-Ray Blazar Sur- \nvey [6, CGRaBS]. Of the 243 total objects in the \ncalibrator list, 171 (35 BL Lacs and 136 FSRQs) \nhave positive blazar class identifications, although \nthere are three sources (J0238+166, J0428-379, and ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + }, + { + "text": "Prior to the launch of Fermi VERITAS had discov- \nered VHE emission from 2 blazars. These included \nthe first VHE-detected IBL, W Comae [14, 15], and \nthe HBL 1ES 0806+524 [16]. VERITAS has discov- \nered 6 VHE blazars since the launch of Fermi. Three \nof these were initially observed by VERITAS prior to \nthe release of Fermi-LAT results, due to the X-ray \nbrightness of the synchrotron peaks of their SEDs. \n\n**4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are \nlargely high-frequency-peaked BL Lac objects. How- \never, the program also includes IBLs (intermediate- \npeaked) and LBLs (low-peaked), as well as flat spec- \ntrum radio quasars (FSRQs), in an attempt to in- \ncrease the types of blazars known to emit VHE γ-rays. \nThe observed targets are drawn from a target list con- \ntaining objects visible to the telescopes at reasonable \nzenith angles (−8◦ < δ < 72◦), without a previously \npublished VHE limit below 1.5% Crab, and with a \nmeasured redshift z < 0.3. To further the study of the ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "**5.2. Discoveries Motivated by Fermi-LAT**\n\nThe successful VHE discovery observations by \nVERITAS of three blazars was motivated primarily \nby results from the first year of LAT data taking. In \nparticular, the VHE detections of PKS 1424+240 [21] \nand 1ES 0502+675 [22] were the result of VERITAS \nobservations triggered by the inclusion of these objects \nin the Fermi-LAT Bright AGN List [13]. The former \nis only the third IBL known to emit VHE gamma- \nrays, and the latter is the most distant BL Lac object \n\n**7. Multi-wavelength Studies of VHE**\n**Blazars**\n\nDuring the first three seasons of VERITAS obser- \nvations, pre-planned extensive MWL campaigns were \norganized for three blazars 1ES 2344+514 (2007-08), \n1ES 1218+304 (2008-09) and 1ES 0229+200 (2009- \n10 - ongoing). \nIn addition, numerous ToO MWL- \nobservation campaigns were performed. These include \ncampaigns for every blazar/AGN discovered by VER- \nITAS, and all include Swift (XRT and UVOT) data. \nAll MWL campaigns on the VHE blazars discovered 2RBS 0413 was observed further by VERITAS in Fall 2009. \n\neConf C091122 ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + }, + { + "text": "The motivation for observing blazars in the sub- \nmillimeter is to study behavior close to the central \nengine, where the jet material is presumably still be- \ning accelerated. The separate emission processes that \ncontribute to overall SED may present differently in \nBL Lacs and FSRQs, allowing us to understand the \nsimilarities and differences between blazar types. We \nhave investigated these differences between objects in \nterms of submillimeter behavior and, in conclusion, \nfind that \n\n• The SMA blazars exhibit submillimeter energy \nindexes that follow the spectral se- \nspectral \nquence interpretation of blazars. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0806.pdf" + }, + { + "text": "EBL a few objects having a large (z > 0.3) are also \nincluded in the target list. The target list includes: \n\nVERITAS observes for ∼750 h and ∼250 h each \nyear during periods of astronomical darkness and par- \ntial moonlight, respectively. The moonlight observa- \ntions are almost exclusively used for a blazar discovery \nprogram, and a large fraction of the dark time is used \nfor the blazar KSP, which consists of: \n\n• Four distant (z > 0.3) BL Lac objects recom- \n\n• A VHE blazar discovery program (∼200 h / yr): \nEach year ∼10 targets are selected to receive \n∼10 h of observations each during astronomi- \ncal darkness. These data are supplemented by \ndiscovery observations during periods of partial \nmoonlight. \n\nmended by [5, 10]. \n\nEGRET [12]. \n\n• A target-of-opportunity (ToO) observation pro- \ngram (∼50 h / yr): VERITAS blazar obser- \nvations can be triggered by either a VERI- \nTAS blazar discovery, a VHE flaring alert (>2 \nCrab) from the blazar monitoring program of \nthe Whipple 10-m telescope or from another \nVHE instrument, or a lower-energy flaring alert \n(optical, X-ray or Fermi-LAT). Should the guar- \nanteed allocation be exhausted, further time can \nbe requested from a pool of director’s discre- \ntionary time. \n\n• Multi-wavelength (MWL) \n\nstudies of VHE \nblazars (∼50 h / yr + ToO): Each year one \nblazar receives a deep exposure in a pre-planned \ncampaign of extensive, simultaneous MWL (X- \nray, optical, radio) measurements. ToO observa- \ntion proposals for MWL measurements are also \nsubmitted to lower-energy observatories (e.g. \nSwift) and are triggered by a VERITAS discov- \nery or flaring alert. \n\n**5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ-ray emission from \n16 AGN (15 blazars), including 8 VHE discoveries. \nThese AGN are shown in Table I, and each has been \ndetected by the Large Area Telescope (LAT) instru- \nment aboard the Fermi Gamma-ray Space Telescope. \nEvery blazar discovered by VERITAS was the sub- \nject of ToO MWL observations to enable modeling of \nits simultaneously-measured SED. The known VHE \nblazars detected by VERITAS were similarly the tar- \ngets of MWL observations. \n\n• Distant VHE blazar studies to constrain the ex- \ntragalactic background light (EBL): Here dis- \ntant targets are given a higher priority in the \nblazar discovery program, as well as for the \nMWL observations of known VHE blazars, par- \nticularly those with hard VHE spectra. \n**5.1. Recent VERITAS Blazar Discoveries**", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**3. VERITAS Blazar KSP**\n\n• All nearby (z < 0.3) HBL and IBL recom- \nmended as potential VHE emitters in [5, 6, 7]. \n\n• The X-ray brightest HBL (z < 0.3) in the recent \nSedentary [8] and ROXA [9] surveys. \n\n• Several FSRQ recommended as potential VHE \nemitters in [6, 11]. \n\n• All nearby (z < 0.3) blazars detected by \n\n• All nearby (z < 0.3) blazars contained in the \nFermi-LAT Bright AGN Sample [13]. \n\n• All sources (|b| > 10◦) detected by Fermi-LAT \nwhere extrapolations of their MeV-GeV γ-ray \nspectrum (including EBL absorption; assuming \nz = 0.3 if the redshift is unknown) indicates a \npossible VERITAS detection in less than 20 h. \nThis criteria is the focus of the 2009-10 VERI- \nTAS blazar discovery program. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "We present multi-epoch observations from the Submillimeter Array (SMA) for a sample of 171 bright blazars, \n43 of which were detected by Fermi during the first three months of observations. We explore the correlation \nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special \nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de- \ntermined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), \nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate \nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands \nduring the months August–October 2008. The submillimeter light curves are modeled as first-order continuous \nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ- \nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. \nAll of the the light curves are consistent with being produced by a single process that accounts for both low \nand high states, and there is additional evidence that objects may be transitioning between blazar class during \nflaring epochs. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration \nHarvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645, \nUSA ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + }, + { + "text": "] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\n**1. INTRODUCTION**\n\nThe timescales on which high-amplitude flaring \nevents occur in blazars indicate that much of the en- \nergy is being produced deep within the jet on small, \nsub-parsec scales [1, 2]. Understanding if/how emis- \nsion differs between blazar subclasses (i.e., BL Lacs \nobjects and flat-spectrum radio quasars (FSRQs)) \nmay offer important insight into the similarity be- \nfurthermore, can provide con- \ntween blazars and, \nstraints on the formation and acceleration of the jets \nthemselves. \n\n**2. SMA BLAZARS**\n\nThe Submillimeter Array [4] consists of eight 6 m \nantennas located near the summit of Mauna Kea. The \nSMA is used in a variety of baseline configurations \nand typically operates in the 1mm and 850µm win- \ndows, achieving spatial resolution as fine as 0.25” at \n850µm. The sources used as phase calibrators for the \narray are compiled in a database known as the SMA \nCalibrator List2 [5]. Essentially a collection of bright \nobjects (stronger than 750 mJy at 230 GHz and 1 Jy \nat 345 GHz), these sources are monitored regularly, \nboth during science observations and dedicated ob- \nserving tracks. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0770.pdf", + "query": "How many VHE blazar candidates were observed by VERITAS between September 2007 andJune 2009 ?", + "target_page": 3, + "target_passage": "More than 50 VHE blazar candidates were observed by VERITAS betweenSeptember 2007 andJune 2009.", + "chunk_present": { + "presence": true, + "index": 5 + } + }, + "top_chunk": [ + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**3. VERITAS Blazar KSP**\n\n• All nearby (z < 0.3) HBL and IBL recom- \nmended as potential VHE emitters in [5, 6, 7]. \n\n• The X-ray brightest HBL (z < 0.3) in the recent \nSedentary [8] and ROXA [9] surveys. \n\n• Several FSRQ recommended as potential VHE \nemitters in [6, 11]. \n\n• All nearby (z < 0.3) blazars detected by \n\n• All nearby (z < 0.3) blazars contained in the \nFermi-LAT Bright AGN Sample [13]. \n\n• All sources (|b| > 10◦) detected by Fermi-LAT \nwhere extrapolations of their MeV-GeV γ-ray \nspectrum (including EBL absorption; assuming \nz = 0.3 if the redshift is unknown) indicates a \npossible VERITAS detection in less than 20 h. \nThis criteria is the focus of the 2009-10 VERI- \nTAS blazar discovery program. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "Prior to the launch of Fermi VERITAS had discov- \nered VHE emission from 2 blazars. These included \nthe first VHE-detected IBL, W Comae [14, 15], and \nthe HBL 1ES 0806+524 [16]. VERITAS has discov- \nered 6 VHE blazars since the launch of Fermi. Three \nof these were initially observed by VERITAS prior to \nthe release of Fermi-LAT results, due to the X-ray \nbrightness of the synchrotron peaks of their SEDs. \n\n**4. Blazar Discovery Program**\n\nThe blazars observed in the discovery program are \nlargely high-frequency-peaked BL Lac objects. How- \never, the program also includes IBLs (intermediate- \npeaked) and LBLs (low-peaked), as well as flat spec- \ntrum radio quasars (FSRQs), in an attempt to in- \ncrease the types of blazars known to emit VHE γ-rays. \nThe observed targets are drawn from a target list con- \ntaining objects visible to the telescopes at reasonable \nzenith angles (−8◦ < δ < 72◦), without a previously \npublished VHE limit below 1.5% Crab, and with a \nmeasured redshift z < 0.3. To further the study of the ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + }, + { + "text": "The VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is \nused to study very high energy (VHE; E>100 GeV) γ-ray emission from astrophysical objects. VERITAS is \ncurrently the most sensitive VHE γ-ray observatory in the world and one of the VERITAS collaboration’s Key \nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class \nof identified VHE sources, with ∼30 known to emit VHE photons. More than 70 AGN, almost all of which \nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE \nexposure. These observations have resulted in the detection of VHE γ-rays from 16 AGN (15 blazars), including \n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected \nresults are presented. \n0 \n1 \n0 \n2 \n\nn \na \nJ \n**1. Introduction**\n\n5 \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n(z = 0.341) detected in the VHE band. In addition, \nVER J0521+211, likely associated with the radio-loud \nAGN RGB J0521.8+2112, was detected by VERTAS \nin ∼4 h of observations in October 2009 [23]. These \nobservations were motivated by its identification as a \n>30 GeV γ-ray source in the public Fermi-LAT data. \nIts VHE flux is 5% of the Crab Nebula flux, placing it \namong the brightest VHE blazars detected in recent \nyears. VERITAS later observed even brighter VHE \nflaring from VER J0521+211 in November 2009 [24], \nleading to deeper VHE observations. ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + }, + { + "text": "**5.2. Discoveries Motivated by Fermi-LAT**\n\nThe successful VHE discovery observations by \nVERITAS of three blazars was motivated primarily \nby results from the first year of LAT data taking. In \nparticular, the VHE detections of PKS 1424+240 [21] \nand 1ES 0502+675 [22] were the result of VERITAS \nobservations triggered by the inclusion of these objects \nin the Fermi-LAT Bright AGN List [13]. The former \nis only the third IBL known to emit VHE gamma- \nrays, and the latter is the most distant BL Lac object \n\n**7. Multi-wavelength Studies of VHE**\n**Blazars**\n\nDuring the first three seasons of VERITAS obser- \nvations, pre-planned extensive MWL campaigns were \norganized for three blazars 1ES 2344+514 (2007-08), \n1ES 1218+304 (2008-09) and 1ES 0229+200 (2009- \n10 - ongoing). \nIn addition, numerous ToO MWL- \nobservation campaigns were performed. These include \ncampaigns for every blazar/AGN discovered by VER- \nITAS, and all include Swift (XRT and UVOT) data. \nAll MWL campaigns on the VHE blazars discovered 2RBS 0413 was observed further by VERITAS in Fall 2009. \n\neConf C091122 ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + }, + { + "text": "More than 50 VHE blazar candidates were observed \nby VERITAS between September 2007 and June 2009. \nThe total exposure on the 49 non-detected candi- \ndates is ∼305 h live time (average of 6.2 h per can- \ndidate). Approximately 55% of the total exposure is \nsplit amongst the 27 observed HBL. The remainder is \ndivided amongst the 8 IBL (26%), 5 LBL (6%), and 9 \nFSRQ (13%). There are no clear indications of signifi- \ncant VHE γ-ray emission from any of these 49 blazars \n[25]. However, the observed significance distribution is \nclearly skewed towards positive values (see Figure 1). \nA stacking analysis performed on the entire data sam- \nple shows an overall excess of 430 γ-rays, correspond- \ning to a statistical significance of 4.8σ, observed from \nthe directions of the candidate blazars. The IBL and \nHBL targets make up 96% of the observed excess. Ob- \nservations of these objects also comprise ∼80% of the \ntotal exposure. An identical stacked analysis of all \nthe extragalactic non-blazar targets observed, but not \nclearly detected (>5σ), by VERITAS does not show \na significant excess (∼120 h exposure). The stacked \nexcess persists using alternate methods for estimating \nthe background at each blazar location, and with dif- \nferent event selection criteria (e.g. soft cuts optimized \nfor sources with ΓVHE > 4). The distribution of VHE \nflux upper limits is shown in Figure 1. These 49 VHE \nflux upper limits are generally the most-constraining \never reported for these objects. ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + }, + { + "text": "The first two years of the VERITAS blazar KSP \nwere highly successful. Highlights include the detec- \ntion of more than a 16 VHE blazars with the obser- \nvations almost always having contemporaneous MWL \ndata. Among these detections are 8 VHE blazar dis- \ncoveries, including the first three IBLs known to emit \nVHE γ-rays. All but a handful of the blazars on the \ninitial VERITAS discovery target list were observed, \nand the flux limits generated for those not VHE de- \ntected are generally the most-constraining ever. The \nexcess seen in the stacked blazar analysis suggests \nthat the initial direction of the VERITAS discovery \nprogram was well justified, and that follow-up obser- \nvations of many of these initial targets will result in \nVHE discoveries. In addition, the Fermi-LAT is iden- \ntifying many new compelling targets for the VERITAS \nblazar discovery program. These new candidates have \nalready resulted in 3 VHE blazar discoveries. The \nfuture of the VERITAS blazar discovery program is \nclearly very bright. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0770.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration \nHarvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645, \nUSA ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + }, + { + "text": "(∼5.5σ; 3% Crab flux above 300 GeV; ΓVHE ∼ 2.7) \nduring VERITAS observations from December 2008 \nto March 2009. The initial announcement of the VHE \ndiscovery [19] led to its discovery above 1 GeV in the \nFermi-LAT data using a special analysis. RBS 0413, \na relatively distant HBL (z=0.19), was observed for \n16 h good-quality live time in 2008-092. These data \nresulted in the discovery of VHE gamma-rays (>270γ, \n∼6σ) at a flux (>200 GeV) of ∼2% of the Crab Neb- \nula flux. The discovery [20] was announced simultane- \nously with the LAT MeV-GeV detection. The VHE \nand other MWL observations, including Fermi-LAT \ndata, for each of these three sources will be the sub- \nject of a joint publication involving both the VERI- \nTAS and LAT collaborations. ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + }, + { + "text": "EBL a few objects having a large (z > 0.3) are also \nincluded in the target list. The target list includes: \n\nVERITAS observes for ∼750 h and ∼250 h each \nyear during periods of astronomical darkness and par- \ntial moonlight, respectively. The moonlight observa- \ntions are almost exclusively used for a blazar discovery \nprogram, and a large fraction of the dark time is used \nfor the blazar KSP, which consists of: \n\n• Four distant (z > 0.3) BL Lac objects recom- \n\n• A VHE blazar discovery program (∼200 h / yr): \nEach year ∼10 targets are selected to receive \n∼10 h of observations each during astronomi- \ncal darkness. These data are supplemented by \ndiscovery observations during periods of partial \nmoonlight. \n\nmended by [5, 10]. \n\nEGRET [12]. \n\n• A target-of-opportunity (ToO) observation pro- \ngram (∼50 h / yr): VERITAS blazar obser- \nvations can be triggered by either a VERI- \nTAS blazar discovery, a VHE flaring alert (>2 \nCrab) from the blazar monitoring program of \nthe Whipple 10-m telescope or from another \nVHE instrument, or a lower-energy flaring alert \n(optical, X-ray or Fermi-LAT). Should the guar- \nanteed allocation be exhausted, further time can \nbe requested from a pool of director’s discre- \ntionary time. \n\n• Multi-wavelength (MWL) \n\nstudies of VHE \nblazars (∼50 h / yr + ToO): Each year one \nblazar receives a deep exposure in a pre-planned \ncampaign of extensive, simultaneous MWL (X- \nray, optical, radio) measurements. ToO observa- \ntion proposals for MWL measurements are also \nsubmitted to lower-energy observatories (e.g. \nSwift) and are triggered by a VERITAS discov- \nery or flaring alert. \n\n**5. VERITAS AGN Detections**\n\nVERITAS has detected VHE γ-ray emission from \n16 AGN (15 blazars), including 8 VHE discoveries. \nThese AGN are shown in Table I, and each has been \ndetected by the Large Area Telescope (LAT) instru- \nment aboard the Fermi Gamma-ray Space Telescope. \nEvery blazar discovered by VERITAS was the sub- \nject of ToO MWL observations to enable modeling of \nits simultaneously-measured SED. The known VHE \nblazars detected by VERITAS were similarly the tar- \ngets of MWL observations. \n\n• Distant VHE blazar studies to constrain the ex- \ntragalactic background light (EBL): Here dis- \ntant targets are given a higher priority in the \nblazar discovery program, as well as for the \nMWL observations of known VHE blazars, par- \nticularly those with hard VHE spectra. \n**5.1. Recent VERITAS Blazar Discoveries**", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0770.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed7_cc4.pdf", + "query": "For which language have been introduced the ActiveInference.jl library ?", + "target_page": 1, + "target_passage": " We introduce a new software package for the Julia programming language, the library ActiveInference.jl.", + "chunk_present": { + "presence": true, + "index": 5 + } + }, + "top_chunk": [ + { + "text": "**3. Using ActiveInference.jl**\n\nIn this section, we provide an overview of the various functions a user will need to \noperate ActiveInference. This includes functionalities for creating POMDP agents, for sim- \nulating behaviour and for fitting the models to data. In the next section, we demonstrate \nhow to use the package on a concrete worked example. ActiveInference is under continual \ndevelopment, and the newest version of the package, including documentation for how to \nuse it, can be found at github.com/ilabcode/ActiveInference.jl. \n\n3.1. Creating and Using a POMDP \n\nThe general structure of ActiveInference.jl is heavily inspired by pymdp [23], \na Python library for implementing simulations of AIF in discrete state spaces. Those \nalready acquainted with pymdp should find the syntax here familiar. ActiveInference \ncan be installed as normal from the official Julia General Registry using the Julia’s native \npackage manager Pkg: \n(cid:7) (cid:4) \n\n**using**Pkg \nPkg . add ( ActiveInference ) \n(cid:6) (cid:5) \n\n\n \n \n \n \n [html]\n
It can then be loaded into the current project environment :
vsing ActiveInference
", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "Article \n**Introducing ActiveInference.jl: A Julia Library for Simulation**\n**and Parameter Estimation with Active Inference Models**\n\n**Samuel William Nehrer 1,†**\n**Christoph Mathys 5**\n\n**, Jonathan Ehrenreich Laursen 1,†** **, Conor Heins 2,3,*** **, Karl Friston 3,4** **,**\n\n**and Peter Thestrup Waade 5**", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "In this paper, we introduce ActiveInference.jl, a new software library for Julia [28] \nthat aims to provide easy-to-use tools for model fitting with AIF models and to introduce \nAIF to the growing community of researchers using Julia for computational psychiatry and \ncognitive modelling. Julia is a free and open-source high-level programming language that \nretains an easy user interface reminiscent of that in MATLAB and Python. Simultaneously, ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "In this section, we outline how to use \nparameter recovery and predictive checks. \nActiveInference for simulation and model fitting in conjunction with ActionModels. In the \nfollowing section, we show how to achieve this on a concrete worked example. \n\n**4. Usage Example**\n\nIn this section, we demonstrate a full usage example of how to create an AIF agent, sim- \nulate behaviour in a classic T-maze environment and fit the AIF agent to a simulated exam- \nple dataset. We provide the necessary code to run this simulation. All code required to repro- \nduce the example simulation can be found in an open source OSF repository osf.io/j3k5q/. \nThis example was performed with the current version of ActiveInference.jl (0.1.1); the \nnewest version can be found at github.com/ilabcode/ActiveInference.jl. \n\n4.1. Setting Up Environment and Agent \n\nA T-maze is a simple task commonly employed in the behavioural sciences, as well \nas in the AIF literature [14,54–57]. It is a minimal type of task that requires balancing \nexploration and exploitation, or epistemic and pragmatic value, respectively. It is also \nsuitably represents in a discrete state space. Together, this makes it easily compatible with \na POMDP-based AIF approach. ", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "25. Gregoretti, F.; Pezzulo, G.; Maisto, D. cpp-AIF: A multi-core C++ implementation of Active Inference for Partially Observable \n\nMarkov Decision Processes. Neurocomputing**2024**, 568, 127065. [CrossRef] \nJosuttis, N.M. The C++ Standard Library: A Tutorial and Reference; Addison-Wesley: Boston, MA, USA, 2012; Google-Books-ID: \n9DEJKhasp7gC. \n\n26. \n\n27. Bagaev, D.; Podusenko, A.; Vries, B.d. RxInfer: A Julia package for reactive real-time Bayesian inference. J. Open Source Softw. \n\n**2023**, 8, 5161. [CrossRef] \n\n28. Bezanson, J.; Karpinski, S.; Shah, V.; Edelman, A. Julia Language Documentation. 2016. Available online: https://readthedocs. \n\norg/projects/julia-wf/downloads/pdf/stable/ (accessed on 26 May 2024). \nvan de Laar, T.W.; de Vries, B. Simulating Active Inference Processes by Message Passing. Front. Robot. AI**2019**, 6, 20. [CrossRef] \n29. \n30. Vanderbroeck, M.; Baioumy, M.; Lans, D.v.d.; Rooij, R.d.; Werf, T.v.d. Active inference for Robot control: A Factor Graph ", + "page_start": 30, + "page_end": 30, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "1 \n\nSchool of Culture and Communication, Aarhus University, 8000 Aarhus, Denmark; \n202204724@post.au.dk (S.W.N.); 202204836@post.au.dk (J.E.L.) \n\n2 Department of Collective Behaviour, Max Planck Institute of Animal Behavior, D-78457 Konstanz, Germany \n3 VERSES Research Lab., Los Angeles, CA 90016, USA; k.friston@ucl.ac.uk \n4 Queen Square Institute of Neurology, University College London, London WC1N 3BG, UK \n5 \n\nInteracting Minds Centre, Aarhus University, 8000 Aarhus, Denmark; chmathys@cas.au.dk (C.M.); \nptw@cas.au.dk (P.T.W.) \n\n** ***Correspondence: cheins@ab.mpg.de \n† \nThese authors contributed equally to this work. \n\n**Abstract:**We introduce a new software package for the Julia programming language, \nthe library ActiveInference.jl. To make active inference agents with Partially Ob- \nservable Markov Decision Process (POMDP) generative models available to the grow- \ning research community using Julia, we re-implemented the pymdp library for Python. \nActiveInference.jl is compatible with cutting-edge Julia libraries designed for cognitive \nand behavioural modelling, as it is used in computational psychiatry, cognitive science \nand neuroscience. This means that POMDP active inference models can now be easily \nfit to empirically observed behaviour using sampling, as well as variational methods. In \nthis article, we show how ActiveInference.jl makes building POMDP active inference \nmodels straightforward, and how it enables researchers to use them for simulation, as well \nas fitting them to data or performing a model comparison. ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "In the next section, we provide a conceptual and formal introduction to AIF, particu- \nlarly in the context of using POMDP generative models. In Section 3, we demonstrate how \nto use the package in practice, both for simulation and parameter estimation. In Section 4, \nwe give a fully worked example of how ActiveInference can be used with a concrete \nsimulated dataset. Finally, we discuss potential applications and future directions for \ndeveloping the package. ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "Julia uses its “just-in-time” (JIT) compilations via the LLVM framework to approach the \nspeed of languages like C without relying on external compilers [36]. Julia is also natively \nauto-differentiable, which means it can solve what is called the two-language problem \n(i.e., that high-level languages often have to rely on lower-level languages, either for \nperformance or for auto-differentiability; this is the case with standard tools for cognitive \nmodelling, where languages like R [37] must rely on external languages like STAN [38] for \nBayesian model fitting). This means that ActiveInference, in conjunction with Turing [39], \nJulia’s powerful library for Bayesian model fitting, and its newly developed extension for \nbehavioural modelling, ActionModels, makes it possible to use cutting-edge Markov Chain \nMonte Carlo [40] methods, as well as variational methods [35], for Bayesian model fitting \nwith AIF. Crucially, this allows researchers to not only simulate AIF in a fast programming \nlanguage, but to also fit them to empirical behaviour, as is performed in cognitive modelling \nand computational psychiatry. Importantly, this also places AIF models in an ecosystem \nof other models for computational psychiatry so that it can easily be compared with \nmodels, like Hierarchical Gaussian Filters [41], and reinforcement learning models, like the \nclassic Rescorla–Wagner model [42]. As part of making ActiveInference.jl available to the \nscientific community, and to the larger software ecosystem within computational psychiatry, \nit is implemented as part of the Translational Algorithms for Psychiatry-Advancing Science \n(TAPAS) ecosystem [43]. ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "There are many ways in which ActiveInference can be improved. It would be useful \nto extend the set of dynamic belief states to include prediction errors since they are often \nused for model-based neuroscience. This would entail departing from discrete state-space \n(i.e., POMDP) models to consider continuous state-space models apt for Bayesian filtering \nor predictive coding (see below). An alternative would be to generate prediction errors \nfrom belief updating under discrete models, where prediction errors can be read as the \n(KL) divergence between posterior and prior beliefs (i.e., complexity or information gain). \nA simple interface could be added for creating custom parametrisations of the requisite \nparameters that could be parametrised with Boltzmann or Gibbs distributions, as opposed \nto Dirichlet distributions. Parameter learning could be extended to all generative model \nparameters, as well as in parametrised forms (e.g., so that the Boltzmann parameter or \ntemperature of the parameters that are learned); similarly for the precision over expected \nfree energies*γ*. Preference priors should also be implementable for environmental states, \nin addition to observations, and**A**can be made action dependent. ", + "page_start": 28, + "page_end": 28, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "[CrossRef] \n\n36. Lattner, C.; Adve, V. LLVM: A compilation framework for lifelong program analysis & transformation. \n\nIn Proceedings of \nthe International Symposium on Code Generation and Optimization, 2004, CGO 2004, Palo Alto, CA, USA, 20–24 March 2004; \npp. 75–86. [CrossRef] \n\n37. R Core Team. R: A Language and Environment for Statistical Computing; R Foundation for Statistical Computing: Vienna, Austria, \n\n2021. \n\n38. Carpenter, B.; Gelman, A.; Hoffman, M.D.; Lee, D.; Goodrich, B.; Betancourt, M.; Brubaker, M.; Guo, J.; Li, P.; Riddell, A. Stan: A \n\nProbabilistic Programming Language. J. Stat. Softw.**2017**, 76, 1–32. [CrossRef] [PubMed] \n\n39. Ge, H.; Xu, K.; Ghahramani, Z. Turing: A Language for Flexible Probabilistic Inference. In Proceedings of the Twenty-First \nInternational Conference on Artificial Intelligence and Statistics (PMLR), Playa Blanca, Lanzarote, 9–11 April 2018; pp. 1682–1690. \nISSN: 2640-3498. \n\n40. Hoffman, M.D.; Gelman, A. The No-U-Turn Sampler: Adaptively Setting Path Lengths in Hamiltonian Monte Carlo. \n2014. Available online: https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://jmlr.org/ \npapers/volume15/hoffman14a/hoffman14a.pdf&ved=2ahUKEwjPzP32seCKAxXLENAFHRziJ-0QFnoECBcQAQ&usg= \nAOvVaw3adSH1tmvDJ1-6CEuitKet (accessed on 17 May 2024). \n\n41. Mathys, C.; Weber, L. Hierarchical Gaussian Filtering of Sufficient Statistic Time Series for Active Inference. In Active Inference; \nVerbelen, T., Lanillos, P., Buckley, C.L., De Boom, C., Eds.; Communications in Computer and Information Science; Springer: \nCham, Switzerland, 2020; pp. 52–58. [CrossRef] \n\n42. Rescorla, R.A. A theory of Pavlovian conditioning: Variations in the effectiveness of reinforcement and non-reinforcement. Class. ", + "page_start": 30, + "page_end": 30, + "source_file": "pubmed7_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed7_cc4.pdf", + "query": "To which system does the AIF apply ?", + "target_page": 2, + "target_passage": "AIF was argued to be applicable to any self organising system that actively maintains a stable boundary that defines its integrity [10], a broad category that includes cells and plants [11], as well as humans [2] and even collectives [12].", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "(cid:4) \n\n(cid:5) \n\nCentral to the package is the AIF object. This is a structure containing all the components of \nthe generative model, as well as the dynamic belief states and the various settings needed to \nperform AIF, and is used in conjunction with most of the high-level functions of the package. \nAn AIF object can be created with the init_aif function, which takes as arguments the \ncomponents of the generative model and a dictionary of various settings and parameters: ", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "**A**and**B**are the only mandatory arguments to the init_aif function—the other arguments \nare keyword arguments that default to uniform priors.**A**,**B**,**C**,**D**and**E**and their corre- \nsponding Dirichlet priors, in the cases of**A**,**B**and**D**, should be formatted as standard \narray objects. All but**E**can have multiple modalities/factors (see Section 4), so they should \nbe formatted as vectors of arrays with one array per modality/factor. These arrays can be \nhand-specified by the user, or be generated with some of the helper functions supplied by \nActiveInference. Here, we create an AIF agent equipped with a generative model with \nsix environmental states, five possible observations and two possible actions. Here, we use \nhelper functions to create matrices and vectors with the correct dimensions; in Section 4, we \ncreate them manually. First, we define the number of states, observations, controls and the \nlength of policies: \n(cid:7) (cid:4) \n\n# Information about number of states , observations , actions and policy length \nstates \nobservations = [5] # Five observations , single modality \ncontrols \npolicy_length = 1 ", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "2008 \n\nAIFRS \n\n 375 \n 2,507 \n 6.7 \n 977 \n 2,474 \n 1.1 \n 6.8 \n88.4% \n 74,137 \n 232,039 ", + "page_start": 8, + "page_end": 8, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "2008 \n\nAIFRS \n\n 375 \n 2,507 \n 6.7 \n 977 \n 2,474 \n 1.1 \n 6.8 \n88.4% \n 74,137 \n 232,039 ", + "page_start": 7, + "page_end": 7, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "2007 \n\nAIFRS \n\n 546 \n 4,390 \n 8.0 \n 1,523 \n 2,405 \n 1.2 \n 9.2 \n90.0% \n 85,994 \n 290,897 ", + "page_start": 8, + "page_end": 8, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "2007 \n\nAIFRS \n\n 546 \n 4,390 \n 8.0 \n 1,523 \n 2,405 \n 1.2 \n 9.2 \n90.0% \n 85,994 \n 290,897 ", + "page_start": 7, + "page_end": 7, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "2010 \n\nAIFRS \n\n 2,699 \n 6,432 \n 2.4 \n 6,583 \n 2,705 \n 1.7 \n 14.9 \n90.4% \n 132,628 \n 549,522 ", + "page_start": 8, + "page_end": 8, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "**35. Australian Equivalents to International Financial Reporting Standards (continued)**\n\n\n \n \n \n \n [html]( a ) the rights to tenure of the area of interest are current ; and\n
35. Australian Equivalents to International Financial Reporting Standards ( continued )Deferred tax assets and liabilities
Selferred toas assets and failsfittles will generally be lased on the differences between the accounting and tax basis of assets and liabilities under the “ balance sheet ” approach which will result in the recognition of additional defoDefined benefit superannuation surplus and deficits
Serfined benefit superariouslion plan surpluses and deficits will be recognised in the statement of froncial position and the changes in these values section prind will be recognised either directly in the statement of francial perforRestoration liabilities
Restraration failsfitties will be discounted to present value and capitalised as a component part of caphalised explaintion and development expenditue and property, plat and engagement. The supplicied cased to be amonities over therFunctional currency
The majority of the controlled entities within the Sarios Source, that have periplex operations in framigr juritafictions will howe the IS didar as their facetoral currency. The first time application of A - FRS wills result in the net astEquity - based payments
Under A - DRS the cost of employee remuneration provided in the from of equity - based remuneration ( including shares and options ) will be measured based on the for value of those instruments and amortised to the profit and loss over the vestExploration and evaluation expenditure
There is no litterational frastrict life porticipation ( TRT ) within comprehensively deads with the accounting and reporting toures perforch is the estactive initiative, bit the absence of such as midsty - based STRL comparison, spentPrescription of a competencive project on accounting for extractive inductive, AMSA Toperation for and fundarition of Meness Breassescribed was local to Stronder ( 06 ho focilitate the introduction of AISS in expect of the treatment of
( b ) at least one of the following conditions is also met :
( i ) the explanation and evaluation expenditures are expected to be recruped through successful development and explaintation of the area of interest, or alternatively, by its sale ; or
( ii ) exploration and evaluation activities in the area of inferest have not at the reporting date eached a stage which permits a reasonable assessment of the existence or otherwise of economically recoverable reserves, and active and si
The UASB decided that the effective date of 3 RRS 6 to be 1. January 2006 to allow affected componies more time to make the transition to DRS. Despite the lateness of the issuence of the Australian equivalent accounting standard AASB I, Santo
Santas is currently evaluating this accounting standard and its accounting policy for exploration and evaluation expenditure. At the date of this report, roo decision has been made as to how the Santas Group will account for exploratiou
Impairment
Techniq of non - cometic aure, for inspirament will be undertake on the ondolog structing of sustra presenting cash flows, salid cash generating units, filleness for experience them is an indication for a case generatrity unit is requiri
The AABB and LKBI twe significant snoping projects including a comprehensive “ Sotactive Snductive Smokpect that could affect the differences between current Australian SAAP and A - DRS as described above and could further irrepact the
", + "page_start": 88, + "page_end": 88, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "2005 \n\nAIFRS \n\n 588 \n 4,915 \n 8.4 \n 1,521 \n 1,829 \n 2.4 \n 13.0 \n90.8% \n 126,550 \n 353,275 ", + "page_start": 8, + "page_end": 8, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "2005 \n\nAIFRS \n\n 588 \n 4,915 \n 8.4 \n 1,521 \n 1,829 \n 2.4 \n 13.0 \n90.8% \n 126,550 \n 353,275 ", + "page_start": 7, + "page_end": 7, + "source_file": "ASX_KCN_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed7_cc4.pdf", + "query": "What is the definition of POMDP ?", + "target_page": 4, + "target_passage": " The Partially Observable Markov Decision Process is a type of flexible generative model that is widely used in the AIF literature. In discrete time and usually a discrete state space, this model type is parametrised to fit a given task by a set matrices containing probability distributions.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "2.1. POMDPs in Active Inference \n\nIn AIF, the POMDP is one of the most common families of generative models used \nto make inferences about the environment. It is a Markovian discrete state-space model, \nwhere employing it means representing the environment and observations as inhabiting \none among a set of possible (possibly multidimensional) states, and that the changes \nin these states can only depend on the system’s previous state and the agent’s actions. \nEnvironmental states are not directly observable, so they have to be inferred based on \nincoming sensory observations. In AIF for POMDPs and other generative models in general, \nboth perception and action are cast as Bayesian inferences (see Sections 2.2 and 2.3), as well \nas the learning of parameters of the generative model (see Section 2.4). Crucially, an agent’s \ngenerative model does not a priori have to be isomorphic to the true environment (i.e., \nthe data-generating process), although this will generally lead to a successful inference, \nand that the generative model will therefore often come to resemble the environment \nthrough learning. \n\nA discrete state-space POMDP in AIF is conventionally defined by five main sets of \nparameters:**A**,**B**,**C**,**D**and**E**[1,33], see Figure 1. Together, these parametrise the agent’s \nprior beliefs about the prior probability of different states in the environment, how states \nof the environment change and how they generate observations. Typically, they will be \nvectors, matrices or tensors; however, henceforth we denote them by their corresponding \nletter in bold. These make up the components needed for the agent to perform AIF. ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "**Figure 1.**Depiction of a POMDP generative model. This encodes the agent’s expectations about how \nthe state s of the environment changes over time t, and how it generates observation o at each time step. \n**A**, also called the observation model, describes how environmental states give rise to observations.**B**, \nalso called the transition model, describes how environmental states change over time, depending on \naction u (called policy*π*when structured into sequences).**C**is the preference prior, which encodes \nthe agent’s preferences for observations. This shapes the expected free energy G associated with each \npolicy, which is used for policy selection.**D**encodes the agent’s prior belief over environmental states \nbefore making any observations, and**E**is the prior over policies that determines the agent’s preferences \nfor policies in the absence of other motivation. ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "A library of pre-made canonical POMDP models could be created so that users can eas- \nily implement them directly. Alternatives to the fixed-point iteration method for updating \nposteriors over environmental states could be included, like the marginal message passing \nalgorithm. There are various ways in which the package can be made more computationally \nefficient, and it could be compared with other software implementations. There are plenty \nof utility and plotting functions that could be added to the package to make it easier to \nuse and to facilitate integration with the model-fitting packages it relies on; for example, \nto allow for combining the models with linear regressions to compare parameters values \nof different populations in a single model. More complex types of POMDP models can \nalso be added, like hierarchical and temporally deep POMDPs. Model structure learning \ncould be considered, where different model structures are compared and chosen between \nby evaluating their free energies. Sophisticated inference, where predictions are also made \nabout changes in one’s own beliefs—depending on expected action-dependent observations \nin the future—could also be implemented [58]. Finally, the package could be extended to \nother types of generative models than POMDPs, including other universal models, like \ngeneralised filtering [17] and Hierarchical Gaussian Filter models [41], as well as custom ", + "page_start": 28, + "page_end": 28, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "In the next section, we provide a conceptual and formal introduction to AIF, particu- \nlarly in the context of using POMDP generative models. In Section 3, we demonstrate how \nto use the package in practice, both for simulation and parameter estimation. In Section 4, \nwe give a fully worked example of how ActiveInference can be used with a concrete \nsimulated dataset. Finally, we discuss potential applications and future directions for \ndeveloping the package. ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "q( ˜s|*π*)[H(p( ˜o| ˜s))] \n(cid:125) \n(cid:123)(cid:122) \nExpected ambiguity \n+ DKL[q( ˜o|*π*)∥p( ˜o|C)] \n(cid:125) \n(cid:123)(cid:122) \nRisk (outcomes) \n(cid:124) \n\nHere, the first term on the right-hand side captures the expected entropy, or uncertainty, \nof the outcomes given the environmental states. Minimising this quantity ensures that \nthe agent will seek states where observations can most clearly be used to distinguish \nbetween environmental states. The second term is the KL divergence of the expected \nobservations from preferred observations, capturing the risk of making unwanted (i.e., a \npriori surprising) observations, which is also minimised by minimising the EFE. \n\n2.4. Learning in Active Inference \n\nIn AIF, the parameters of the generative model can also be updated via Bayesian-belief- \nupdating methods, a process called “parameter learning” or sometimes just “learning” [2]. \nIn general, this is performed by introducing belief distributions over the possible values \nof the parameters that are subject to learning, and updating this distribution for each \nobservation using Bayesian belief updating. This additionally implies introducing priors \non the belief distributions. Depending on the type of generative model used, the belief \ndistributions and their priors will take different forms, and so will their update equations. \nIn the following, we demonstrate parameter learning specifically in the context of POMDPs. \nThe parameters that are subject to learning in POMDPs are usually the entries in the \nfive matrices. Since the matrices consist of categorical probability distributions, it is natural \nto use Dirichlet distributions—distributions over categorical probability distributions—as \nbelief distributions over their values [33,52]. Beliefs about each probability distribution ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "**2. Active Inference with POMDPs**\n\nIn this section, we briefly describe the core concepts of AIF and POMDPs. This \nshould familiarise the reader with the vernacular used in the later sections regarding \nthe functionalities of the package. While various extensions, such as structure learning, \nwhich enables an agent to learn the structure or shape of its environment through model \ncomparison [44–47], or hierarchical and temporally deep POMDPs [48,49], are relevant for \nfuture work, describing these in detail is beyond the scope of this foundational paper. \n\nAt the core of AIF lies the minimisation of a variational free energy upper bound on \nsurprise for perception, as well as action. This is motivated by the free energy principle [4–8], \nwhich states that self-organising systems can be described as minimising the variational \nfree energy of their sensory states. The minimisation of free energy generally takes two ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "Tools for simulating POMDP-AIF models were originally developed as part of the \nDEM [20] library for MATLAB [21] (part of the larger SPM library [22]). Since then, a \nmodal and flexible software package pymdp [23] was created for Python [24], as well as a \nperformance-oriented package cpp-AIF [25] for C++ [26] that can be used across platforms. \nFinally, the factor graph library RxInfer [27] for Julia [28] has also been used to implement \nsome AIF models on an efficient factor graph back-end [29–31]. The important tools \nthat these packages provide make AIF available for researchers to perform simulation \nstudies and for use in engineering contexts. They do not, however, usually allow for \nfitting models to empirically observed data, which is a fundamental method used in \ncognitive modelling [32], often in the context of computational psychiatry [13], to infer the \nmechanisms underlying variations in behaviour or to investigate the differences between \n(for example, clinical) populations. Smith and colleagues [33] provided a guide for manually \ndoing variational Bayesian parameter estimation based on empirical data, but only in \nMATLAB and restricted to a particular class of variational parameter estimation methods \n(variational Laplace), instead of the sampling-based methods that currently predominate in \nthe field of cognitive modelling [34,35]. ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "In addition to the five matrices, there are several hyper-parameters that are not part \nof the generative model, but are part of the inference algorithm. Here, we include two of \nthe most common: the*γ*and*α*(inverse) temperature parameters.*γ*, the precision over \npolicies, is the inverse temperature of a softmax transformation of expected free energies \nover policies, which is covered later in this section. After policies have been selected for a \ngiven time step, they are marginalised to calculate the probabilities of taking each possible \naction in the next time step.*α*, the action precision, is the inverse temperature of a softmax \ntransformation on these final action probabilities, with higher values resulting in more \nstochastic action selection. \n\nAs noted, here we focus specifically on the POMDP-based generative models often \nused in the AIF literature. However, the basic steps when performing AIF—perception, \naction and learning—remain the same across generative models. In the remainder of this \nsection, we describe each of these three steps in turn. ", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "**Keywords:**active inference; free energy principle; predictive processing; Markov decision \nprocess; cognitive modelling; Julia \nAcademic Editor: Astero Provata \n\n**PACS:**87.15.Aa Received: 25 October 2024 \nRevised: 2 January 2025 \nAccepted: 7 January 2025 ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "Θ is then described by a Dirichlet distribution parametrised by a set of concentration \nparameters*θ*: \n\np(Θ) = Dir(Θ|*θ*) (19) \n\nThe concentration parameter of a Dirichlet distribution is essentially a non-negative count \nof how many times the given category (be it a type of observation or state transition) has \noccurred. The distribution of concentration parameter counts will determine the shape \nof the estimated categorical probability distribution, while the scale of the concentration \nparameters will determine the certainty per precision of the belief. Updating beliefs about \nΘ (the parameters in the matrices) then corresponds to updating these concentration \nparameters*θ*with the following update equation: \n\n*θ*t+1 =*ω*∗*θ*t +*η*∗*χ*t \n(20) \n\nThe updated value for the concentration parameter (*θ*t+1) is found by adding the previous \nconcentration parameter*θ*t multiplied by a forgetting rate*ω*to the observed data count \n*χ*(either the observation in the case of**A**learning, or the inferred state or state transition \nfor other matrices) multiplied by a learning rate*η*. With this relatively simple update \nequation—which, in essence, amounts to just counting the occurrences of categories—an \nAIF agent can update its beliefs about the various matrices it uses to make inferences about \nenvironmental states. For more details on parameter learning with POMDPs, see [23,33,52]. ", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed7_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed6_cc4.pdf", + "query": "What is dyspnea ?", + "target_page": 2, + "target_passage": "Dyspnea refers to a subjective sensation of breathing discomfort.", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "prevalence of dyspnea in the adult general population \nacross 11 studies was estimated to be 10%. Dyspnea can \narise from a broad spectrum of underlying factors, \nincluding both respiratory and nonrespiratory \nconditions. Studies have revealed that dyspnea is not \nsolely attributable to respiratory conditions but is also \nheavily influenced by cardiovascular deconditioning and \nby nonrespiratory factors, including psychosocial, social, \nand environmental determinants.5,6 ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Dyspnea is a prevalent symptom with consequences that \nextend beyond its physiologic implications. A study in \nEuropean patients with COPD explored the burden of \ndyspnea and identified potential correlates. The study \nrevealed that higher dyspnea impact correlated with \nlower health-related quality of life, increased work \nimpairment, and a higher frequency of emergency \ndepartment visits.7 \n\nDyspnea refers to a subjective sensation of breathing \ndiscomfort.1 In a study involving a community-based \npopulation aged > 70 years, the prevalence of dyspnea \nwas found to be 32%.2 Dyspnea can lead to limitations in \ndaily activities, reduced exercise tolerance, and \nheightened mortality risks.3 \n\nThe three objectives of our study were as follows: (1) to \nevaluate the impact of dyspnea in adults from the \ngeneral population who had no prior diagnosis of \nrespiratory disease but who reported having significant \nrespiratory symptoms in the past 6 months; (2) to \nidentify associated risk factors for dyspnea and estimate \ntheir influence on the symptom; and (3) to explore the \nrelationship between dyspnea and health care utilization, \nquality of life, and work productivity in adults with \nundiagnosed respiratory symptoms. ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "BACKGROUND: We investigated dyspnea; its associated risk factors; and its impact on health \ncare utilization, quality of life, and work productivity in adults with undiagnosed respiratory \nsymptoms. \n\nRESEARCH QUESTION: What is the impact of dyspnea in adults with undiagnosed respiratory \nsymptoms? ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Impact of Dyspnea on Adults With \nRespiratory Symptoms Without a Defined \nDiagnosis \n\nJared Bierbrier, BSc; Emily Gerstein; George A. Whitmore, PhD; Katherine L. Vandemheen, MScN; Celine Bergeron, MD; \n\nLouis-Philippe Boulet, MD; Andreanne Cote, MD; Stephen K. Field, MD; Erika Penz, MD; R. Andrew McIvor, MD; \n\nCatherine Lemière, MD; Samir Gupta, MD; Paul Hernandez, MD; Irvin Mayers, MD; Mohit Bhutani, MD; \n\nM. Diane Lougheed, MD; Christopher J. Licskai, MD; Tanweer Azher, MD; Nicole Ezer, MD; Martha Ainslie, MD; \n\nGonzalo G. Alvarez, MD; Sunita Mulpuru, MD; and Shawn D. Aaron, MD ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Dyspnea was severe and prevalent within our study \ngroup; however, it remained undiagnosed. A study \nconducted by Stefan et al32 revealed that physicians \nunderestimated their patients’ dyspnea 37.9% of the \ntime, whereas nurses underestimated it 3.5% of the time. \nMoreover, many patients limit their physical activities, \nwhich lead them to downplay the extent of their \ndyspnea.19 Patient underreporting of symptoms, coupled \n\nFunding/Support \nThis study is supported by the Canadian Institutes of \nHealth Research [FDN Grant 154322]. \n\nFinancial/Nonfinancial Disclosures \nNone declared. ", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "After adjusting for age, sex, and BMI, dyspnea was \nnegatively associated with all domains of quality of life, \nincluding physical functioning (coefficient, (cid:3)0.655; \nP < .001), role limitations due to physical health \n(coefficient, (cid:3)0.628; P < .001), general health \n(coefficient, (cid:3)0.382; P < .001), and total score \n(coefficient, (cid:3)0.473; P < .001) (Table 7). ", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
5. Nishino T. Dyspnoea : underlying mechanisms and treatment. Br J. Anaesth. 2011 ; 106 : 463 – 474.16Jones PW. St George ' s Respiratory Questionnaire : MCID. J Chronic Obstr Pulm Dis 2005 ; 2 : 75 - 79.assessed through inspiratory resistive loading. 1 Bras Pneumol. 2015 ; 41 ( 2 ): 143 - 150.6. Neder J, Berton D, Miller P, et al. Ventilatory inefficiency and exertional dyspnea in early chronic obstructive pulmonary disease. Am Thorac Snc. 2017.141 suppl_1322 - 529.
17.Global Initiative for Asthma. Global strategy for asthma management and prevention. Global Initiative for Asthma website. Accessed July 30.2023. https :// ginasthma. org / wp - content / upkoads / 2023 / 07 / GJNA - 2023 - Full - report - 21825Elatrim X, Bornefalk H, Skidid M, et al. Validation of the Swedish Multidimensional Dyspnea Profile ( MDP ) in outpatients with cardiorespiratory disease. BNJ Upen Respor Kes. 2019 / 8 : e00038.7. Groenberger [ 8, Vetri I, Keininger DL, Malker DA, Greater dyspnea is associated with lower bealth - related quality of life umong European patients with COPD. Int J Ornor Obstruct Psomon Dn. 2617.12.937.544,18.
Global Initiative for Chronic Obstructive Ling Disease, Gender, Global intrahigh for the Controlled Chronic obstructive pulmonary disease. Global Initiative for Chronic Obstructive Lung Disease website. Accessed July 30, Lung Din26Yorke J, Russell AM, Swigris I, et al. Assessment of dyspnea in asthma : validation of Tbe Dyspnea - 12. J Aribma : 2011 ; 48 ( 6 ): 602 - 608.8. Pretensti M, Whitnore GA, Vandembeen KL, et al. Population - based case - finding to identify subjects with undiagnosed asthma or COPD. Eae Ropir J. 2020 : 55 : 2000024.Table2023. https :// goldcopd. org / wp - content / uploods / 2023 / 03 / GOLD - 2023 - ver - 1.5 - 17Feb2023_WMV gdf
Tablehyperresponsiveness in subjects with respiratory symptoms and normal spirometry. Eur Respir 1.20123 ; 61 ( 3 ): 2201194.19.Magner KMA, Cherian M, Whitmore GA, et al. Assessment of preserved ratio impaired spirometry ( PRISm ) vsing pre and post bronchodilator spirometry in a randomly - sempled symptomatic cohort, Ass J Rusp Crii Case Med. 20220810 ): 1125 - 11328Gentein E, Bierbrier 1, Whitmore GA, et al. Impact of undiagnosed chronic obstructive pulmonary disease and asthma on symptoms, quality of life, healthcare use, and work productivity. And J Respir Crit Care Mair 2023.200012 ; 1271 - 1282
validation of the UCAP - Q case - trnding questionnaire to detect undiagnosed asthma and COPD. Esr Respir J.20.Hanania NA, O ' Donnell DE. Activity - related dyspnea in chronic obstructive29Asron SD, Vandembeen K, Whitmore GA, et al. Early diagnosis and treatment of COPD and asthma : a randomized, controlled trial. N Engl. J Med. 2024.390 ( 22 ): 2061 – 2073.0. Shin B, Cole SL, Park SJ, et al. A new symptom - based questionnaire for predicting the presence of asthma.
Tablerelated dyspnea in chronic obstructive pulmonary disease : physical and poychological consequences, unmet needs, and foture directions. Int II Glion Obstruct Pabnor Dis. 2019.14 : 1127 - 113RTableJ Investig Allergol Clin Immunol. 2010 ; 20 : 27 - 34. briva. nto. timbalwas TV : Norbdom B111. Price DB, Tinkelman DG, Nordyke RJ, et al. Scoring system and clinicalReilly Associates. WPAI scoring. Reilly Associates website. Accessed May 1.2024. http :// www. reillyassociates. net / wpai_scoring. html
Tablepersons with symptoms and preserved lung function. N Engl J Med. 2022 ; 387 ( 13 ): 1173 - 1184.application of COPD diagnostic questionnaires. Chest. 2006 ; 129 : 1531 - 1539.12. Price DB, Tinkelman DG, Halbert RJ,Carben HK, Haga SL, Olsson D, et al. Birch pollen, air pollution and their interactive effects on airway symptoms and peak expiratory flow in allergic asthma during pollen season – a panel study in Northern and Southern Sweden. Environ Hen31
Marott [ L, Ingebrigtsen T5, Colak Y, et al. Impact of the metabolic syndrome on cardiopulmonary morbidity and mortality in individuals with lung function impairment : a prospective cohort study of the Dunth general population. Level ReRespiration. 2006 ; 73 : 285 - 295.13. Jones PW, Harding G, Berry P, et al.TableLeft - find - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - sex - se32
Stehn Mb, Prya A, Martin B, et al. How well do patients and providers agree on the severity of dyspnoa? J Hosp Med. 2016.110 ). 701 - 707.2009 ; 34 : 648 - 654.23Ekstrom M, Johannessen A, Abramson MJ, et al. Breathlessness across generations : results from the RHINESSAJones PW. Quality of life measurement for patients with diseases of the airways. Thorax. 1991 ;# 6 : 676 - 682.33
Cherian M, Magner KMA, Whitmore GA, et al. Patient and physician factors associated with symptomatic undiagnosed asthma or COPD. Ewr Respir J. 2023.61 ( 2 ):I5. Jones PW, Quirk FH, Baveystock CM. The24Ziegler B, Femandes AK, Sanches PR, Konnen GI, Dalcin Pde T. Variability of dyspnea perception in healthy subjects
", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "After adjusting for age, sex, and BMI, dyspnea was \nassociated with a reduced likelihood of current \nemployment (OR, 0.993; P < .001), increased \nabsenteeism (coefficient, 0.066; P < .001), increased \npresenteeism (coefficient, 0.349; P < .001), higher work \n\nDiscussion \nOur study explored dyspnea in community-based adults \nwith undiagnosed respiratory symptoms identified via \ncase finding. Surprisingly, we found that the dyspnea \nexperienced by those with PRISm had a greater impact \non their activities and health status than those with \nnewly diagnosed COPD or asthma. \nTABLE 5 ] Dyspnea Regressed on Spirometry Disease \nGroup \n\nThe prevalence of individuals who were obese and \nmorbidly obese in the PRISm group partially explains \nthe between-group difference in dyspnea. The excess \ndyspnea seen in the PRISm group when compared with \nthe normal spirometry group is partly explained by \npatient-specific risk factors, including BMI, which \nshrink the mean dyspnea differential between the groups \nfrom 11.2 to 5.5 points (Tables 3-6). The remaining 5.5- \npoint difference indicates that PRISm patients have \nexcess dyspnea relative to symptomatic individuals with \nnormal spirometry for additional reasons other than \nobesity. ", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "(eg, climate, air quality/industrialization, socioeconomic \nstatus) of the catchment population tend to vary across \nstudy sites. \n\nApproximately 65% of the variability in dyspnea \nremained unexplained by the factors examined in our \nstudy. Most individuals in our study showed normal \nspirometry results but still carried a substantial \nburden of dyspnea, an inconsistency that needs \nexplanation. Several factors not included in our \nanalysis may have contributed to the unexplained \nvariation. Environmental factors (eg, air pollution, \nallergen exposure, seasonal variations in symptoms) \nare potential contributors to this unexplained \nvariability.22 Genetic predispositions could also play a \nsignificant role, as suggested by a study that revealed \nthat parents with dyspnea were 1.8 times more likely \nto have offspring with dyspnea.23 Additionally, fitness \ncould be a contributing factor, especially in \nindividuals with undiagnosed PRISm, asthma, or \nCOPD who may restrict their activities to avoid \ndyspnea, and hence become deconditioned.6 \n\nDyspnea is a complex, subjective symptom that is \nmodified by nonrespiratory factors including \npsychosocial, social, and environmental influences.5 \nInterindividual variability in the perception of dyspnea, \ninfluenced by these nonrespiratory factors, may play an \nimportant role. A study conducted by Ziegler et al24 \nassessed the perception of dyspnea in 42 healthy \nindividuals using a standardized inspiratory resistive \nloading stimulus. The study used the modified Borg \nscale to measure dyspnea perception levels. Among the \nparticipants subjected to the same inspiratory resistive \nload, 31%, 45%, and 24% of participants classified their \nlevel of dyspnea as low, intermediate, and high, \nrespectively. The study revealed that differences between \nindividuals contribute considerable variability to the \nperception of dyspnea, even among healthy participants. ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "outpatients with cardiorespiratory disease25 and the \nDyspnea-12 in patients with asthma26 and found that \nthe affective aspect of dyspnea can significantly influence \nthe impact of dyspnea on health status, irrespective of \nthe intensity of breathlessness. \n\nand validated respiratory health questionnaires, and \nour dyspnea assessment measure is a weighted average \nof responses to these validated questions. \nConsequently, the measure has an immediate \ninterpretation in terms of the lived day-to-day \nexperience of individuals. \n\nIn those with PRISm, there was a strong, positive \nassociation between higher values for the FEV1/FVC \nratio and dyspnea. For the PRISm group, a higher \nFEV1/FVC ratio may reflect diminished lung \ncompliance due to interstitial lung disease and/or \nrespiratory system restriction due to obesity, which \ncould contribute to worse dyspnea. Conversely, the \nassociation of dyspnea with the FEV1/FVC ratio was in \nthe opposite direction for those with asthma or COPD, \nand a lower FEV1/FVC ratio correlated with worse \ndyspnea, as expected. ", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed6_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed6_cc4.pdf", + "query": "What are the criterion to be control patient in the dyspnea study ?", + "target_page": 3, + "target_passage": "Control patients reported no respiratory symptoms in the preceding 6 months and obtained a score of 0 on the ASQ.", + "chunk_present": { + "presence": true, + "index": 5 + } + }, + "top_chunk": [ + { + "text": "There were significant but modest differences in mean \ndyspnea levels across the 17 study sites (data not \nshown), which are not explained by the risk factors we \naccounted for in our study. This finding is not surprising \nbecause some of the potential contributing factors \npreviously mentioned and other site-specific factors \nThe affective dimension of dyspnea can be captured \nusing additional questionnaires (eg, Multidimensional \nDyspnea Profile, Dyspnea-12). Studies have explored the \nuse of the Multidimensional Dyspnea Profile in \n\nTABLE 7 ] Unadjusted and Adjusted Dyspnea Associations With Quality of Life (SF-36) ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Dyspnea not only affects individuals with diagnosed \nrespiratory conditions but also poses a significant \nburden on those with undiagnosed conditions. In a \nsystematic review by Müller et al,4 the combined \n\nStudy Design and Methods \nRecruitment of Undiagnosed Cases and Healthy \nControl Patients \nBetween June 2017 and January 2023, adults aged $ 18 \nyears were recruited through a two-step process into the \nUndiagnosed COPD and Asthma Population (UCAP) \nstudy, a multicenter case finding study. Approval for \n\nthe study was obtained from the research ethics boards \nof \nthe 17 participating study sites across Canada. \nInformed, written consent was provided by all study \nparticipants. \n\nBoth landlines and cellphones within a 90-minute radius \nof any of the 17 study sites were dialed randomly. A ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Risk Factors Associated With Dyspnea \nPatient-related risk factors were considered first, and re- \nsults of spirometry considered afterward. The spirom- \netry risk factors chosen for the second stage analysis \nincluded the spirometry-based diagnosis of the patient \n(asthma, COPD, PRISm, or normal) and lung function \nresults indicative of the severity of physiologic impair- \nment. Severity was gauged by assessing three principal \nlung function measures: (1) post-BD FEV1 % predicted, \n(2) post-BD FEV1/FVC ratio, and (3) percentage \nreversal of FEV1 with BD. \n\nindicate greater impairment in work productivity and \ndaily activities. \n\nStatistical Analysis \n\nBox plots were used to compare distribution patterns of \ndyspnea impact assessments among the disease groups. \nPairwise comparison tests were conducted to evaluate \nmean dyspnea differences between groups. Multiple \nlinear regression analysis was used to measure contribu- \ntions to variability of dyspnea by selected patient-specific \nrisk factors, spirometry disease classification, and key \nlung function measures. The selected sets of risk factors \nwere evaluated using successive regression analyses. \nAnalysis of variance sums of squares from the successive \nregression analyses provided the cumulative percentage \ncontributions to variability of dyspnea. Simple, multiple, \nand logistic regression analyses were used to study asso- \nciations between dyspnea and health care utilization, \nquality of life, and work productivity outcomes. All sta- \ntistical analyses were done using STATA 16 statistical \nsoftware (StataCorp). ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "classification accounted for 12% of the total variability \nof dyspnea. \n\nexposure in an array of risky occupations. These risk \nfactors, taken as a whole, accounted for 21% of the \nvariability in dyspnea. \n\nTable 6 presents the contribution of lung function \nmeasures of physiologic impairment after accounting for \npatient-related risk factors and disease classification. For \nthe PRISm disease group, a higher post-BD FEV1/FVC \nratio and a lower post-BD FEV1 % predicted value were \nassociated with greater dyspnea impact. For the COPD \ndisease group, a lower post-BD FEV1/FVC ratio was \nassociated with greater dyspnea impact. Reversibility of \nFEV1 was associated with higher dyspnea impact only in \npatients with asthma or COPD. Lung function measures \nof disease severity accounted for 2% of the variability in \ndyspnea. \n\nAfter adjustment for patient-specific risk factors in the \nfirst stage analysis, we adjusted for spirometry-defined \ndisease (PRISm, asthma, COPD, or normal \nspirometry) in Table 5. Adjustment for disease \n\nt \nn \ne \nm \ns \ns \ne \ns \ns \na \na \ne \nn \np \ns \ny \nD ", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "(eg, climate, air quality/industrialization, socioeconomic \nstatus) of the catchment population tend to vary across \nstudy sites. \n\nApproximately 65% of the variability in dyspnea \nremained unexplained by the factors examined in our \nstudy. Most individuals in our study showed normal \nspirometry results but still carried a substantial \nburden of dyspnea, an inconsistency that needs \nexplanation. Several factors not included in our \nanalysis may have contributed to the unexplained \nvariation. Environmental factors (eg, air pollution, \nallergen exposure, seasonal variations in symptoms) \nare potential contributors to this unexplained \nvariability.22 Genetic predispositions could also play a \nsignificant role, as suggested by a study that revealed \nthat parents with dyspnea were 1.8 times more likely \nto have offspring with dyspnea.23 Additionally, fitness \ncould be a contributing factor, especially in \nindividuals with undiagnosed PRISm, asthma, or \nCOPD who may restrict their activities to avoid \ndyspnea, and hence become deconditioned.6 \n\nDyspnea is a complex, subjective symptom that is \nmodified by nonrespiratory factors including \npsychosocial, social, and environmental influences.5 \nInterindividual variability in the perception of dyspnea, \ninfluenced by these nonrespiratory factors, may play an \nimportant role. A study conducted by Ziegler et al24 \nassessed the perception of dyspnea in 42 healthy \nindividuals using a standardized inspiratory resistive \nloading stimulus. The study used the modified Borg \nscale to measure dyspnea perception levels. Among the \nparticipants subjected to the same inspiratory resistive \nload, 31%, 45%, and 24% of participants classified their \nlevel of dyspnea as low, intermediate, and high, \nrespectively. The study revealed that differences between \nindividuals contribute considerable variability to the \nperception of dyspnea, even among healthy participants. ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Each participant completed the Asthma Screening Ques- \ntionnaire (ASQ)10 via telephone. Individuals aged $ 60 \nyears, and those aged < 60 years who scored < 6 points \non the ASQ, also completed the COPD-Diagnostic \nQuestionnaire.11,12 Participants scoring $ 6 points on \nthe ASQ or $ 20 points on the COPD-Diagnostic Ques- \ntionnaire were invited to the study site for pre- and post- \nbronchodilator (BD) spirometry. \n\nAssessment of the Impact of Participants’ Dyspnea \n\nA control group without respiratory symptoms was \nselected randomly using identical random digit dialing \nreported no respiratory \nmethods. Control patients \nsymptoms in the preceding 6 months and obtained a \nscore of 0 on the ASQ. Participants were recruited as \ncontrol patients if they could be matched with an indi- \nvidual from the undiagnosed group based on age ((cid:2) 5 \nyears) and sex. This matching process aimed to have \nsimilar demographic profiles between the control group \nand the newly found cases. This matching was imple- \nmented solely to ensure demographic comparability \nacross the study groups and not for pairing patients \nfor statistical analysis purposes. ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "STUDY DESIGN AND METHODS: This population-based study included 2,857 adults who were \nexperiencing respiratory symptoms. These individuals had not been previously diagnosed \nwith any lung conditions and were recruited from 17 Canadian centers using random digit \ndialing. Each participant underwent spirometry testing both before and after using a bron- \nchodilator to determine if they met the diagnostic criteria for COPD, asthma, or preserved \nratio impaired spirometry (PRISm), or if their spirometry results were normal. An age- \nmatched control group (n ¼ 231) was similarly recruited using random digit dialing. A \ndyspnea impact assessment score from 0 to 100 was produced using questions from the \nCOPD Assessment Test and St. George’s Respiratory questionnaire. \nRESULTS: Individuals with PRISm (n ¼ 172) reported more impactful dyspnea (mean score, \n63.0; 95% CI, 59.5-66.4) than those with undiagnosed asthma (n ¼ 265; mean score, 56.6; \n95% CI, 53.9-59.3) or undiagnosed COPD (n ¼ 330; mean score, 57.5; 95% CI, 55.1-59.9). All \ngroups reported significantly more impactful dyspnea than the control group (mean score, \n13.8; 95% CI, 11.8-15.7). Patient-specific risk factors including age, sex, BMI, smoking, and \ncomorbidities explained 20.6% of the variation in dyspnea. An additional 12.4% of the \nvariation was explained by disease classification and another 1.7% by the severity of lung \nfunction impairment assessed with spirometry. After adjusting for age, sex, and BMI, greater \ndyspnea impact was associated with increased health care utilization, lower quality of life, and \nreduced work productivity. \nINTERPRETATION: Our findings showed that in community-based adults with undiagnosed \nrespiratory symptoms, those identified with PRISm experienced the greatest impact of dys- \npnea. Dyspnea imposes burdens on the health care system and is associated with impaired \nquality of life and work productivity. \nCHEST 2024; 166(6):1296-1308 ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "outpatients with cardiorespiratory disease25 and the \nDyspnea-12 in patients with asthma26 and found that \nthe affective aspect of dyspnea can significantly influence \nthe impact of dyspnea on health status, irrespective of \nthe intensity of breathlessness. \n\nand validated respiratory health questionnaires, and \nour dyspnea assessment measure is a weighted average \nof responses to these validated questions. \nConsequently, the measure has an immediate \ninterpretation in terms of the lived day-to-day \nexperience of individuals. \n\nIn those with PRISm, there was a strong, positive \nassociation between higher values for the FEV1/FVC \nratio and dyspnea. For the PRISm group, a higher \nFEV1/FVC ratio may reflect diminished lung \ncompliance due to interstitial lung disease and/or \nrespiratory system restriction due to obesity, which \ncould contribute to worse dyspnea. Conversely, the \nassociation of dyspnea with the FEV1/FVC ratio was in \nthe opposite direction for those with asthma or COPD, \nand a lower FEV1/FVC ratio correlated with worse \ndyspnea, as expected. ", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Although neither the CAT nor the SGRQ are dyspnea- \nspecific tools, both are recommended by the Global Initia- \ntive for Chronic Obstructive Lung Disease to evaluate \nsymptoms, including dyspnea,20 and both yield a richer \nassessment of dyspnea than the modified Medical \nResearch Council breathlessness scale.20 Fifteen questions \nwere taken from the CAT and SGRQ questionnaires that \nreferred to individuals’ experiences with dyspnea, and a \ncomposite measure of dyspnea impact using a weighted \nsum of the responses to the 15 questions was constructed. \nQuestions were coded so that larger values indicate more \nimpactful dyspnea. Weights used for question responses \nin calculating the dyspnea impact assessment measure \nwere those of the first component of a principal compo- \nnent analysis (PCA) based on the covariance matrix of \nquestion responses. Questions with multiple responses \nand ordinal structure are individually more informative \nand thus were accorded higher weight than individual \ntrue-false questions. No additional PCA component was \nanticipated a priori to be material for our investigation, \nand an eigenvalue analysis of the PCA was conducted to \nverify this assumption. ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "After adjusting for age, sex, and BMI, dyspnea was \nnegatively associated with all domains of quality of life, \nincluding physical functioning (coefficient, (cid:3)0.655; \nP < .001), role limitations due to physical health \n(coefficient, (cid:3)0.628; P < .001), general health \n(coefficient, (cid:3)0.382; P < .001), and total score \n(coefficient, (cid:3)0.473; P < .001) (Table 7). ", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed6_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_RSG_2004.pdf", + "query": "What is the revenue of Republic Services in 2002 ?", + "target_page": 2, + "target_passage": " $ 2,365.1", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n**NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n**(All tables in millions, except per share data) Ì (Continued)**\n\n**Years Ended December 31,**\n**2003** **2004** **2002**\n\nWeighted-average fair value of the Company's stock options, \nrestricted stock and stock units granted during the period ÏÏÏ $ 9.33 $ 7.64 $ 7.47 \n\nAssumptions Ì \n\n3.6% 3.2% 2.7% \n\n5 years 5 years 5 years \n\n30.0% \n.9% 40.0% \nÌ 40.0% \nÌ \n\n**Revenue Recognition and Deferred Revenue**\n\nThe Company generally provides services under contracts with municipalities or individual customers. \nRevenue consists primarily of collection fees from commercial, industrial, residential and municipal customers \nand transfer and landÑll disposal fees charged to third parties. Advance billings are recorded as deferred \nrevenue, and the revenue is then recognized over the period services are provided. Collection, transfer and \ndisposal, and other services accounted for approximately 74.3%, 18.9% and 6.8%, respectively, of consolidated \nrevenue for the year ended December 31, 2004. No one customer has individually accounted for more than \n10% of the Company's consolidated revenues or of the Company's reportable segment revenue in any of the \npast three years. ", + "page_start": 71, + "page_end": 71, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n\n \n \n \n \n [html]\n
2003Gross RevenueIntercompany Revenue ( b )Net RevenueDepreciation, Amortization, Depletion and Accretion ( c )Operating IncomeCapital Expenditures ( d )Total AssetsEastern Region........
$ 600.2$ ( 93.0 )$ 50$ 36.4$ 71.3$ 40.7$ 826.9Central Region..........671.7
( 151.6 )520.174.0106.675.7960.5Southern Region......680.3( 76.9 )
603.462.8107.569.9865.6Southwestern Region...332.6( 31.2 )301.4
28.750.228.9409.4Western Region.......729.4( 143.9 )585.546.2
148.851.4813.2Corporate Entities ( a ). 2. 23.7( 71.7 )
6.6678.5Total..........................$ 3.014.4$( 496.6 )$ 2.517.8$ 251.8$ 412.7$ 273.2
$ 4.554.12002Gross RevenueIntercompany Revenue ( b )Net RevenueDepreciation, Amortization, and Depletion ( c )Other Charges ( Income )Operating IncomeCapital Expenditures ( d )
Total AssetsEastern Region..........564.1$ ( 79.7 )$484.4$ 32.0$( 4.1 )$ 87.0
$ 39.2$ 822.2Central Region.......589.6( 120.2 )469.453.6( 1.5 )105.3
77.1950.9Southern Region.....643.1( 65.5 )577.652.7118.3
58.0830.7Southwestern Region...311.8( 29.1 )282.722.841.9
30.6374.6Western Region......690.0( 139.1 )550.941.3145.5
47.3826.7Corporate Entities ( a ).... 2(. 1 ). 1( 2.8 )( 38.5 )
6.4404.0Total..........................$ 2.798.8$ ( 433.7 )$ 2.365.1$ 199.6$( 5.6 )$ 459.5
$ 258.6$ 4.209.1
", + "page_start": 88, + "page_end": 88, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n**NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n**(All tables in millions, except per share data) Ì (Continued)**\n\n**Cumulative EÅect**\n**of Changes in**\n**Accounting**\n**Principles** **Balance as of**\n**December 31,**\n**2002** **Balance as of**\n**December 31,**\n**2003** **Acquisitions** **Divestitures**\n\nEastern Region ÏÏÏÏÏÏÏÏ \nCentral Region ÏÏÏÏÏÏÏÏ \nSouthern Region ÏÏÏÏÏÏÏ \nSouthwestern Region ÏÏÏ \nWestern RegionÏÏÏÏÏÏÏÏ $ 429.0 \n343.0 \n323.2 \n134.7 \n314.3 $ 7.2 \n7.5 \n2.6 \n.3 \n3.6 $(.3) \nÌ \nÌ \nÌ \nÌ $ Ì \nÌ \nÌ \nÌ \n(7.0) $ 435.9 \n350.5 \n325.8 \n135.0 \n310.9 \n\nTotal ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ $1,544.2 $21.2 $(.3) $(7.0) $1,558.1 \n\nRevenue of the Company by revenue source for the years ended December 31, 2004, 2003 and 2002 is as \nfollows: ", + "page_start": 89, + "page_end": 89, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n**NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n**(All tables in millions, except per share data) Ì (Continued)**\n\napproximately $48.0 million which was collected or used to oÅset taxes payable during the year ended \nDecember 31, 2004. \n\nA reconciliation of the statutory federal income tax rate to the Company's eÅective tax rate is shown \nbelow: ", + "page_start": 84, + "page_end": 84, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n**NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n**(All tables in millions, except per share data) Ì (Continued)**\n\nHedging Activities'' (\"\"SFAS 133''), as amended. (For further information, see Note 11, Fuel Hedge.) Of this \namount, $1.6 million, net of tax, representing the eÅective portion of the change in fair value was recorded to \nother comprehensive income for the year ended December 31, 2002. \n\nAt December 31, 2004, the Company had $38.7 million of restricted marketable securities held as \nÑnancial guarantees. These securities consist of mutual funds invested in short-term investment grade \nsecurities, including mortgage-backed securities and U.S. Government obligations. These securities are \navailable for sale and, as a result, are stated at fair value based on quoted market prices. During the years \nended December 31, 2004 and 2003, the Company recorded a $.1 million and ($.1) million unrealized \ngain/(loss), net of tax, respectively, to other comprehensive income related to the change in fair value of these \nsecurities. ", + "page_start": 72, + "page_end": 72, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n\n \n \n \n \n [html]( in millions, except earnings per share data )Year\n
Med Decer1,2004
20__2002REVENUE$ 2.7
708.1
$ 2.517.8$ 2.365.1EXPENSES :Cost of operations
1.714.41.605.41.472.9Depreciation, amortization and depletion
259.4239.1199.6Accretion
13.712.7Selling, general and administrative
268.3247.9238.7Other charges ( income )
( 5.6 )OPERATING INCOME
452.3412.7459.5INTEREST EXPENSE
( 76.7 )( 78.0 )( 77.0 )INTEREST INCOME
6.99.54.3OTHER INCOME ( EXPENSE ), NET
1.23.2_ (. 3 )INCOME BEFORE INCOME TAXES
383.7347.4386.5PROVISION FOR INCOME TAXES
145.8132.0146.9INCOME BEFORE CUMULATIVE EFFECT OF CHANGES IN
ACCOUNTING PRINCIPLES
237.9215.4239.6CUMULATIVE EFFECT OF CHANGES IN ACCOUNTING
PRINCIPLES, NET OF TAX( 37.8 )
NET INCOME
$ __2237.9$ _177.6$ 239.6
BASIC EARNINGS PER SHARE :Before cumulative effect of changes in accounting principles$1.56
$1.341Cumulative effect of changes in accounting principles, net of tax
(. 23 )Basic earnings per share................................................................................................................................
. 56
S1.11SpeciesWeighted average common shares outstanding
152.8160.3165.4DILUTED EARNINGS PER SHARE :
Before cumulative effect of changes in accounting principles$1.53$
1.33$1.44Cumulative effect of changes in accounting principles, net of tax
(. 23 )Diluted earnings per share
$ ___
. 53$1.10$ __1.44
Weighted average common and common equivalent shares outstanding..............................____5.3_
62.1__166.7CASH DIVIDENDS PER COMMON SHARE36
", + "page_start": 61, + "page_end": 61, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC.**\n\n**VALUATION AND QUALIFYING ACCOUNTS AND RESERVES**\n**SCHEDULE II**\n**(in millions)**\n\n**Balance at**\n**Beginning**\n**of Year** **Additions**\n**Charged to**\n**Income** **Accounts**\n**Written**\n**OÅ** **Balance at**\n**End**\n**of Year** **Other(1)**\n\nCLASSIFICATIONS \nAllowance for doubtful accounts: \n\n2004 ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ \n2003 ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ \n2002 ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ $19.0 \n19.0 \n19.0 $ 8.0 \n10.4 \n11.2 $ (9.0) \n(10.4) \n(11.4) $ Ì \nÌ \n.2 $18.0 \n19.0 \n19.0 ", + "page_start": 101, + "page_end": 101, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "*Revenue.*Revenue was $2,708.1 million, $2,517.8 million and $2,365.1 million for the years ended \nDecember 31, 2004, 2003 and 2002, respectively. Revenue increased by $190.3 million, or 7.6%, from 2003 to ", + "page_start": 41, + "page_end": 41, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "*Dear Fellow Shareholders:*\n\nI am pleased to report that 2004 was a very good year for \nRepublic Services, Inc. Our team met and exceeded the \nimportant financial and management goals we told you \nabout here a year ago, and we plan to work just as hard and \naccomplish just as much in the coming year. \n\nRepublic is strengthening its competitive position among \nthe leading waste services providers every day. As always, \nwe are doing so by offering our customers cost-effective \nand safe waste collection, reliable recycling, and \nenvironmentally protective disposal options. \n\nI am proud of our team and what they accomplished. The \nresults tell you just how well they did. \n\nRevenue in 2004 grew 7.6 percent to $2.7 billion, a record. The increases came largely from new \nmunicipal contracts and improved pricing. At the same time, we benefited from our presence in high- \ngrowth markets, especially those in the rapidly expanding Sunbelt states. \n\nWe met last year’s guidance. Net income per diluted share rose 15 percent to $1.53. Our revenue \nenhancement and cost reduction efforts produced results. We generated a record level of free cash \nflow - $388 million to be exact. Republic continues to generate strong and predictable levels of cash \nflow. As in the past year, we will concentrate on free cash flow and use it for acquisitions, \nreinvestment, repurchases of our stock and regular quarterly cash dividends. ", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "*Dear Fellow Shareholders:*\n\nI am pleased to report that 2004 was a very good year for \n\nRepublic Services, Inc. Our team met and exceeded the \n\nimportant financial and management goals we told you \n\nabout here a year ago, and we plan to work just as hard and \n\naccomplish just as much in the coming year. \n\nRepublic is strengthening its competitive position among \n\nthe leading waste services providers every day. As always, \n\nwe are doing so by offering our customers cost-effective \n\nand safe waste collection, reliable recycling, and \n\nenvironmentally protective disposal options. \n\nI am proud of our team and what they accomplished. The \n\nresults tell you just how well they did. \n\nRevenue in 2004 grew 7.6 percent to $2.7 billion, a record. The increases came largely from new \n\nmunicipal contracts and improved pricing. At the same time, we benefited from our presence in high- \n\ngrowth markets, especially those in the rapidly expanding Sunbelt states. \n\nWe met last year’s guidance. Net income per diluted share rose 15 percent to $1.53. Our revenue \n\nenhancement and cost reduction efforts produced results. We generated a record level of free cash \n\nflow - $388 million to be exact. Republic continues to generate strong and predictable levels of cash \n\nflow. As in the past year, we will concentrate on free cash flow and use it for acquisitions, \n\nreinvestment, repurchases of our stock and regular quarterly cash dividends. ", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_RSG_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_RSG_2004.pdf", + "query": "Who is the Vice Chairmain of the Board of Republic Services ?", + "target_page": 5, + "target_passage": " Harris W. Hudson1 Vice Chairman of the Board", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**REPORT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM**\n**ON THE FINANCIAL STATEMENTS**\n\nThe Board of Directors and Stockholders of Republic Services, Inc.: \n\nWe have audited the accompanying consolidated balance sheets of Republic Services, Inc. and \nsubsidiaries as of December 31, 2004 and 2003, and the related consolidated statements of income, \nstockholders' equity, and cash Öows for the three years in the period ended December 31, 2004. Our audits \nalso included the Ñnancial statement schedule listed in the Index at Item 15(a). These Ñnancial statements \nand schedule are the responsibility of the Company's management. Our responsibility is to express an opinion \non these Ñnancial statements and schedule based on our audits. \n\nWe conducted our audits in accordance with the standards of the Public Company Accounting Oversight \nBoard (United States). Those standards require that we plan and perform the audit to obtain reasonable \nassurance about whether the Ñnancial statements are free of material misstatement. An audit includes \nexamining, on a test basis, evidence supporting the amounts and disclosures in the Ñnancial statements. An \naudit also includes assessing the accounting principles used and signiÑcant estimates made by management, as \nwell as evaluating the overall Ñnancial statement presentation. We believe that our audits provide a reasonable \nbasis for our opinion. ", + "page_start": 58, + "page_end": 58, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPORT OF INDEPENDENT REGISTERED PUBLIC ACCOUNTING FIRM**\n**ON INTERNAL CONTROL OVER FINANCIAL REPORTING**\n\nThe Board of Directors and Stockholders of Republic Services, Inc.: \n\nWe have audited management's assessment, included in the accompanying Report of Management on \nRepublic Services, Inc.'s Internal Control Over Financial Reporting, that Republic Services, Inc. and \nsubsidiaries maintained eÅective internal control over Ñnancial reporting as of December 31, 2004, based on \ncriteria established in Internal Control Ì Integrated Framework issued by the Committee of Sponsoring \nOrganizations of the Treadway Commission (the COSO criteria). Republic Services, Inc.'s management is \nresponsible for maintaining eÅective internal control over Ñnancial reporting and for its assessment of the \neÅectiveness of internal control over Ñnancial reporting. Our responsibility is to express an opinion on \nmanagement's assessment and an opinion on the eÅectiveness of the company's internal control over Ñnancial \nreporting based on our audit. \n\nWe conducted our audit in accordance with the standards of the Public Company Accounting Oversight \nBoard (United States). Those standards require that we plan and perform the audit to obtain reasonable \nassurance about whether eÅective internal control over Ñnancial reporting was maintained in all material \nrespects. Our audit included obtaining an understanding of internal control over Ñnancial reporting, evaluating \nmanagement's assessment, testing and evaluating the design and operating eÅectiveness of internal control, \nand performing such other procedures as we considered necessary in the circumstances. We believe that our \naudits provide a reasonable basis for our opinion. ", + "page_start": 59, + "page_end": 59, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**Republic Services, Inc.**\n**110 S.E. 6th Street, 28th Floor**\n**Fort Lauderdale, Florida**\n(Address of Principal Executive OÇces) \n\n**33301**\n(Zip Code) \n\nRegistrant's telephone number, including area code: **(954) 769-2400**\n\nSecurities registered pursuant to Section 12(b) of the Act: \n\nTitle of Each Class Name of Each Exchange on which Registered \n\n**Common Stock, par value $.01 per share** **The New York Stock Exchange**\n\nSecurities registered pursuant to Section 12(g) of the Act:**None**", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "Commission Ñle number: 1-14267 \n\n**REPUBLIC SERVICES, INC.**\n(Exact name of Registrant as SpeciÑed in its Charter) \n\n**Delaware**\n(State of Incorporation) **65-0716904**\n(I.R.S. Employer IdentiÑcation No.) ", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n\n \n \n \n \n [html]\n
YearEnded December31,
200420032002
Patients$ 23$ 177.6$
239.6PercentageSpecification154.0
141.0126.1Specification98.4
92.867.4Patients7.0
5.36.1Specifications13.7
12.7__Specificity57.6
178.973.1Specifications8.0
10.411.2.........10.6
6.74.0Specificity2.1
( 1.8 )( 4.8 )tax...
37.8Patients( 27.5 )
− 21.8 )( 13.6 ).........91.8
( 109.4 )( 5.9 )Patients15.3
9.037.1.......( 2.6 )
61.329.4666.3600.5
569.7Patients( 283.8 )( 273.2 )
( 258.6 ).........5.79.1
14.6Specificity( 47.3 )( 51.5 )
( 55.8 ).........3.2
18.9Patients( 3.7 )( 17.6 )
( 2.7 ).........( 21.4 )( 40.0 )
( 32.7 ).........143.8( 182.4 )
( 206.7 )( 552.4 )( 316.3 )
Specification____( 30.0 )
Specificity88.886.396.9
( 252.2 )( 2.6 )( 2.2 )Patients
38.249.129.9Patients
( 266.1 )( 184.2 )( 150.0 ).........
( 46.0 )( 19.0 ).........
( 72.6 )( 437.3 )
( 70.4 )( 128.0 )ENTS22.3
( 22.3 )125.4ERIOD119.2
141.516.1Patients$ 141.5
$ 119.2$ 141.5
\n\nCASH PROVIDED BY OPERATING ACTIVITIES: ", + "page_start": 63, + "page_end": 63, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "In our opinion, management's assessment that Republic Services, Inc. maintained eÅective internal \ncontrol over Ñnancial reporting as of December 31, 2004, is fairly stated, in all material respects, based on the \nCOSO criteria. Also, in our opinion, the Company maintained, in all material respects, eÅective internal \ncontrol over Ñnancial reporting as of December 31, 2004, based on the COSO criteria. \n\nWe also have audited, in accordance with the standards of the Public Company Accounting Oversight \nBoard (United States), the consolidated balance sheets as of Republic Services, Inc. as of December 31, 2004 \nand 2003, and the related consolidated statements of income, stockholders' equity, and cash Öows for each of \nthe three years in the period ended December 31, 2004 of the Company and our report dated February 24, \n2005, expressed an unqualiÑed opinion thereon. ", + "page_start": 59, + "page_end": 59, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**SIGNATURES**\n\nPursuant to the requirements of Section 13 or 15(d) of the Securities Exchange Act of 1934, the \nCompany has duly caused this report to be signed on its behalf by the undersigned, thereunto duly authorized. \n\nREGISTRANT: \n\nREPUBLIC SERVICES, INC. \n\nBy: /s/ \n\nJAMES E. O'CONNOR \nJames E. O'Connor \n*Chairman of the Board and Chief Executive OÇcer*\n*(principal executive oÇcer)*\n\nFebruary 25, 2005 \n\nPursuant to the requirements of the Securities Exchange Act of 1934, this report has been signed by the \nfollowing persons on behalf of the Registrant and in the capacities and on the dates indicated. \n\n**Signature** **Title** **Date**\n\n/s/ JAMES E. O'CONNOR \nJames E. O'Connor \nChairman of the Board and Chief \nExecutive OÇcer (principal \nexecutive oÇcer) \n\nFebruary 25, 2005 \n\n/s/ HARRIS W. HUDSON Vice Chairman and Director February 25, 2005 \nHarris W. Hudson \n\n/s/ TOD C. HOLMES \nTod C. Holmes \nFebruary 25, 2005 ", + "page_start": 100, + "page_end": 100, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**Report of Management on Republic Services, Inc.'s Internal Control Over Financial Reporting**\n\nWe, as members of management of Republic Services, Inc. are responsible for establishing and \nmaintaining adequate internal control over Ñnancial reporting, as such term is deÑned in Exchange Act \nRules 13a-15(f). Internal control over Ñnancial reporting is a process designed to provide reasonable assurance \nregarding the reliability of Ñnancial reporting and the preparation of Ñnancial statements for external purposes \nin accordance with generally accepted accounting principles. Internal control over Ñnancial reporting includes \nthose policies and procedures that (1) pertain to the maintenance of records that, in reasonable detail, \naccurately and fairly reÖect the transactions and dispositions of our assets; (2) provide reasonable assurance \nthat transactions are recorded as necessary to permit preparation of Ñnancial statements in accordance with \ngenerally accepted accounting principles, and that our receipts and expenditures are being made only in \naccordance with authorizations of our management and directors; and (3) provide reasonable assurance \nregarding prevention or timely detection of unauthorized acquisition, use, or disposition of our assets that \ncould have a material eÅect on the Ñnancial statements. ", + "page_start": 94, + "page_end": 94, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "\nRobert S. Patterson \nSenior Vice President, Trust Services ", + "page_start": 14, + "page_end": 14, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n\n \n \n \n \n [html]( in millions )Common Stock Shares, NetAdditional Paid - In CapitalDeferred Compensation\n
Retained EarningsTreasury StockAccumulated Other Comprehensive Income ( Loss )Comprehensive_IncomeBALANCE ATDECEMBER 31.2001169.6$ 1.8
$ 1.264.7
$$ 641.1$( 150.1 )$( 1.6 )Net income
239.6$ 239.6Issuances of common stock2.034.0
Purchases of common stockfor treasury.......( 8.0 )
( 150.0 )Change in value ofderivative instruments, net of tax...............................................
1.6___1.6Total comprehensive income
$ 241.2BALANCE ATDECEMBER 31.2002163.6
1.81.298.7880.7( 300.1 )Net income
177.6$ 177.6Cash dividends
( 19.0 )Issuances of common stock2.6
49.1Purchases of common stockfor treasury........( 8.4 )
( 184.2 )Change in value ofinvestments, net of tax
(. 1 )__ (. 1 )Total comprehensive income
$ 177.5BALANCE AT
DECEMBER 31.2003157.81.81.347.81.039.3( 484.3 )(. 1 )Net income
237.9$ 237.9Cash dividends
( 54.6 )Issuances of common stock
2.3. 148.8Issuances of restricted stock and deferred stock units.
. 12.8( 2.8 )Amortization of deferred
compensation1.8
Purchases of common stockfor treasury.......( 9.6 )( 266.1 )
Change in value ofinvestments, net of tax
. 1____1Total comprehensive income
$ 238.0BALANCE ATDECEMBER 31.2004150.6$ 1.9$ 1.399.4$( 1.0 )$ 1.222.6
$( 750.4 )
5 = 5
", + "page_start": 62, + "page_end": 62, + "source_file": "NYSE_RSG_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_STO_2004.pdf", + "query": "How mush did the Moomba incident cost to Santos in 2004 ?", + "target_page": 12, + "target_passage": " the Moomba incident resulted in $17 million of one-off costs in 2004.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Importantly, Santos was able \nto work effectively with its key \nstakeholders, including customers, \njoint venturers and government \ndepartments, to minimise the \ncommercial impacts. \nEven with the large effort \nexpended on the Moomba \nincident, Santos was able to \ndeliver strong results for 2004, \nreflecting higher average prices \nacross most products. \n\nNatural gas supplies were quickly \nrestored, in part by recovering \nprocessed gas from underground \nstorage reservoirs. Liquids \nprocessing facilities were \nprogressively reinstated allowing \nfurther increases to gas production \nand sales volumes, with the \nramp-up to full liquids production \nachieved by August as planned. \n\nThis strong financial performance, \ncombined with the confidence \nthat Santos will continue to grow \nearnings in the future, enabled \nthe Board to increase the final \ndividend on ordinary shares by \n20% from 15 cents to 18 cents \nper share, fully franked. For the \nfull year, dividends increased \nby 10% to 33 cents per share, \ncompared with 30 cents per share \n\nAnnual Report 2004 ", + "page_start": 3, + "page_end": 3, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "A one US cent movement in the \nAustralia–US dollar exchange rate \nwould produce a change in profit \nafter tax of A$8 million, and \na 1% change in interest rates \nequates to a change in net profit \nafter tax of A$9 million. \n\n**A STRONG FINANCIAL**\n**PERFORMANCE**\nIt was pleasing that Santos \nwas able to conclude 2004 \non a higher note than it started. \n2004 has also been an important \nperiod for shareholders, with a \nsignificant improvement in the \nSantos share price combined with \nan increase in the dividend. \n\nWe achieved record annual \nrevenue thanks to higher oil and \ngas prices combined with the \nreturn of full production at \nMoomba to produce a 21.5% jump \nin second half sales: the best \nresult for any six-month period \nin Santos' history. \n\nThe average realised price for \ncrude oil was up nearly 19% \nto A$51.83 per barrel. ", + "page_start": 6, + "page_end": 6, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**2004 WAS A YEAR OF GOOD**\n**OPERATING RESULTS**\nOverall the increase in 2004 profit \nof 16% reflected a year of sound \noperating performance. Sales \nrevenue was a record $1,501 \nmillion, up 2.5% on 2003, \nreflecting higher prices across \nmost products and was achieved \ndespite lower production as a \nresult of the Moomba incident \nand declining output from late \nlife fields. \n\n**‘The sound operating results**\n**achieved in 2004 underline**\n**the changing face of Santos**\n**towards a higher value, higher**\n**margin business. We ended the**\n**year with a strong financial**\n**position and our financial**\n**flexibility intact.’**\n\nSantos benefited from higher \nworld oil prices and realised \nUS$51.83 per boe in 2004, an \nincrease of 19% over 2003. The \nbenefit of higher world oil prices \nsubstantially offset the impact \nof lower production volumes. \n**PETER WASOW**\nChief Financial Officer \n\nSantos was also able to negotiate \nhigher domestic gas prices (up \n4% on average) and deliver new \nrevenue streams from project \nstart-ups and acquisitions during \nthe year. ", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "These results have left Santos \nwell positioned to continue its \nstrong investment program which \nsaw capital expenditure peak at \n$930 million in 2004. \n\nProduction is forecast to increase \nby 15% in 2005, or by 4% after \nexcluding the effect of the \nMoomba downtime, to about \n54 million boe. We expect this \npositive forward trend to be \nfollowed by further production \ngrowth of more than 10% in 2006. \n\nGrowing our oil and gas reserves \nfor future production is the goal \nof our exploration efforts. On \na rolling three-year average we \nhave replaced the hydrocarbons \nthat Santos has produced at \na rate of 130% of Proven (1P) \nreserves, at an average \nreplacement cost of around \nUS$7 per boe. \n\nIn 2005 we expect to invest \naround $850 million of new \ncapital in projects and our \nstrategy is to plan for firm \ndevelopments based on \naffordability at relatively low oil \nprices. If higher prices continue \nand some projects mature quickly \nand can be given the green light, \nour overall capital expenditure \nmay be higher. \nThe Bayu-Undan liquids project \ncame on line in April 2004 \nand, at its increased design \nthroughput of just over one \nbillion cubic feet of gas per day, \nproduced liquids at a rate of \n100,000 barrels per day. ", + "page_start": 6, + "page_end": 6, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**Consolidated** **Santos Ltd**\n\n**2004**\n**$million** 2003 \n$million **2004**\n**$million** 2003 \n$million \n\n**1,544.3**\n**–**\n**3.5**\n**14.5**\n**19.9**\n**(583.6)**\n**(169.6)**\n**(65.2)**\n**(158.8)** 1,637.3 \n0.4 \n2.5 \n17.0 \n28.2 \n(439.9) \n(118.7) \n(60.9) \n(168.6) **644.4**\n**251.7**\n**45.1**\n**19.0**\n**18.0**\n**(279.0)**\n**(78.4)**\n**(90.6)**\n**(137.5)** 683.0 \n0.4 \n36.9 \n22.1 \n1.6 \n(186.4) \n(39.8) \n(83.6) \n(65.1) \n\n**605.0** 897.3 **392.7** 369.1 ", + "page_start": 53, + "page_end": 53, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "Similarly, our reserve replacement \ncost for 2004 is above our target \ndue mainly to the high level \nof expenditure on major \ndevelopment projects during the \nyear. On a three-year average \nbasis, which is more \nrepresentative of the nature \nof the business, the result is \na reserve replacement cost of \nUS$7.19 – much more in line \nwith our target. \n\nThese programs will continue to \ncontribute at even higher levels \ngoing forward for even less cost. \n\n**A PART OF OUR COMMUNITY**\nSantos engages with many \nstakeholders and we believe it \nis important to have rewarding \nrelationships with the communities \nto which we belong. \n\nThe netback achieved in 2004 \nwas an improvement over 2003 \nand was on target due largely to \nhigher average product prices, but \nalso reflected the results of the \ncontinuous improvement program. \nWe sponsor a wide range \nof educational, cultural and \ncommunity events and programs. ", + "page_start": 7, + "page_end": 7, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**15. Interest-Bearing Liabilities (continued)**\n\n**(c) Medium-term notes**\n\nThe Santos Group has a A$500.0 million (2003: A$500.0 million) Australian medium-term note program. At 31 December 2004, A$20.0 million \n(2003: A$20.0 million) of medium-term notes have been issued at fixed rate and swapped into floating rates of interest of 6.25% (2003: 6.20%), \nmaturing in 2008. \n\n**(d) Long-term notes**", + "page_start": 62, + "page_end": 62, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**‘During 2004 we brought**\n**together everyone at Santos**\n**responsible for commercialisation**\n**into a single team. One of the**\n**outcomes from this was the**\n**introduction of gas swaps,**\n**where we were able to move**\n**gas between Santos assets in**\n**different states.’**\n\n**RICK WILKINSON**\nVice President \nGas Marketing \nand Commercialisation ", + "page_start": 22, + "page_end": 22, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**32. Additional Financial Instruments Disclosure**\n\n**(a) Foreign exchange risk exposure**\n\nThe Santos Group is exposed to foreign exchange risk principally through the sale of liquid petroleum products denominated in US dollars, \nUS dollar borrowings and US dollar expenditure. In order to hedge this foreign exchange risk, the Santos Group has from time to time entered \ninto forward foreign exchange, foreign currency swap and foreign currency option contracts. \n\nAt 31 December 2004 the Santos Group has one open forward foreign currency exchange contract which has expired in January 2005. If closed \nout at balance date a loss of $0.2 million would have resulted. \n\nUS dollar denominated borrowings are either swapped into Australian dollar exposure (2004: US$321.4 million; 2003: US$115.0 million) or \ndesignated as a hedge of US dollar denominated investments in self-sustaining overseas controlled entities (2004: US$313.0 million; \n2003: US$323.6 million) or as a hedge of future US denominated sales revenues (2004: US$146.4 million; 2003: US$219.4 million). As a result, \nthere were no net foreign currency gains or losses arising from translation of US denominated dollar borrowings recognised in the statements \nof financial performance in 2004. Accordingly, $37.4 million of unrealised foreign currency gains were deferred as at 31 December 2004 \n(2003: gains of $66.3 million). The ultimate foreign currency gains or losses will be included in the measurement of the specific hedged US dollar \ndenominated sales revenues to be realised in the years 2005 through 2006. ", + "page_start": 85, + "page_end": 85, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "The amounts recognised in the financial statements of the Santos Group and the Company in relation to executive share options exercised during \nthe financial year were: \n\n**Consolidated** **Santos Ltd**\n\n**2004**\n**$million** 2003 \n$million **2004**\n**$million** 2003 \n$million \n\nIssued ordinary share capital **4.1** 5.7 **4.1** 5.7 ", + "page_start": 66, + "page_end": 66, + "source_file": "ASX_STO_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_STO_2004.pdf", + "query": "What is the main focus of the Santos 2005 program ?", + "target_page": 19, + "target_passage": " Oil is the main focus of the 2005 program", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "In Australia, our increasing focus \non the potential of offshore areas \nwill see Santos drill three wells \noff Western Australia in 2005, \none off southern Australia and \ntwo wells off northern Australia. \nWe will also drill two wells \nonshore in Queensland and one \nonshore in Victoria. \n\nThe discovery of oil and gas \nat Hiu Aman in the Kutei Basin, \noffshore East Kalimantan, has \nprovided a strong start to our \n2005 exploration program and \nwe look forward with anticipation \nto further work on that \nsignificant find. Santos has a \n50% interest in the discovery. We \nbelieve this region of Indonesia \nis very promising and Santos \nexpects to drill four wells in the \nKutei Basin in 2005. \n\n**BIGGEST DEVELOPMENT**\n**YEAR YET**\nI am pleased also to report \nthat 2004 was a record year for \ndevelopment with six projects \nadvancing through the pipeline. \n\nSantos has an exciting \nexploration program for 2005: one \nthat I believe holds the highest \nresource potential of any program \nin the Company's 50-year history. \n\n5 Annual Report 2004 ", + "page_start": 6, + "page_end": 6, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "We expect to participate in \ndrilling a record 157 wells during \n2005, of which 25 are exploration \nwildcat wells. Consistent with \nthe growing internationalisation \nof Santos, this includes eight \nwells in Indonesia and six wells \nin the Gulf of Suez, Egypt. This \nprogram offers an attractive \ncombination of risk and reward \nand is a new focus to our \noverseas exploration effort. ", + "page_start": 6, + "page_end": 6, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**‘During 2004 we brought**\n**together everyone at Santos**\n**responsible for commercialisation**\n**into a single team. One of the**\n**outcomes from this was the**\n**introduction of gas swaps,**\n**where we were able to move**\n**gas between Santos assets in**\n**different states.’**\n\n**RICK WILKINSON**\nVice President \nGas Marketing \nand Commercialisation ", + "page_start": 22, + "page_end": 22, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "These results have left Santos \nwell positioned to continue its \nstrong investment program which \nsaw capital expenditure peak at \n$930 million in 2004. \n\nProduction is forecast to increase \nby 15% in 2005, or by 4% after \nexcluding the effect of the \nMoomba downtime, to about \n54 million boe. We expect this \npositive forward trend to be \nfollowed by further production \ngrowth of more than 10% in 2006. \n\nGrowing our oil and gas reserves \nfor future production is the goal \nof our exploration efforts. On \na rolling three-year average we \nhave replaced the hydrocarbons \nthat Santos has produced at \na rate of 130% of Proven (1P) \nreserves, at an average \nreplacement cost of around \nUS$7 per boe. \n\nIn 2005 we expect to invest \naround $850 million of new \ncapital in projects and our \nstrategy is to plan for firm \ndevelopments based on \naffordability at relatively low oil \nprices. If higher prices continue \nand some projects mature quickly \nand can be given the green light, \nour overall capital expenditure \nmay be higher. \nThe Bayu-Undan liquids project \ncame on line in April 2004 \nand, at its increased design \nthroughput of just over one \nbillion cubic feet of gas per day, \nproduced liquids at a rate of \n100,000 barrels per day. ", + "page_start": 6, + "page_end": 6, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**Details of major credit facilities**\n**(a) Bank loans**\nThe Santos Group has access to the following committed revolving facilities: \n\n***Revolving facilities at 31 December 2004***\n**Year of maturity** **Currency**\n\n2005 \n2006 \n2008 \n2009 Multi-currency \nMulti-currency \nMulti-currency \nMulti-currency ", + "page_start": 61, + "page_end": 61, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "INSIDE \n\nCHAIRMAN’S REVIEW \n**2**Stephen Gerlach comments on Santos’ \n\nCAPTURING AND \nDELIVERING GROWTH \n**18**Progress on Santos’ development projects \nand gas commercialisation highlights. \n\nperformance in 2004. \n\n2004 ACHIEVEMENTS \n2005 AND BEYOND \n**3**Key achievements in 2004 and three-year \nperformance, plus what to look for in the \nnear-term future. MANAGING OPTIONS \n**22**Strategic projects, portfolio management \nactivities and reserves movements \nin 2004. ", + "page_start": 1, + "page_end": 1, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "INSIDE \n\nCHAIRMAN’S REVIEW \n**2**Stephen Gerlach comments on Santos’ \n\nCAPTURING AND \nDELIVERING GROWTH \n**18**Progress on Santos’ development projects \nand gas commercialisation highlights. \n\nperformance in 2004. \n\n2004 ACHIEVEMENTS \n2005 AND BEYOND \n**3**Key achievements in 2004 and three-year \nperformance, plus what to look for in the \nnear-term future. MANAGING OPTIONS \n**22**Strategic projects, portfolio management \nactivities and reserves movements \nin 2004. ", + "page_start": 94, + "page_end": 94, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**NOTICE OF MEETING**\nThe Annual General Meeting of Santos Ltd will be held in the Auditorium \nat The Adelaide Town Hall Function Centre, 128 King William Street, \nAdelaide, South Australia on Friday 20 May 2005 at 10.00 am. \n\nOther investor information available on the Santos website includes: \n\n• live and archived webcasts of investor briefings \n\n**FINAL DIVIDEND**\nThe 2004 final ordinary dividend will be paid on 31 March 2005 to \nshareholders registered in the books of the Company at the close of \nbusiness on 4 March 2005 in respect of fully paid shares held at record \ndate. \n\nThe Santos website provides shareholder forms to help shareholders \nmanage their holdings, as well as a full history of Santos’ dividend \npayments and equity issues. Shareholders can also check their holdings \nand payment history in the secure View Shareholding section. \n\n**STOCK EXCHANGE LISTING**\nSantos Ltd. Incorporated in Adelaide, South Australia, on 18 March \n1954. Quoted on the official list of the Australian Stock Exchange Ltd \n(ordinary shares code STO; FUELS code STOPB) and the NZX Ltd. \n\nSantos’ website also provides an online Conversion Calculator, which \ninstantly computes equivalent values of the most common units of \nmeasurement in the oil and gas industry. ", + "page_start": 93, + "page_end": 93, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "across Santos operations. The \nlong-term environmental and \nfinancial benefits of using this \ntechnology are expected to be \nconsiderable. \n\nSantos has a number of long-term \nprojects underway which will \noptimise the substantial \ninvestment the Company makes \nin training people. Importantly, \nthese projects will deliver \nprograms that are targeted to \nmeet business and individual \nneeds and to support culture \nchange initiatives. \n\n**REDUCED OIL SPILLS**\nThere was a substantial reduction \nin the volume of hydrocarbons \nreleased to the environment \nin 2004, with uncontained \nhydrocarbons spilt reducing from \n1,943 cubic metres to 83 cubic \nmetres and Santos continues to \nfocus on reducing oil spills. \n\n**BANKSIA AWARDS**\nSantos was selected in 2004 \nas a finalist in the Banksia \nEnvironmental Awards for the \nwork undertaken in the Company- \nled initiative to protect the \nworld-renowned Coongie Lakes, \nresulting in the area being \ndeclared a new National Park by \nthe South Australian Government. \n**GREENHOUSE POLICY**\nSantos released its Greenhouse \nPolicy in 2004 to drive performance \nimprovements in this area through \nreducing emissions and producing \noil and gas more efficiently. ", + "page_start": 28, + "page_end": 28, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "• the farm-out of a 25% \n\ninterest in the VIC P/51 \nblock containing the Callister \nprospect to Mitsui & Co \nsubsidiary Mitwell Energy \nResources. \n\nThese farm-outs continued the \ntrend of risk-sharing with quality \npartners. \n\n**ADDING MATERIAL PROSPECTS**\nSantos is now in a position that \nexploration success in 2004 and \ngood acreage management has \ncreated future options that will \nultimately translate into greater \nvalue for the business in 2005 \nand beyond. \n\nThe addition of the Donggala PSC \ngives Santos a particularly strong \npresence in the Kutei Basin and \ncovers a highly prospective trend, \nwhile adding to the Company’s \ngrowing Indonesian operations. \n\nThis has been achieved by \nfocusing on ‘basin excellence’. \nThis means becoming a technical \nleader in basins, within our focus \nareas, entering early where \npossible to keep entry costs \ndown, balancing the commercial \nand the technical risks and \nselecting the right co-venturers. \n\nOther exploration acreage \nportfolio management and \nactivities during 2004 included: \n\n• the award of exploration permit \n\nT/36P in the Sorell Basin, \noffshore Tasmania \n\nAnnual Report 2004 ", + "page_start": 17, + "page_end": 17, + "source_file": "ASX_STO_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed5.pdf", + "query": "What is the primary aim of the OSPRO cohort study ?", + "target_page": 2, + "target_passage": " The primary aim of the OSPRO cohort study was to de velop and validate review of systems (i.e. evidence of sys temic involvement) and yellow flag (i.e. pain-related psychological distress) screening tools for use in out patient orthopedic physical therapy settings", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "Methods \nDataset and patient population \nThis study used data from the Orthopedic Physical Ther- \napy – Investigative Network’s (OPT-IN) Optimal Screen- \ning for Prediction of Referral and Outcome (OSPRO) \nvalidation cohort study, a longitudinal prospective study \nof individuals with knee, shoulder, back or neck pain seek- \ning Physical Therapy in the US. A convenience sample \nwas recruited from December 2014 and December 2015 \nby participating OPT-IN clinics. The OPT-IN clinics that \nparticipated in data collection represented multiple geo- \ngraphic regions in the US including the Mideast, South- \neast, Great Lakes, Rocky Mountain States and Far West, \nwith an attempt to balance recruitment between urban \nand rural settings over the entire OPT-IN network. Phys- \nical therapists practicing in these clinics identified eligible \nparticipants at initial evaluation and directed them to a se- \ncure study website for the informed consent process and \nbaseline self-report assessment. Eligibility criteria have \nbeen thoroughly reported elsewhere [19] and were \nthat was \nintentionally broad to develop a cohort \ngeneralizable to those seeking physical therapy for com- \nmon musculoskeletal conditions in the US. Participants \ncompleted follow-up self-reported assessments on the \nstudy website at 4 weeks, 6 months and 12 months. Partic- \nipants were notified of a pending assessment by an email \nthat directed them back to the study website to complete \ntheir follow-up assessment. For additional details of the \ndataset and cohort, readers are directed to the published \ncohort profile [19]. ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed5.pdf" + }, + { + "text": "Abbreviations \nCCI: Charlson comorbidity index; OSPRO: Optimal Screening for Prediction of \nReferral and Outcome; OSPRO-ROS: Review of systems screening tool from \nOSPRO cohort study; OSPRO-YF: Pain-related psychological distress screening \ntool from OSPRO cohort study \n\nReceived: 9 November 2017 Accepted: 14 August 2018 ", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed5.pdf" + }, + { + "text": "The primary aim of the OSPRO cohort study was to de- \nvelop and validate review of systems (i.e. evidence of sys- \ntemic involvement) and yellow flag (i.e. pain-related \npsychological distress) screening tools for use in out- \npatient orthopedic physical therapy settings. These screen- \ning tools, once validated and refined for clinical decision \nmaking, may improve the value of care delivery by accur- \nately identifying individuals who 1) are appropriate for \nreferral \nof \nnon-musculoskeletal symptoms, and/or 2) would benefit \nfrom enhanced, psychologically-informed physical ther- \napy. Early identification of individuals most appropriate \nfor these modified pathways of care has the potential to \nreduce wasteful downstream health care utilization, limit \nthe risk of unwarranted and costly care escalation, and im- \nprove clinical outcomes. Results of the primary analyses \nexamining the predictive ability of the OSPRO tools for \npain, disability, health status, and comorbidity outcomes \nhave been previously published [20]. Pre-planned second- \nary analyses included prediction of persistent pain state \n[21] and this current analysis predicting future healthcare \nutilization. All subjects consented to participation in the \nstudy and ethics approval was granted by the University of \nFlorida Institutional Review Board. \n\nto other providers for management ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed5.pdf" + }, + { + "text": "In future studies, we will embed the OSPRO tools into \nelectronic medical record (EMR) databases to refine and \ntest outcomes prediction models at the health care systems \nlevel. Importantly, we will collect clinical encounter data \nthrough the EMR and combine it with administrative or \nbilling data to confirm the results of this study with more \nobjective measures of health care use. These studies will \nalso allow us to provide better guidance on how to use the \nOSPRO tools to identify serious psychiatric involvement or \nsystemic sources of pain that require medical referral. Fi- \nnally, we will explore alternative scoring strategies for the \ntools, such as weighted scoring for the OSPRO-ROS and \nuse of predicted full-length psychological questionnaire \nscores for the OSPRO-YF. Healthcare providers could then \nuse the collective information from these studies to build \nlearning health systems that facilitate effective, real-time \nclinical decision-making support to improve value of care \nfor patients with musculoskeletal pain. \n\nConclusion \nBaseline disability and change in pain intensity were im- \nportant predictors of \nsubsequent pain-related \nany \nhealthcare utilization, while predictors of individual ser- \nvice utilization were outcome-specific. Identification of \nrisk is improved through treatment monitoring for pain \nand, in some cases, disability and pain-related psycho- \nlogical distress. Comorbidity burden was an important \npredictor of subsequent utilization of opioids and diag- \nnostic tests and imaging, both of which have been recent \ntargets of healthcare policy to constrain their unneces- \nsary use. Future research is needed to refine these pre- \ndictor variables and incorporate them into risk models \nthat support clinical decision-making so that treatment \neffectiveness and efficiency are optimized in value-based \nsystems. \n\nthe clinical encounter might \n\nThird, we were unable to adequately model the spe- \ncific effects of worker’s compensation, self-pay and some ", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed5.pdf" + }, + { + "text": "commercial insurance coverage on utilization due to the \nlow incidence of these forms of payment in our study \nsample. Modeling these separately would have created \nthe potential for unreliable and imprecise effect esti- \nmates. Readers should consider the within-group hetero- \ngeneity caused by this approach and exercise caution \nwhen applying these results to individuals who do not \nhave traditional public or private insurance coverage. Fu- \nture studies should investigate the performance of the \nOSPRO tools in predicting outcomes for patients with \nWorker’s Compensation. \n\nHowever, explained variance estimates in our models \nranged from 34 to 61%, suggesting further research is \nnecessary to identify additional factors contributing to \nhealthcare utilization following physical therapy. \n\nThe primary limitation of the study is the high number \nof subjects lost to follow-up. We attempted to account \nfor the bias introduced by loss to follow-up in our \nmodels with IPAW, which is a robust strategy for con- \nducting analyses with missing data [41, 51]. We observed \ngood concordance between results of complete case and \nweighted analyses, giving us confidence in our findings. \nHowever, important differences in age, race, education, \nsymptom onset, baseline pain intensity, and baseline \npain-related psychological distress were noted between \nthose who did and did not complete follow-up. These \ndifferences suggest that the group lost to follow-up may \nrepresent a unique population to whom these results \nmay not apply. Different factors may predict utilization \noutcomes for this unique population. As a result, readers \nshould exercise caution when extending these findings \nto individuals and populations that substantially differ \nfrom the analytic sample in this study. Specifically, these \npredictive models may need to be adjusted for younger \nindividuals of non-white race, with lower education \nlevels, sudden onset of symptoms, and those with higher \npain intensity and pain-associated distress. \n\nA final limitation is the use of patient recall to meas- \nure utilization. To mitigate recall bias, we used two \nfollow-up points, at 6 and 12 months. However, under- \nor over-reporting of utilization is often a concern with \nstudies requiring subject recall [56–58]. Medical record \nand claims data were not available for these subjects. \nReaders should consider our inability to independently \nconfirm utilization when interpreting results. ", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed5.pdf" + }, + { + "text": "As a basis for the total lag-to-treatment distribution, the main limitation with the above analysis \nis that it assumes all individuals coming to treatment do so within ten years. Examining data \nfrom earlier cohorts suggests this is inaccurate, as a small proportion of OCUs will continue to \nuse these drugs for a long time, sometimes two decades or more, before seeking treatment, \nand some never will. However, we cannot use an earlier cohort for the distribution because this \nis equivalent to using out-of-date data. The average lag-to-treatment is likely to have reduced \nover time given the expansion of treatment places and the influence of DIP. Using old data will \nmiss this and bias the estimates. Even using the 2005 cohort’s distribution contains the \nassumption that the time-to-treatment lag has not altered significantly between 2005 and \n2013/14. So, to try and obtain the most accurate model, we used the figures from the 2005 \ncohort for the first ten years, as above, on the basis that this covers the majority of individuals \nand for that we want the most up-to-date data possible whilst maintaining a long enough time \nperiod. We then index the trend at that point to an older cohort, and use data from that cohort to \nmodel the ‘tail’ of the distribution – i.e. those who take longer than ten years to reach \ntreatment.20 The result is a 20-year lag-to-treatment distribution, shown in Table 12 below. ", + "page_start": 22, + "page_end": 22, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "Modelling methodology \n\nThis brief section outlines the modelling process behind the conclusion in section one, which \nstates that we might expect somewhere between 2,400 and 7,000 individuals from the original \ncohort of users in 2004 to be captured within the 2013 figure of new DIP arrestees (who test \npositive for opiates-only or who are positive-for-both). \n\nWe begin by putting in a plausible range of crime-involved OCUs through the period. This \ncombines the total OCU estimates published by Hay et al., (ranging from around 320,000 OCUs \ndown to around 295,000 in recent years) with available estimates of the percentage who are \nlikely to be committing acquisitive crime. The latter was found to be almost exactly 50% in the \nNTORS study (Gossop et al., 2003). As such, a range of between 170,000 and 100,000 crime- \ninvolved OCUs is likely to include all plausible values (see first row of table below). \n\nWe then calculate the rate at which that population is likely to be arrested and test positive by \nusing the number of individuals testing positive from 2008 (25,433), when DIP was fully up and \nrunning. This gives the second row of the table. Combining the values in the first two rows and \napplying the probability formula given in the main body of the text gives the third row: the \nprobability of first positive DIP test in 2013. Note that this assumes all these individuals continue \nto offend through the period, which may not be the case, hence final results are probably an \nupper bound. The final row simply multiples the figure in the first row by the figure in the third to \ngive our estimate of the original cohort who might appear in the 2013 DIP figures as new. ", + "page_start": 41, + "page_end": 41, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "Worker’s Compensation, or other commercial insurance) \ncompared to private insurance, higher baseline disability \nand worsening of pain. In the weighted analysis, subjects \nwith knee pain were less likely to utilize the emergency \nroom than those with low back pain. However, this rela- \ntionship was not significant (p = .06) in the complete case \nanalysis. Of the significant predictors in both models, insur- \nance status was the strongest individual predictor of subse- \nquent emergency room use. \n\nservices, suggesting injection may be the most difficult \nservice to predict with the included variable set. \n\nSurgery \nBaseline disability (OR = 3.13–3.25, p < 0.001), change in \ndisability (OR = 3.04–3.05, p = 0.01) and change in \n10-item OSPRO-YF score (OR = 1.12–1.14, p < 0.05) \nwhere consistent predictors of subsequent surgery. Not- \nably, magnitude of prediction was comparable between \nchange in disability and baseline disability. This was the \nonly parsimonious model to include an OSPRO tool. In \nthis case, an increase in pain-related psychological dis- \ntress measured by the OSPRO-YF 10-item questionnaire \nover the first 4 weeks was associated with higher odds of \nsurgery. The 3 predictors in this model explained just \nover 30% of the variance in surgery utilization. ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed5.pdf" + }, + { + "text": "ORs and regression coefficients are presented with 95% CIs and P values. Adjusted coefficients are adjusted for age, sex, and BMI. WPAI ¼ Work Pro- \nductivity and Activity Impairment questionnaire. \naMeasures calculated from WPAI questions.21 ", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Full multivariate model performance \nOverall performance for each full multivariate model is \nlisted in Table 5. Block 1 (Demographic, clinical and co- \nmorbidity) consistently contributed to prediction of \nhealthcare utilization and accounted for the greatest \namount of variation in utilization outcome for all \nmodels. Block 4 (change scores for pain, disability, and \nOSPRO-YF) provided statistically significant contribu- \ntions in all models except prediction of injection. Blocks \nincluding baseline OSPRO-YF and OSPRO-ROS, both \nshort and long forms, did not predict utilization out- \ncomes. Weighted models consistently outperformed \ntheir complete case analysis model counterparts with \noverall model pseudo-R2 values ranging from .337 (Any \ncare) to .611 (Emergency room). Results \nFour hundred and forty subjects were recruited at initial \nevaluation. Follow-up at 4 weeks was 75.0% (n = 330), at \n6 months was 69.0% (n = 304) and at 12 months was \n65.2% (n = 287). Baseline demographics and health-related \ncharacteristics for the full cohort, as well as those who did \nand did not complete all \nfollow-up are presented in \nTables 1, 2 and 3. Those who did not complete follow-up \nwere younger, more likely to be non-white, had less than a \ncollege degree, were more likely to have had sudden \nsymptom onset, had higher baseline pain intensity, and \nhad higher baseline pain-related psychological distress \nmeasured by the OSPRO-YF. Only those with complete ", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed5.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed5.pdf", + "query": "What is the range of the pain rating scale ?", + "target_page": 3, + "target_passage": "Pain intensity was assessed by the numerical pain rating scale (NPRS) ranging from “0” (no pain) to “10” (worst pain imaginable)", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "[24–26]. Participants \n\npain imaginable) \nrated their \ncurrent pain intensity, as well as their best (lowest) and \nworst \nthe past 24 h. \nCurrent, best and worst pain ratings were averaged for \npurposes of analysis. \n\nHealthcare utilization predictors \nWe collected potential predictors by self-reported ques- \ntionnaires at initial evaluation using an online study web- \nsite. Participants were directed back to the study website \n4 weeks following initial evaluation to again complete \nquestions on pain intensity, disability, and pain-related \npsychological distress. Change in pain intensity, disability, \nand pain-related psychological distress from baseline to \n4 weeks were modeled as treatment response variables \nand included as potential predictors. \n\n(highest) pain intensity over \n\nRegion-specific disability \nSelf-reported region-specific disability was assessed with \nthe Neck Disability Index [27, 28], Oswestry Disability \nQuestionnaire [29, 30], Quick Disability of Arm Shoulder \nand Hand [31] or International Knee Documentation \nCommittee Subjective Knee Form [32] for cervical, low \nback, shoulder and knee pain, respectively. Region-specific \ndisability measures were z-transformed for purposes of \nanalysis, consistent with our prior work involving multiple \nanatomical regions [33]. ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed5.pdf" + }, + { + "text": "Pain-related clinical variables \nPain status was determined using established definitions \nthat account for the duration of pain and activity limita- \ntions [22, 23] using the following two questions: 1) \n“How long have you been experiencing your current \npainful symptoms?” and 2) “Have you experienced ANY \npain and activity limitations every day for the past 3 \nmonths?” Responses to question 1 of “greater than 90 \ndays” or responses to question 2 of “Yes” were used to \nclassify patients as having persistent pain at \ninitial \nevaluation. \n\nPain intensity \nPain intensity was assessed by the numerical pain rating \nscale (NPRS) ranging from “0” (no pain) to “10” (worst ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed5.pdf" + }, + { + "text": "Abstract \n\nBackground: In the United States, value-based purchasing has created the need for healthcare systems to prospectively \nidentify patients at risk for high healthcare utilization beyond a physical therapy episode for musculoskeletal pain. The \npurpose of this study was to determine predictors of pain-related healthcare utilization subsequent to an index episode \nof physical therapy for musculoskeletal pain. \n\nMethods: This study assessed data from the Optimal Screening for Prediction of Referral and Outcome (OSPRO) \nlongitudinal cohort study that recruited individuals with a primary complaint of neck, low back, knee or shoulder \npain in physical therapy (n = 440). Demographics, health-related information, review of systems, comorbidity and \npain-related psychological distress measures were collected at baseline evaluation. Baseline to 4-week changes in \npain intensity, disability, and pain-related psychological distress were measured as treatment response variables. \nAt 6-months and 1-year after baseline evaluation, individuals reported use of opioids, injection, surgery, diagnostic tests \nor imaging, and emergency room visits for their pain condition over the follow-up period. Separate prediction models \nwere developed for any subsequent care and service-specific utilization. \n\nResults: Subsequent pain-related healthcare utilization was reported by 43% (n = 106) of the study sample that completed \nthe 12-month follow-up (n = 246). Baseline disability and 4-week change in pain intensity were important global predictors \nof subsequent healthcare utilization. Age, insurance status, comorbidity burden, baseline pain, and 4-week changes in pain \nintensity, disability and pain-related psychological distress predicted specific service utilization. ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed5.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
“ Slohool of Psychology and Neuroscerce, University of Glosgraw, Glasgrow, Unifed Kingdom, a Nuffeeld Department of Clinical Neurosclences, University of Oxford, Oxford, United Kingdom
“ Corresponding author. Address : School of Psychology and Neuroscience, University of Glasgow, Glasgow G12 & GQ, United Kingdom. Tel.: + 44 ( I ) 14.33.7023. E - mal address : gregory weirfiglasgow ac. ak ( G. A. Weir ).
Supplemental digital content is available for this article. Direct LRE, citations appear in the printed text and are provided in the HTML and PDF versions of this article on the journal ’ s Web site ( www. painjournalizeline. com ).
Casynging - 10.2004 This Author ( s ): Pubblished / cyi Risifen / riber / ribality, inc. on betweef of the International Association for the Diudy or Plari. This is an open acess anticle detitured under the Creative Commons Attituden Loorse
http :// dx. dbi. org / 10.1097 / l, pain. 00000000000000000332?
", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed2.pdf" + }, + { + "text": "Worker’s Compensation, or other commercial insurance) \ncompared to private insurance, higher baseline disability \nand worsening of pain. In the weighted analysis, subjects \nwith knee pain were less likely to utilize the emergency \nroom than those with low back pain. However, this rela- \ntionship was not significant (p = .06) in the complete case \nanalysis. Of the significant predictors in both models, insur- \nance status was the strongest individual predictor of subse- \nquent emergency room use. \n\nservices, suggesting injection may be the most difficult \nservice to predict with the included variable set. \n\nSurgery \nBaseline disability (OR = 3.13–3.25, p < 0.001), change in \ndisability (OR = 3.04–3.05, p = 0.01) and change in \n10-item OSPRO-YF score (OR = 1.12–1.14, p < 0.05) \nwhere consistent predictors of subsequent surgery. Not- \nably, magnitude of prediction was comparable between \nchange in disability and baseline disability. This was the \nonly parsimonious model to include an OSPRO tool. In \nthis case, an increase in pain-related psychological dis- \ntress measured by the OSPRO-YF 10-item questionnaire \nover the first 4 weeks was associated with higher odds of \nsurgery. The 3 predictors in this model explained just \nover 30% of the variance in surgery utilization. ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed5.pdf" + }, + { + "text": "“Yes” responses were followed by questions regarding \nthe quantity of services utilized (i.e. number of opioid \npainkillers, number of diagnostic tests or number of \nemergency room visits). All utilization questions were \nanswered on a categorical scale (0, 1, 2–5, 5–10, or > 10) \nindicating the quantity of a particular service received \nduring the applicable follow-up timeframe. At 6-month \nfollow-up, study participants reported their use of ser- \nvices for the previous 2 months, allowing a timeframe of \n4 months from initial evaluation for them to complete \nphysical therapy. At 12-month follow-up, study partici- \npants reported their use of services over the previous \n6 months since their last survey. This method provided \nan 8-month overall follow-up period after physical ther- \napy and two follow-up points were included to minimize \nrecall bias. \n\nIntervention \nAll physical therapy treatment was provided at the discre- \ntion of the treating clinician. The duration of the episode, \nthe number of physical therapy visits, and individual treat- \nment parameters (type, \nfrequency) \nwere not collected for pragmatic reasons. In particular, \nclinical and utilization data are not commonly collected in \na standardized format and would need to be extracted \nfrom disparate medical record databases across different \nhealth care systems to assess treatment. This was not feas- \nible given the scope and design of \nthis multisite \nsurvey-based study. However, instead of coding treatment \ntype we included baseline-to-4 week change in pain inten- \nsity, region-specific disability, and OSPRO-YF scores in \neach model as measures of treatment response. In that \nmanner the individual effects of the treatment received \nwere included in the predictive models, without directly \naccounting for the type of treatment. \n\nintensity, duration, ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed5.pdf" + }, + { + "text": "Discussion \nThis study identified novel predictors for pain-related \nutilization outcomes following an episode of physical \ntherapy for a primary complaint of musculoskeletal \npain. The most robust \nfinding from these analyses \nwas that baseline disability and change in pain inten- \nsity over the first 4 weeks following physical therapy \nevaluation were consistent predictors of subsequent \npain-related healthcare utilization in those participants \nthat completed all follow up. Aside from these robust \npredictors, other individual predictors of utilization \nwere highly outcome-specific. High model specificity \nfor utilization outcomes observed in this study is con- \nsistent with a recent systematic review that \nfound \nsimilar levels of model specificity for more traditional \noutcomes \nlike pain intensity, disability and work \nabsenteeism [14]. Across models, health-related vari- \nables were generally stronger predictors than sociode- \nmographic factors, which is also supported by prior \nresearch [15, 16]. Additionally, there were cases when \nprediction models were improved for specific services \n(e.g. surgery, use of opioids) when considering change \nin pain, disability or pain-related psychological dis- \ntress. A notable finding is that the OSPRO-YF had \nthe greatest utility when used to measure change in \npain-related psychological distress. Current risk pre- \ndiction paradigms in musculoskeletal pain consider \nonly baseline pain-related psychological distress. How- \nthese results underscore the importance of \never, ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed5.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
21.Beneciuk JM, Lentz TA, He Y, Wu SS, George SZ. Prediction of persistent
musculoskeletal pain at 12 months : a secondary analysis of the Optimal Screening for Prediction of Referral and Outcome ( OSPRO ) validation cohort study. Phys Ther. 2018 ; 98 : 290 - 301.22.
Freburger JK, Yolmes GM, Agars RP, Jxckman AM, Dierter JD, Wollace AS, et al. The rising prevalence of chronic low back pain. Arch Intern Med. 2009 : 169.251 – 8.23.
Carey ' TS, Freburger JK, Holmes GM, Jackman A, Knauer S, Wallace A, et al. Race, care seeking, and utilization for chronic back and neck pain :population perspectives. J Pain Off J Am Pain Soc. 2010 ; 11 : 343 – 50
24.Jensen MP, Turner JA, Romano JM, Fisher LD. Comparative reliability and validity of chronic pain intensity measures. Pain. 1999 ; 83 : 157 – 62.
25.Boltton JE. Accuracy of recall of usual pain intensity in back pain patients. Pain. 1999803.533 – 9.
26.Childs JD, Piva SR, Frkz JM. Responsiveness of the numeric pain rating scale
27.in pirients with low back pain. Spine. 2005 ; X01331 – 4. Venon H. The neck disability index. state - of - the - art, 1991 - 2008. J Manip Physiol Ther. 2008 ; 31491 – 502.
28.Vemon H, Mlor S. The neck disability index : a study of reliability and validity. J Manip Physiol Ther. 1991 ; 14409 – 15.
29.Hudon - Cook N, Tomes - Nicholson K, Breen A. A revised Oswestry disability questionnaire, In Rioland M. Jerner J. editos. Bioli pairs new approaches to rehabilitation and education. New York Manchester Uriviversity Press, 1989. p. 187 –
30.Fritz. IM, Irrgang JJ. A comparison of a modified Oswestry low back pain disability questionnaire and the Quebec back pain disability scale. Phys Ther. 2001.81 : 776 – 88.
31.Beaton DE, Wright JG, Katz JN, Upper Extremity Collaborative Group. Development of the QuidOASH : comparison of three item - reduction approaches. J Bone Joint Surg Am. 2005 ; 871038 – 46.
32.Irrgang JJ, Anderson AF, Boland AL, Hamer CD, Kurosaka M, Neyret P, et al. Development and validation of the international knee documentation committee subjective knee form. Am J Sports Med 2001 ; 29 : 600 – 13.
33.Butera KA, Lentz TA, Beneciuk JM, George SZ. Preliminary evaluation of a modified STarT back screening tool across different musculoskeletal pain conditions. Phys Ther. 2016 ; 96 : 1251 – 61.
34.Chirison ME, Pompei P, Alex KL, MacKenzie CR. A new method of classifying prognostic comorbidity in longitudinal studies : development and wildation. J Chronic Dis. 1987 ; 40 : 373 - 83.
35.Katz. IN, Chang LC, Sangha O, Fossel AH, Bates DW. Can comorbidity be measured by questionnaire rather than medical record review? Med Care. 1996.94.
36.Geoge S2, Beneckal M, Balosky JE, Limtz TA, Zeppiel G, Pir Q, et al. Development of a review - of - systems screening tool for orthopaedic physical therapists results from the Optimal Screening for Prediction of Referral and Outcome ( OSPRR
37.Lenta : TA, Benecivik JM, Biakosky JIL, Zeppier G, Dix Y, Wu SS, et al. Development of a yellow flag assessment tool for orthopsedic physical therapists : results from the Optimal Screening for Prediction of Referral a Outcome ( OSRKO ) coho
38.Benecivk JM, Fritz JM, George SZ. The STarT back screening tool for prediction of 6 - month clinical outcomes : relevance of change partterms in outpatient physical therapy settings. J Orthop Sports Phys Ther. 201444
39.Myers RH. Classical and modern regression with applications. 2nd ed. Pacific Grove : Duxbury Press ; 2000.
40.Weuve J, Tchetgen Tchetgen E2, Glymour MM, Beck TL, Aggarwal NT, Wilson RS, et al. Accounting for bias due to selective attrition : the example of smoking and cognitive dicline. Epidemiol Canb Mass. 2012.23.119 – 28.
41.Hemiin MA, Hemindez - Diaz S, Robins JM. A structural approach to selection bias. Epidemiol Camb Mass. 2004 ; 15 : 615 – 25.
42.Kent P, Keating JL, Lebzesul - 1lde C. Research methods for subgrouping low bick pain. BMC Med Res Methodol. 2010 ; 10 : 62.
43.Peduzzi P, Concato J, Kemper E, Holford TR, Feinstein AR. A simulation study of the number of events per variable in logistic regression analysis. 2 Clin Epidemiol. 1996 ; 49.127.- 9.
44.Tabachnick BG, Fidell LS. Using multivariate statistics. Sth ed. Boston : Pearson ; 2006.
45.Green SB. How many subjects does it take to do a regression analysis. Multivar Behav Res. 1991.26499 – 510.
", + "page_start": 13, + "page_end": 13, + "source_file": "pubmed5.pdf" + }, + { + "text": "weighted analytic models for each type of healthcare \nservice. \n\nUtilization of individual services \nOpioids \nComorbidity index score (i.e. CCI), baseline pain and \nchange in pain were consistent predictors between the \nmodels of opioid utilization. In these models, higher pain \n(OR = 1.70–1.76, \n(OR = 1.54–1.60, \np < 0.001) and increase in pain (OR = 1.70–1.71, p < 0.001) \nwere associated with higher odds of opioid utilization. \nThese models explained approximately 30% of the variation \nin opioid use. \n\nAny healthcare \nfor any healthcare \nThe final parsimonious models \nutilization differed slightly between complete case and \nweighted analyses (Table 6). Included in the models were \nchronicity of symptoms, CCI, baseline pain, baseline dis- \nability, and change in pain from baseline to 4-week \nfollow-up. However, only baseline disability (OR = 1.48– \n2.47, p < 0.05) and change in pain (OR = 1.28–1.45, \np < 0.05) were significant predictors in both models, with \ngreater baseline disability and worsening pain associated \nwith higher odds of any utilization. \n\np < 0.001), CCI \n\nInjection \nA combination of race, chronicity and baseline disability \nexplained slightly more than 20% of the variance in ", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed5.pdf" + }, + { + "text": "Diagnostic tests or imaging \nComorbidity index score (OR = 1.35–1.45, p < 0.05), \nbaseline disability (OR = 2.25–2.66, p < 0.001), and base- \nline to 4-week change in pain intensity (OR = 3.04–3.05, \np = 0.01) were significant predictors of diagnostic test or \nimaging utilization. Among these, baseline disability was \nthe strongest predictor. In these models, higher comor- \nbidity index, higher baseline disability and worsening \npain were associated with higher odds of utilization. \nTogether, these variables explained approximately 30% \nof the variance in utilization. \n\nEmergency room \nModels for emergency room use had the highest pseudo-R2 \nvalues of any individual service (0.48–0.50), but also had \nthe largest number of predictors (8–9). Agreement between \ncomplete case and weighted models was moderate. The \nmodels converged on the following predictors: age (OR = \n0.91–0.94, p < 0.05), insurance (OR = 8.99–13.15, p < 0.05), \nbaseline disability (OR = 3.33–4.88, p < 0.001), and change \nin pain (OR = 1.59–1.77, p < 0.05). Higher utilization was \nassociated with younger age, other insurance (e.g., self-pay, ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed5.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed5.pdf", + "query": "What are the health consequences of musculoskeletal pain ?", + "target_page": 1, + "target_passage": "Musculoskeletal pain is a prevalent and costly health condition with far-reaching public health consequences including chronic pain, disability and opioid-related ad diction [1].", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "**The term ‘Musculoskeletal diseases’**covers the most common group of diseases (ICD 11-15 \n‘Diseases of the musculoskeletal system or connected tissue’).235 These diseases have the highest \nprevalence, approximately 60% of the EU working population report one or several MSDs. 236 MSDs that \nare caused or made worse by work can be defined as work-related MSDs.237 Work-related MSDs arise \nfrom regular exposure to a certain posture or workload. It is a problem that affects all forms of working \nenvironments, from physically arduous work to low-intensity static work.238 \n\nMoreover,**the prevalence of MSDs is not decreasing**, as could be expected due to the sectoral shifts \nof workforce from industry and agriculture to services. The authors of the EU-OSHA study ‘Work-related \nmusculoskeletal disorders: why are they still so prevalent?’ consider several reasons for this: the \nergonomic burden shifted to other tasks, for example, handling of patients instead of handling of heavy \nloads, more inactivity with other musculoskeletal consequences, more time pressure, an ageing \nworkforce, and inadequate work organisation and contractual arrangements. 239 \n\nThe tremendous shift of workforce to administrative and often digitalised work contributes to an increase \nof the number of workers suffering from the consequences of**physical inactivity**due to**permanent**\n**sedentary work**, mostly with digital equipment. The figure below shows the spread of these diseases \nin different occupations.240 ", + "page_start": 86, + "page_end": 86, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Background \nMusculoskeletal pain is a prevalent and costly health \ncondition with far-reaching public health consequences \nincluding chronic pain, disability and opioid-related ad- \ndiction [1]. Clinical practice guidelines now recom- \nfrontline \nmend non-pharmacological \nmanagement for musculoskeletal pain, which will lead \n\nto increased utilization of services such as physical \ntherapy [1–3]. Physical therapy is effective for improving \ndisability and reducing costs associated with many muscu- \nloskeletal pain conditions [4–9]. However, pain-related \nhealthcare utilization beyond the physical therapy episode \n(e.g. subsequent use of surgery, injection, opioids, etc.) \nmay indicate suboptimal treatment response, the presence \nof more complex needs, or unwarranted escalation of care. \nDownstream healthcare utilization is not often considered \nas an outcome of care or indication of treatment effective- \nness for musculoskeletal pain. But the importance of \n\ntreatment as \n\n*Correspondence: trevor.lentz@duke.edu \n1Duke Clinical Research Institute, Duke University, 2400 Pratt Street, Durham, \nNC 27705, USA \nFull list of author information is available at the end of the article \n\n© The Author(s). 2018 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 \nInternational License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and \nreproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to \nthe Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver \n(http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated. ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed5.pdf" + }, + { + "text": "Quite well studied is the increased prevalence of musculoskeletal diseases, if not only ergonomic risks \nbut also high psychosocial risks are prevalent at the workplace.185 Research has also found unexpected \nconnections like the synergistic effect of noise and certain chemicals on hearing impairments. Such \noutcomes of multi-risk profiles are often particularly difficult to identify and understand. Obviously, most \nsectors and occupations involve workplaces with**multi-risk profiles**. Some prominent major risks in \ncertain sectors or occupations are: \n\n• agriculture = accidents, chemical and biological agents, UV exposure; \n• delivery services = traffic accidents, ergonomics, time pressure, exhaust fumes; \n• decentralised renewable energy construction and maintenance = falls from height, electricity; \n• waste and recycling = biological and chemical agents, cuts and accidents; \n• mobile work = ergonomics, work without time and space limits; \n• \ncare at home = emotional, ergonomic, difficult clients, unsafe household situations, infection \nrisks; \n\n• healthcare = emotional, ergonomics, biological; \n• personal and household services = emotional, ergonomic, unsafe household situations, e.g. \n\nunsafe electrical equipment, exposure to unknown chemicals; \nlong-haul sea, train, road or air transport = atypical working times, shift work, monotony, long \nphases of physical inactivity; \ncar repair = ergonomics, dust and fumes, chemicals; \nconstruction = falls from height, accidents with machinery or vehicles, slips, trips and falls, \nergonomics, noise, chemicals, dust, UV exposure, etc. \n\n• \n\n• \n• ", + "page_start": 75, + "page_end": 75, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "This study was undertaken in a nationwide, US cohort \nof patients receiving outpatient physical therapy for a \nprimary complaint of knee, shoulder, back or neck pain. \nThe primary aim of the analysis was to predict incidence \nof additional pain-related healthcare utilization in the \nyear following the episode of physical therapy for mus- \nculoskeletal pain. We considered factors not commonly \nassessed in outcomes prediction for musculoskeletal \npain, \nlike insurance, comorbidities, and treatment re- \nsponse, as well as those more often associated with \npain-related outcomes (e.g. psychological distress). This \nproject will lead to the development of potentially novel \noutcome prediction models for this population in a com- \nmon, non-pharmacological US healthcare setting. The \nresults of this study will be particularly important in \nvalue-based payment settings where enhanced clinical \ndecision-making drives treatment effectiveness and sys- \ntem efficiency. ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed5.pdf" + }, + { + "text": "the study is longitudinal \nfollow-up at multiple time points following an episode \nof physical therapy for a variety of musculoskeletal pain \nconditions. Anatomical location of pain was not a sig- \nnificant predictor of healthcare use in all but one model, \na \nsuggesting results \nspectrum of musculoskeletal pain conditions. Another \nstrength of this cohort study is the assessment of various \nhealthcare utilization outcomes of interest for establish- \ning health policy. When considered alongside more trad- \nitional pain- or disability-related outcomes prediction \nmodels, these findings will improve the ability of health- \ncare systems and providers \nin \nvalue-based purchasing environments. The consideration \nof multiple screening tools (i.e. yellow flags and review \nof systems) and treatment monitoring variables is also a \nstrength of this study as screening and systematic treat- \nment monitoring are not routine in clinical practice. A \nfinal strength is inclusion of multiple sociodemographic, \nhealth-related and psychosocial factors as potential pre- \ndictors. Healthcare outcomes and utilization exhibit \nemergent properties that require the consideration of \nexplain [50]. \nmultiple, \n\nThe primary strength of \n\nare widely applicable across \n\nUtilization outcomes benchmarks have not been estab- \nlished to determine how the percentage of subsequent \nhealthcare use in this study compares to outcomes using \nother health services. Prior studies suggest physical ther- \napy is associated with reduced incidence of additional \nhealthcare use compared to not using physical therapy \nin patients with acute low back pain [10, 49]. Some competing factors to fully ", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed5.pdf" + }, + { + "text": "Prospective identification of risk for high subsequent \nhealthcare utilization is a different approach to out- \ncomes prediction for musculoskeletal pain [12, 13] and \none that has not been evaluated in physical therapy set- \ntings in the US. Most existing outcomes prediction \nmodels focus on pain and disability endpoints [12–14]. \nThey also concentrate on condition-specific and psycho- \nlogical predictors, with less attention to factors that could \ninfluence healthcare utilization more directly [15–17]. \nThese factors include insurance, comorbidities, symp- \ntoms unrelated to the pain condition, and treatment \nresponse. As \nresult, predictors of pain-related \nhealthcare utilization beyond physical therapy are un- \nthese predictors \nknown. A better understanding of \nwill have significant implications for future healthcare \npathway development. For instance, an influence of \nmodifiable factors like pain-related psychological dis- \ntress might imply the need to build clinical pathways \nthat address those factors directly through physical \ntherapist provided intervention. Additionally, under- \nstanding the relative predictive capabilities of baseline \nversus change estimates for modifiable factors would \nclarify whether prediction is improved by routinely \nassessing outcomes during the course of \ntreatment \n(i.e. treatment monitoring) [18]. \n\na ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed5.pdf" + }, + { + "text": "The trend towards more psychosocial and emotional challenges at work**does not mean that ‘classical’**\n**exposures**or**ergonomically burdensome work has disappeared**. There is a large number of \nworkers in all sectors — between 40% and 75% in ESENER and the EWCS — who report**ergonomic**\n**risks**. These are, for example, repetitive hand and arm movements in industry and service occupations, \nwhere a particularly high percentage is reported by low-skilled manual workers; moving heavy loads in \ncraft occupations, or patients in health and care occupations, where a particularly high percentage is \nreported by high-skilled manual workers; and tiring and painful positions, where again the highest level \nis reported by high-skilled manual workers. \n\nStill a quite constant share of workers reports**exposure to physical risks like noise, vibrations, high**\n**or low temperatures and to chemical and biological agents**; depending on occupation and sector, \nbetween 15% and 30% of workers are exposed to such risks (EWCS). No or very minor decreases in \nthese risks can be seen during the past 15 years. ", + "page_start": 9, + "page_end": 9, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**Figure 27: Prevalence of musculoskeletal diseases – EWCS 2015**\n\n", + "page_start": 87, + "page_end": 87, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "233 Norder et al., 2017: Beyond return to work from sickness absence due to mental disorders: 5-year longitudinal \nstudy of employment status among production workers, here \n234 Leka & Jain, 2017: EU Compass for Action on Mental Health and Well-Being - Mental Health in the Workplace \nin Europe \n235 Musculoskeletal disorders refer to backache and/or muscular pains in shoulders, neck, upper limbs and/or \nlower limbs (hips, legs, knees, feet, etc.). In the medical systematic it is the IC 10 group of diseases: Diseases of \nthe musculoskeletal system and connective tissue. \n236 EU-OSHA, 2019: Work-related musculoskeletal disorders: prevalence, costs and demographics in the EU \n237 Graveling, 2018: Ergonomics and Musculoskeletal Disorders (MSDs) in the Workplace. A Forensic and \nEpidemiological Analysis \n238 Da Costa & Viera, 2010: Risk factors for work-related musculoskeletal disorders: a systematic review of recent \nlongitudinal studies, here \n239 EU-OSHA, 2020: Work-related musculoskeletal disorders: why are they still so prevalent? Evidence from a \nliterature review (p. 15). \n240 EU-OSHA, 2019: Summary - Work-related musculoskeletal disorders: prevalence, costs and demographics in \nthe EU (p. 8). \n241 EU-OSHA, 2019: Work-related musculoskeletal disorders: prevalence, costs and demographics in the EU \n242 Ibid., p. 174ff. ", + "page_start": 149, + "page_end": 149, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Discussion \nThis study identified novel predictors for pain-related \nutilization outcomes following an episode of physical \ntherapy for a primary complaint of musculoskeletal \npain. The most robust \nfinding from these analyses \nwas that baseline disability and change in pain inten- \nsity over the first 4 weeks following physical therapy \nevaluation were consistent predictors of subsequent \npain-related healthcare utilization in those participants \nthat completed all follow up. Aside from these robust \npredictors, other individual predictors of utilization \nwere highly outcome-specific. High model specificity \nfor utilization outcomes observed in this study is con- \nsistent with a recent systematic review that \nfound \nsimilar levels of model specificity for more traditional \noutcomes \nlike pain intensity, disability and work \nabsenteeism [14]. Across models, health-related vari- \nables were generally stronger predictors than sociode- \nmographic factors, which is also supported by prior \nresearch [15, 16]. Additionally, there were cases when \nprediction models were improved for specific services \n(e.g. surgery, use of opioids) when considering change \nin pain, disability or pain-related psychological dis- \ntress. A notable finding is that the OSPRO-YF had \nthe greatest utility when used to measure change in \npain-related psychological distress. Current risk pre- \ndiction paradigms in musculoskeletal pain consider \nonly baseline pain-related psychological distress. How- \nthese results underscore the importance of \never, ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed5.pdf" + } + ] + }, + { + "references": { + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf", + "query": "What is Creative Commons ?", + "target_page": 2, + "target_passage": "Creative Commons (CC) is the global nonprofit organization behind the CC Licenses and public domain tools, which power open sharing on popular platforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Creative Commons (CC) is the global nonprofit organization behind the CC \nLicenses and public domain tools, which power open sharing on popular \nplatforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. \nSince 2002, the CC Licenses have served as an alternative to traditional \ncopyright, providing a simple, standardized, and legal way for individuals and \ninstitutions to freely share images, music, research, educational resources, and \ncultural artifacts. \n\n**Chief Executive Officer**\nAnna Tumadóttir \n\n**General Counsel**\nKat Walsh ", + "page_start": 1, + "page_end": 1, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "2023 was a busy year at Creative \nCommons. Our**Open Culture**program \nand**Open Climate Campaign**entered \ntheir third and second years, respectively. \nWe hosted our first in-person CC Global \nSummit since 2019 in Mexico City. We \nheld critical consultations and open \npanels on AI, copyright, and the CC \nLicenses, cultural heritage, education, \nand science; and we launched our**Open**\n**Infrastructure Circle**in an effort to \nensure the CC Licenses are funded well \ninto the future. ", + "page_start": 2, + "page_end": 2, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**THREE-LAYER DESIGN**\nCreative Commons (CC) license has three layers: \n\n\"Legal Code\" (base layer): contains terms and conditions to be \nused by lawyers and legally applicable in court. \n\"Human Readable\" (commons deeds): contain the summary of \nthe legal code and key terms. \n\"Machine Readable\": contains HTML or codes for machines to \nrecognize a work is available under a Creative Commons license. ", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn \nOtis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open \nand public domain works. View full licensing and attribution information about all works included in the \nvideo on Flickr. ", + "page_start": 11, + "page_end": 11, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "Public domain works are valuable because anyone \ncan freely build upon, enhance, and reuse them for \nany purposes without restriction under copyright \nor database law. \n\nThat’s why it’s important for creators to have a clear and \nlegally robust way to place their works in the public domain as \ncompletely as possible, and it’s also important for publishers \nand archives to have a standardized way to identify works that \nare already in the public domain. \n\nCreative Commons supports two distinct public domain tools, \nthe CC0 Public Domain Dedication and the Public Domain \nMark. Creative Commons copyright licenses help authors \nmanage their copyright on terms they choose. Conversely, CC0 \nenables authors and copyright owners who want to dedicate \ntheir works to the worldwide public domain to do so, and PDM \nfacilitates the labeling and discovery of works that are already \nfree of known copyright restrictions. \n\nWhere public domain tools fit in the copyright spectrum \n\nCC0 \nPublic \ndomain \nSome rights \nreserved All rights \nreserved \n\nPDM \nNo known \ncopyright ", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "CC BY (\"Attribution\") allows people to use the work for any purpose (even \ncommercially and even in modified form) as long as they give attribution to the \ncreator. \nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose \n(even commercially and even in modified form), as long as they give attribution to the \ncreator and make any adaptations they share with others available under the same or \na compatible license. \nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for \nnoncommercial purposes only, and only as long as they give attribution to the \ncreator. \nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the \nwork for noncommercial purposes only, and only as long as they give attribution to \nthe creator and make any adaptations they share with others available under the \nsame or a compatible license. \nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for \nany purpose (even commercially), as long as they give attribution to the creator. \nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the \nunadapted work for noncommercial purposes only, and only as long as they give \nattribution to the licensor. ", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "Texts are adapted from CC Certification for Educators. CC BY license. \nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. \n3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. \nLine, icons, and gradients are from Canva, and subject to their policies. ", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "**Areas of Exploration**\n\n**Support for Creators in the**\n**Time of Artificial Intelligence**\n\nIn 2023, we convened hundreds via \nroundtables, community conferences \n(e.g.**MozFest**,**Wikimania**), and public \nevents (e.g. symposium on**Generative**\n**AI & Creativity**)to debate copyright law, \nthe ethics of open sharing, and other \nrelevant areas that touch AI. \n\nAt our CC Global Summit, participants \ndrafted**community-driven principles**\non AI that are a valuable input and will \nhelp inform the organization’s thinking \nas we determine CC’s exact role in the AI \nspace. ", + "page_start": 8, + "page_end": 8, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": " In this way, we do not use “commons” in the narrow sense of permissively licensed. What’s more, this \n4 \nresource could also be governed as more of a data “trust,” and, indeed, we discuss extensively the work \nof HathiTrust as a relevant project in this domain. However, our use of the word “commons” is not \nmeant to preclude this or other arrangements. \n\n There are, of course, a range of other types of texts that are not on the web and/or not digital at all - \n5 \ne.g., periodicals, journals, government documents. These are out of scope for this paper, but also worthy \nof further analysis. ", + "page_start": 2, + "page_end": 2, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "We also marked transitions in leadership. \nAt the end of December, Catherine Stihler \nconcluded her time as Chief Executive \nOfficer (CEO) at Creative Commons, and I \ntransitioned in as Interim. In March 2024, I \nwas appointed CC’s permanent CEO. I \nlook forward to working closely with our \nBoard of Directors, staff, and larger \ncommunity on**the critical work that**\n**awaits us in 2024**. ", + "page_start": 2, + "page_end": 2, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + } + ] + }, + { + "references": { + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf", + "query": "When was the first CC licence created?", + "target_page": 4, + "target_passage": "The first CC License was created in 2002.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Licenses and Public Domain Tools**\n\nThe first CC License was created in 2002. Today, we boast**six CC Licenses**and \ntwo public domain tools, setting a global standard for sharing. \n\n**We’ve estimated that over 2.5 billion pieces of content**\n**were CC Licensed by the end of 2023.**\n\nOur legal and technology staff \ncontinued to make key \ninfrastructure updates and \nmanage daily maintenance to \nensure these Licenses work for \neveryone. ", + "page_start": 3, + "page_end": 3, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**Training in how to use CC Licenses is**\n**key to their adoption.**\n\nWe offer a ten-week**CC Certificate**program that is now tailored not only to the \neducation and library sectors, but also galleries, archives, libraries, and museums \nand**available in 10 languages**. ", + "page_start": 4, + "page_end": 4, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "Creative Commons (CC) is the global nonprofit organization behind the CC \nLicenses and public domain tools, which power open sharing on popular \nplatforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. \nSince 2002, the CC Licenses have served as an alternative to traditional \ncopyright, providing a simple, standardized, and legal way for individuals and \ninstitutions to freely share images, music, research, educational resources, and \ncultural artifacts. \n\n**Chief Executive Officer**\nAnna Tumadóttir \n\n**General Counsel**\nKat Walsh ", + "page_start": 1, + "page_end": 1, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**REMIND THAT…**\nCC license only applicable to the work that is within the scope of \ncopyright law. CC license can be used when … \n\nyou want to give others permissions to freely copy and \nredistribute your work, and \nyou want to give others permission to freely transform, alter, or \notherwise create derivative works based on your work. ", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "**THREE-LAYER DESIGN**\nCreative Commons (CC) license has three layers: \n\n\"Legal Code\" (base layer): contains terms and conditions to be \nused by lawyers and legally applicable in court. \n\"Human Readable\" (commons deeds): contain the summary of \nthe legal code and key terms. \n\"Machine Readable\": contains HTML or codes for machines to \nrecognize a work is available under a Creative Commons license. ", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "(**a**) 1965 c. 57. Section 1 was substituted by paragraph 17 of Schedule 2 to the Energy Act 2013 (c. 32); by virtue of section \n1(2), a licence described in section 1(1) is referred to as a “nuclear site licence”. ", + "page_start": 41, + "page_end": 41, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**In 2023, we greatly expanded our CC Licenses**\n**training and education offerings:**\n\n**19 Workshops & Trainings**\nwith institutions like ALA, Connecticut Humanities & State University of New York, \nDigital Research Alliance of Canada, and WikiConf North America. \n\n**2 Week-Long CC Certificate Bootcamps**\nfor California Community Colleges. \n\n**27 Webinars**\non topics like the basics of Open Culture, the possibilties of Open Educational \nResources (OER) for business-university cooperation, and the future of CC Licenses \nin digital and online education. \n\n**12 CC Legal Open Office Hours**\nhosted by our legal team, providing a personalized opportunity for the CC \ncommunity to ask questions about CC Licenses, open access, and sharing. \n\n\n \n \n \n \n [html]\n
", + "page_start": 4, + "page_end": 4, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**SIX LICENSES**\n\n", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "2023 was a busy year at Creative \nCommons. Our**Open Culture**program \nand**Open Climate Campaign**entered \ntheir third and second years, respectively. \nWe hosted our first in-person CC Global \nSummit since 2019 in Mexico City. We \nheld critical consultations and open \npanels on AI, copyright, and the CC \nLicenses, cultural heritage, education, \nand science; and we launched our**Open**\n**Infrastructure Circle**in an effort to \nensure the CC Licenses are funded well \ninto the future. ", + "page_start": 2, + "page_end": 2, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**3.2.6 How to view licensing information**\n\nLicensing information is available for all datasets associated with common licences, which are \nsupported by the Licence Assistant. When available a link to the assistant is provided on left side of a \ndataset page. \n\nBy clicking on the**licence name**(here: cc-by), the Licence Assistant tool is opened in a new window, \ndisplaying relevant information for this particular licence. ", + "page_start": 33, + "page_end": 33, + "source_file": "edp_s1_man_portal-version_4.3-user-manual_v1.0.pdf" + } + ] + }, + { + "references": { + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf", + "query": "To what subjects Creative Commons expand its work in 2023 ?", + "target_page": 8, + "target_passage": "We expanded our work in biodiversity, climate, and life sciences focused on ensuring that science research and data are open", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "2023 was a busy year at Creative \nCommons. Our**Open Culture**program \nand**Open Climate Campaign**entered \ntheir third and second years, respectively. \nWe hosted our first in-person CC Global \nSummit since 2019 in Mexico City. We \nheld critical consultations and open \npanels on AI, copyright, and the CC \nLicenses, cultural heritage, education, \nand science; and we launched our**Open**\n**Infrastructure Circle**in an effort to \nensure the CC Licenses are funded well \ninto the future. ", + "page_start": 2, + "page_end": 2, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**Areas of Exploration**\n\n**Support for Creators in the**\n**Time of Artificial Intelligence**\n\nIn 2023, we convened hundreds via \nroundtables, community conferences \n(e.g.**MozFest**,**Wikimania**), and public \nevents (e.g. symposium on**Generative**\n**AI & Creativity**)to debate copyright law, \nthe ethics of open sharing, and other \nrelevant areas that touch AI. \n\nAt our CC Global Summit, participants \ndrafted**community-driven principles**\non AI that are a valuable input and will \nhelp inform the organization’s thinking \nas we determine CC’s exact role in the AI \nspace. ", + "page_start": 8, + "page_end": 8, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "Creative Commons (CC) is the global nonprofit organization behind the CC \nLicenses and public domain tools, which power open sharing on popular \nplatforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. \nSince 2002, the CC Licenses have served as an alternative to traditional \ncopyright, providing a simple, standardized, and legal way for individuals and \ninstitutions to freely share images, music, research, educational resources, and \ncultural artifacts. \n\n**Chief Executive Officer**\nAnna Tumadóttir \n\n**General Counsel**\nKat Walsh ", + "page_start": 1, + "page_end": 1, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn \nOtis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open \nand public domain works. View full licensing and attribution information about all works included in the \nvideo on Flickr. ", + "page_start": 11, + "page_end": 11, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**In 2023, we greatly expanded our CC Licenses**\n**training and education offerings:**\n\n**19 Workshops & Trainings**\nwith institutions like ALA, Connecticut Humanities & State University of New York, \nDigital Research Alliance of Canada, and WikiConf North America. \n\n**2 Week-Long CC Certificate Bootcamps**\nfor California Community Colleges. \n\n**27 Webinars**\non topics like the basics of Open Culture, the possibilties of Open Educational \nResources (OER) for business-university cooperation, and the future of CC Licenses \nin digital and online education. \n\n**12 CC Legal Open Office Hours**\nhosted by our legal team, providing a personalized opportunity for the CC \ncommunity to ask questions about CC Licenses, open access, and sharing. \n\n\n \n \n \n \n [html]\n
", + "page_start": 4, + "page_end": 4, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": " See e.g. Comments from Sprigman, Samuelson, Sag to Copyright Office, October 2023, at https:// \n19 \nwww.regulations.gov/comment/COLC-2023-0006-10299 as well as many other submissions to the US \ncopyright office; see also Advocacy, Katherine Klosek, Director of Information Policy and Federal \nRelations, Association of Research Libraries (ARL), and Marjory S. Blumenthal, Senior Policy Fellow, \nAmerican Library Association (ALA) Office of Public Policy and. “Training Generative AI Models on \nCopyrighted Works Is Fair Use.”*Association of Research Libraries*, 23 Jan. 2024, www.arl.org/blog/ \ntraining-generative-ai-models-on-copyrighted-works-is-fair-use/. \n\n See Articles 3 and 4 of the EU’s Directive on Copyright and Related Rights in the Digital Single Market \n20 \n— https://eur-lex.europa.eu/eli/dir/2019/790/oj. \n\n Japan clarified its laws in 2018 to make clear that this type of use is permitted — see discussion in \n\n21 \nTestimony of Matthew Sag, July 2023, https://www.judiciary.senate.gov/imo/media/doc/ \n2023-07-12_pm_-_testimony_-_sag.pdf, see also Fiil-Flynn, S.*et al.*(2022)*Legal reform to enhance global*\n*text and Data Mining Research*,*Science*. Available at: https://www.science.org/doi/10.1126/ \nscience.add6124 (Accessed: 28 Sept. 2023). ", + "page_start": 10, + "page_end": 10, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "We also marked transitions in leadership. \nAt the end of December, Catherine Stihler \nconcluded her time as Chief Executive \nOfficer (CEO) at Creative Commons, and I \ntransitioned in as Interim. In March 2024, I \nwas appointed CC’s permanent CEO. I \nlook forward to working closely with our \nBoard of Directors, staff, and larger \ncommunity on**the critical work that**\n**awaits us in 2024**. ", + "page_start": 2, + "page_end": 2, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**Our Impact**\n\nCC believes that opening up knowledge is key to addressing the world’s most \npressing challenges. Today, we steer campaigns, programming, and training in \nmany areas: \n\n**Open Culture**\n2023 was quite a year for the CC \nOpen Culture Program, thanks to \ngenerous funding from**Arcadia**. \nWe grew our Open Culture team \nfrom one to two and a half staff, \nrolling out new initiatives like \nTAROC (Towards a \nRecommendation on Open \nCulture) and**Open Culture Live:**\n**A Webinar Series**. We invite you \nto read “**What did Creative**\n**Commons do for Open Culture**\n**in 2023?**” to learn more. \n\n**Open Education**\nWe delivered workshops and \npresentations on CC Licenses and \nOpen Educational Resources at \nover 16 conferences and events. \nThe CC Open Education Platform \nalso funded six global projects, \n**including work to advance the**\n**UNESCO Recommendation on**\n**OER.**", + "page_start": 6, + "page_end": 6, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": " See Hansen, Dave. “Fair Use Week 2023: How to Evade Fair Use in Two Easy Steps.”*Authors Alliance*, \n23 \n23 Feb. 2023, www.authorsalliance.org/2023/02/23/fair-use-week-2023-how-to-evade-fair-use-in-two- \neasy-steps/. Accessed 20 Mar. 2024. \n\n See Band, Jonathan. “Protecting User Rights against Contract Override.”*Joint PIJIP/TLS Research*\n24 \n*Paper Series*, 1 May 2023, digitalcommons.wcl.american.edu/research/97/. Accessed 20 Mar. 2024. \n\n In the U.S. the Copyright Office has recognized the importance of allowing particular exceptions for \n\n25 \nresearchers engaged in text and data mining. See their rulemaking in 2021 https:// \nwww.federalregister.gov/documents/2021/10/28/2021-23311/exemption-to-prohibition-on- \ncircumvention-of-copyright-protection-systems-for-access-control. These rules are reviewed triennially \nand are currently under review, with submissions suggesting both contraction and expansion; see the \nAuthors’ Alliance comments in January 2024 https://www.authorsalliance.org/2024/01/29/authors- \nalliance-submits-long-form-comment-to-copyright-office-in-support-of-petition-to-expand-existing-text- \nand-data-mining-exemption/. It is possible that one could argue for these exceptions to be expanded, \nand then work to renew that exception every three years. The EU’s text and data mining exception may \nalso limit use of DRM to impede data mining, but only for particular covered research and heritage \ninstitutions; commercial and other users are not covered, however. ", + "page_start": 11, + "page_end": 11, + "source_file": "creative_common_ai.pdf" + }, + { + "text": " In the EU, the 2019 Copyright Directive introduced specific provisions on the \"use of out-of-commerce \n\n17 \nworks and other subject matter by cultural heritage institutions\" (Articles 8-11 CDSMD). These \nprovisions allow cultural heritage institutions to \"make available, for non-commercial purposes, out-of- \ncommerce works or other subject matter permanently in their collections\". The limitation to non- \ncommercial purposes means that works made available under these provisions would be of limited use \nin building a books data commons. \n\n For one assessment of the difficulties of complying with the CC licenses in this context, to the extent \n18 \nthey are applicable, see Lee, K., A. Feder Cooper, & Grimmelmann, J. (2023). Talkin’ ‘Bout AI Generation: \nCopyright and the Generative AI Supply Chain. Forthcoming,*Journal of the Copyright Society*2024. \nhttps://doi.org/10.2139/ssrn.4523551. ", + "page_start": 9, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + } + ] + }, + { + "references": { + "source_file": "TSX_KMP_2013.pdf", + "query": "From which country does Killam Properties Inc originate ?", + "target_page": 3, + "target_passage": "Killam Properties Inc. is a growth oriented Canadian real estate company.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "about Killam properties inc. \nKillam Properties Inc. is a growth oriented Canadian real estate \ncompany. We own, manage and develop multi-family residential \nproperties in Atlantic Canada and Ontario. Since our first acquisition \nin 2002, our real estate portfolio has grown to $1.5 billion and \nincludes 12,647 apartment units and 5,164 manufactured home \ncommunity (MHC) sites. We are committed to growing Killam’s \nearnings by maximizing the returns from our existing portfolio and \nexpanding through acquisitions and development. \n\nour mission \nTo have a team of caring staff deliver clean, safe, quality housing to \ntenants who are proud to call our properties home. \n\nour core Values \n\nDo the \n**Right**\nThing \nStrong \n**Customer**\nRelationships Creative \n**Solutions** Curb \n**Appeal** **Build**\nCommunity ", + "page_start": 2, + "page_end": 2, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**PART II**\n\n**Business Overview**\n\nKillam Properties Inc., based in Halifax, Nova Scotia, is one of Canada’s largest residential landlords, owning, operating, managing and developing \nmulti‑family residential and Manufactured Home Community (“MHC”) properties. Killam’s 164 apartment properties are located in Atlantic \nCanada’s six largest urban centres and in Ontario. The Company’s 35 MHCs are located in Ontario and Atlantic Canada. The value of Killam’s \nreal estate assets at December 31, 2013, was $1.5 billion. Killam is focused on growing its portfolio, maximizing the value of its properties and \nincreasing FFo per share. \n\nKillam was founded in 2000, based on the recognition of an opportunity to create value through the consolidation of apartments in Atlantic \nCanada and MHCs across Canada. Killam’s first apartment was purchased in 2002 and its first MHC was purchased in 2003. From 2002 to 2009, \nKillam’s apartment portfolio grew through the acquisition of properties in Atlantic Canada’s six largest cities, namely Halifax, Moncton, Saint \nJohn, Fredericton, St. John’s and Charlottetown. Killam is now Atlantic Canada’s largest residential landlord, with a 14.2% market share of the \nmulti‑family rental units in these core markets. Killam entered the Ontario apartment market in 2010, and today owns twelve properties in the \nprovince, including assets in Toronto, Ottawa, London and Cambridge. Killam plans to expand its presence in Ontario with additional acquisitions \nand developments. The apartment business is Killam’s largest business segment, accounting for 86% of the Company’s NOI from property \noperations and equity income in 2013. At December 31, 2013, Killam’s apartment portfolio consisted of 12,647 units. ", + "page_start": 22, + "page_end": 22, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**1. Corporate Information**\n\nKillam Properties Inc (“Killam” or the “Company”) is a real estate company specializing in the acquisition, management and development of \nmulti‑residential apartment buildings and manufactured home communities in Canada. Killam is incorporated under the Canada Business \nCorporations Act. Killam’s common shares are publicly traded and listed on the Toronto Stock Exchange under the symbol “KMP”. The \nconsolidated financial statements comprise the financial statements of Killam and its subsidiaries as at December 31, 2013**.**the company’s \nhead office operations are located at 3700 Kempt Road, Halifax, Nova Scotia, B3K 4X8 and the Company’s registered office is located at \n2571 Windsor Street, Halifax, Nova Scotia, B3K 5C4. \n\nThe consolidated financial statements of the Company for the year ended December 31, 2013, were authorized for issue in accordance \nwith a resolution of the Board of Directors on Tuesday, February 18, 2014. \n\n**2. Significant Accounting Policies**\n\n**(A) Statement of Compliance**\n\nThese consolidated financial statements have been prepared in accordance with International Financial Reporting Standards (“IFRS”) as \nissued by the International Accounting Standards Board (“IASB”). ", + "page_start": 69, + "page_end": 69, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "increasing Geographic \nDiversification \n\nWith a home base in Halifax, Killam’s roots are in atlantic canada and the \ncompany has successfully grown by consolidating the residential real estate \nmarket in the region’s urban centres. in order to meet its long-term growth \ntargets and increase its investment in canada’s most dynamic real estate \nmarkets, Killam has been actively expanding its apartment portfolio in ontario \nand is exploring investment opportunities in Western canada. since 2010, \nKillam has expanded its apartment target markets to include specific cities \nin ontario, and has invested approximately $200 million in real estate assets \nin the province. approximately 15% of Killam’s 2014 net operating income is \nexpected to be earned in ontario. the company has set a long-term target to \nearn 50% of its net operating income outside atlantic canada. ", + "page_start": 16, + "page_end": 16, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "\n\nKillam properties inc \n**2013 annual report**", + "page_start": 0, + "page_end": 0, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Killam also has a 19% market share in Charlottetown, the capital and economic center of Prince Edward Island. \n\n**Expanding Ownership in Ontario**\n\nKillam’s apartment portfolio includes 1,359 apartment units in Ontario, up from 225 units three years ago, and includes properties in Ottawa, \nToronto, London and Cambridge. In addition to apartments, 42% of Killam’s MHC sites are located in Ontario. Killam is focused on increasing its \ngeographic diversification by acquiring more properties in Ontario. \n\n**A Diversified Portfolio of Apartment Properties**\n\nKillam’s apartment portfolio includes a variety of property types, including high‑rise (24% of units), mid‑rise with elevators (33%) , walk‑ups (41%) \nand a small number of townhouses (2%). The portfolio includes rents ranging from affordable to high‑end Class A properties. The average rent \nfor Killam’s apartment units at the end of 2013 was $915. \n\nThe average age of Killam’s apartment portfolio is 28 years. With a focus on both developing and acquiring newer properties, 23% of Killam’s \napartments are considered new (built after 2001), on a unit count basis. Compared to the national average of 7%, as per CMHC’s 2010 Housing \nObserver, Killam’s portfolio is considerably newer and should result in lower capital and maintenance costs for the foreseeable future. 43% of \nKillam’s noi is generated from apartment units that are considered new, with 20% of the company’s noi generated from units built in the last \nfive years. ", + "page_start": 32, + "page_end": 32, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "a Diversified portfolio \n\nKillam has a diverse portfolio of both apartments and manufactured home communities. The \napartment portfolio represents 86% of Killam’s earnings and includes a variety of property types, \nsuch as high-rises, mid-rises and walk-ups, in nine urban centres across five provinces. With a wide \nselection of properties and price points in each city, Killam caters to a broad tenant base. \nKillam’s 35 manufactured home communities represent 14% of earnings and are located \nprimarily in Nova Scotia and Ontario. The manufactured home communities complement the \napartment business, providing stable and predictable cash flows. ", + "page_start": 12, + "page_end": 12, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Geographic Diversification is a Priority**\n\nGeographic diversification is a priority for Killam. Our asset base in Atlantic \nCanada is the foundation of the Company; however, with Atlantic Canada \nrepresenting only 5% of the Canadian rental market, our growth opportunities \nincrease significantly by expanding our target markets outside of this region. \nWith its strong operating platform, Killam can support a larger and more \ngeographically diverse portfolio. We are actively growing a portfolio of \napartments in Ontario in three target markets: Ottawa, the Greater Toronto \nArea, and Southwestern Ontario. An increased investment outside Atlantic \nCanada will increase not only Killam’s growth potential, it will also expand the \nCompany’s diversification and exposure to higher growth markets. \n\nAcquisitions in Ontario represented 45% of acquisitions in 2013. In addition \nto 1,359 apartment units in the province, we also have 2,144 manufactured \nhome community sites, representing 29% of the MHC NOI last year. Based on \nour current portfolio, 15% of Killam’s 2014 NOI will be generated in Ontario, \ncompared to our longer-term goal of generating 50% of NOI outside Atlantic \nCanada. We expect to reach this goal by focusing acquisition activity in \nOntario, with the majority of future investment anticipated in the province over \nthe next few years. We will look for additional development opportunities in \nOntario and we are exploring opportunities in Western Canada, attracted by \nthe strong population growth trends in Alberta’s urban markets. ", + "page_start": 10, + "page_end": 10, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Geographic**\n**Diversification**\n\n2013 acquisition \nprogram to include \ninvestments in Ontario. \n\nTarget achieved. Killam acquired $55 million in \nOntario real estate in 2013, representing 45% \nof its acquisition program in the year. Assets \nacquired included a 102-unit property in \nOttawa, a newly built, 179-unit, mixed-used \nproperty in downtown Toronto and a 5.2 acre \nparcel of land for development in Cambridge, \nOntario. \n\n**Growth in Same Store**\n**Net Operating Income**\n**(NOI)**\n\nSame store NOI growth \nof 2% to 4% in 2013. \n\nTarget not achieved. Despite generating 1.8% \ngrowth in same store revenue, high natural gas \nprices in Atlantic Canada caused total same \nstore utility and fuel expenses to increase 13.8% \nduring the year, which resulted in a decrease in \nsame store NOI of 0.4% for the year. ", + "page_start": 7, + "page_end": 7, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "With strong demand for the acquisition of apartments over the last three years, cap‑rates have declined and the pricing differential between \nolder and newer buildings has reduced. This enables Killam to increase the amount of newer apartments in its portfolio without paying a \nsignificant premium for quality assets. \n\n**Geographic Diversification**\n\nGeographic diversification in the apartment segment is a priority for Killam. With a 14.2% market share in its core markets in Atlantic Canada, \nKillam is the region’s largest residential landlord. The maximum market share Management foresees Killam reaching in Atlantic Canada is \nbetween 15%‑18%. With Atlantic Canada representing only 4.9% of the Canadian rental market, Killam’s growth opportunities increase \nsignificantly when considering assets outside Atlantic Canada. \n\nWith its strong operating platform, Killam can support a larger and more geographically diverse portfolio. The Company is actively building \na portfolio in targeted Ontario markets, including Ottawa, the Greater Toronto Area, and Southwestern Ontario. An increased investment in \nOntario, and potentially Western Canada, will increase the Company’s diversification and exposure in high growth centres in Canada. Based on \nthe Company’s portfolio at year‑end, 15% of Killam’s 2014 NOI will be generated in Ontario. Management has set a long‑term target of growing \nthe amount of NOI generated outside of Atlantic Canada to 50%. ", + "page_start": 28, + "page_end": 28, + "source_file": "TSX_KMP_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "TSX_KMP_2013.pdf", + "query": "How Killam Properties Inc does increase its geographic diversification ? ", + "target_page": 5, + "target_passage": "We are increasing our geographic diversification by expanding our apartment ownership outside Atlantic Canada. ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Geographic Diversification is a Priority**\n\nGeographic diversification is a priority for Killam. Our asset base in Atlantic \nCanada is the foundation of the Company; however, with Atlantic Canada \nrepresenting only 5% of the Canadian rental market, our growth opportunities \nincrease significantly by expanding our target markets outside of this region. \nWith its strong operating platform, Killam can support a larger and more \ngeographically diverse portfolio. We are actively growing a portfolio of \napartments in Ontario in three target markets: Ottawa, the Greater Toronto \nArea, and Southwestern Ontario. An increased investment outside Atlantic \nCanada will increase not only Killam’s growth potential, it will also expand the \nCompany’s diversification and exposure to higher growth markets. \n\nAcquisitions in Ontario represented 45% of acquisitions in 2013. In addition \nto 1,359 apartment units in the province, we also have 2,144 manufactured \nhome community sites, representing 29% of the MHC NOI last year. Based on \nour current portfolio, 15% of Killam’s 2014 NOI will be generated in Ontario, \ncompared to our longer-term goal of generating 50% of NOI outside Atlantic \nCanada. We expect to reach this goal by focusing acquisition activity in \nOntario, with the majority of future investment anticipated in the province over \nthe next few years. We will look for additional development opportunities in \nOntario and we are exploring opportunities in Western Canada, attracted by \nthe strong population growth trends in Alberta’s urban markets. ", + "page_start": 10, + "page_end": 10, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "With strong demand for the acquisition of apartments over the last three years, cap‑rates have declined and the pricing differential between \nolder and newer buildings has reduced. This enables Killam to increase the amount of newer apartments in its portfolio without paying a \nsignificant premium for quality assets. \n\n**Geographic Diversification**\n\nGeographic diversification in the apartment segment is a priority for Killam. With a 14.2% market share in its core markets in Atlantic Canada, \nKillam is the region’s largest residential landlord. The maximum market share Management foresees Killam reaching in Atlantic Canada is \nbetween 15%‑18%. With Atlantic Canada representing only 4.9% of the Canadian rental market, Killam’s growth opportunities increase \nsignificantly when considering assets outside Atlantic Canada. \n\nWith its strong operating platform, Killam can support a larger and more geographically diverse portfolio. The Company is actively building \na portfolio in targeted Ontario markets, including Ottawa, the Greater Toronto Area, and Southwestern Ontario. An increased investment in \nOntario, and potentially Western Canada, will increase the Company’s diversification and exposure in high growth centres in Canada. Based on \nthe Company’s portfolio at year‑end, 15% of Killam’s 2014 NOI will be generated in Ontario. Management has set a long‑term target of growing \nthe amount of NOI generated outside of Atlantic Canada to 50%. ", + "page_start": 28, + "page_end": 28, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "increasing Geographic \nDiversification \n\nWith a home base in Halifax, Killam’s roots are in atlantic canada and the \ncompany has successfully grown by consolidating the residential real estate \nmarket in the region’s urban centres. in order to meet its long-term growth \ntargets and increase its investment in canada’s most dynamic real estate \nmarkets, Killam has been actively expanding its apartment portfolio in ontario \nand is exploring investment opportunities in Western canada. since 2010, \nKillam has expanded its apartment target markets to include specific cities \nin ontario, and has invested approximately $200 million in real estate assets \nin the province. approximately 15% of Killam’s 2014 net operating income is \nexpected to be earned in ontario. the company has set a long-term target to \nearn 50% of its net operating income outside atlantic canada. ", + "page_start": 16, + "page_end": 16, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "In 2013, Killam sold a portfolio of ten MHCs in New Brunswick that allowed Killam to crystallize the increased value of this portfolio at attractive \ncap‑rates. This creates moderate short‑term dilution but it provides the Company with funds to continue its geographic diversification by \naccretively growing its apartment portfolio in Ontario. ", + "page_start": 28, + "page_end": 28, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "about Killam properties inc. \nKillam Properties Inc. is a growth oriented Canadian real estate \ncompany. We own, manage and develop multi-family residential \nproperties in Atlantic Canada and Ontario. Since our first acquisition \nin 2002, our real estate portfolio has grown to $1.5 billion and \nincludes 12,647 apartment units and 5,164 manufactured home \ncommunity (MHC) sites. We are committed to growing Killam’s \nearnings by maximizing the returns from our existing portfolio and \nexpanding through acquisitions and development. \n\nour mission \nTo have a team of caring staff deliver clean, safe, quality housing to \ntenants who are proud to call our properties home. \n\nour core Values \n\nDo the \n**Right**\nThing \nStrong \n**Customer**\nRelationships Creative \n**Solutions** Curb \n**Appeal** **Build**\nCommunity ", + "page_start": 2, + "page_end": 2, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Complementing Acquisitions with**\n**Developments**\n\nDevelopment is an important component of \nKillam’s future growth. We are gaining expertise \nas developers, resulting in both increased \nefficiencies and returns. We completed four \nnew developments in 2013, representing an \ninvestment of $70 million. Two of the buildings \nleased-up within three months, and two are \nexpected to be substantially leased by the middle \nof 2014. The slower than expected lease-up \nat S2 in Halifax is attributable to a higher than \nnormal amount of new units coming to market \nin recent years, leading to increased competition \nat the high-end of the market. At The Plaza in \nFredericton, a soft home sales market is leading to longer \nthan expected lease-up. We will realize the full financial \nbenefit from these buildings once they are fully occupied. \n\nWe currently have two new developments underway. \nChelsea Place, a 101-unit, 2-building complex located in St. \nJohn’s, is expected to be completed in the third quarter of \n2014. Saginaw Gardens, a 122-unit building in Cambridge, \non land acquired in January 2013, was started in December \n2013 and will be completed in 2015. The total investment \nin the two developments is approximately $46 million, \nrepresenting 3% of our balance sheet. We expect to limit our ", + "page_start": 9, + "page_end": 9, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Business Strategy**\n\n**Maximize NOI from Existing Portfolio**\n\nManagement is focused on increasing the value of its real estate portfolio by maximizing revenue and operating efficiencies. To achieve NOI \ngrowth, Killam must address three critical factors; occupancy, rental rates, and operating costs. The Company focuses on customer service, \ninvesting in its properties, leasing and marketing initiatives, and training its employees to maximize these outcomes. \n\nManagement is able to directly control approximately 40% of operating expenses, including labour costs, repairs and maintenance and property \ngeneral and administrative expenses. The remaining operating costs, including utilities and property taxes, are less controllable. Killam’s \napartments are currently heated with a combination of natural gas, electricity and oil. Volatile oil and natural gas prices have an impact on \nKillam’s operating costs. To mitigate this volatility, the Company is active in energy conservation initiatives and regularly monitors its energy \nusage. \n\n**Growth through Acquisitions**\n\nKillam is expanding its portfolio by acquiring newer, centrally located buildings and is focused on Ontario. During 2013 Killam completed $121.1 \nmillion in acquisitions, including properties in Toronto, Ottawa, Moncton and Prince Edward Island. \n\n**Growth through Development**\n\nKillam enhances its portfolio growth opportunities by developing properties. Killam started apartment developments in 2010 and has completed \nfive properties to‑date, including four in 2013. Building new properties directly allows Killam to control the quality and features of the buildings, \nmaximizes the use of excess land and eliminates the seller’s profit, generating higher returns than through acquisitions. Management expects to \nlimit development projects to approximately 5% of the balance sheet on an annual basis. ", + "page_start": 28, + "page_end": 28, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "a Diversified portfolio \n\nKillam has a diverse portfolio of both apartments and manufactured home communities. The \napartment portfolio represents 86% of Killam’s earnings and includes a variety of property types, \nsuch as high-rises, mid-rises and walk-ups, in nine urban centres across five provinces. With a wide \nselection of properties and price points in each city, Killam caters to a broad tenant base. \nKillam’s 35 manufactured home communities represent 14% of earnings and are located \nprimarily in Nova Scotia and Ontario. The manufactured home communities complement the \napartment business, providing stable and predictable cash flows. ", + "page_start": 12, + "page_end": 12, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "opportunities for Growth \n\nKillam’s growth opportunities include increasing earnings of its existing \nportfolio and expanding the portfolio through acquisitions and development. \nacquisitions have been an important part of Killam’s growth, having completed \nover $1.1 billion in acquisitions since the first property was acquired in 2002. \nKillam began development as a complement to its acquisition program in 2010, \nand to-date has invested approximately $90 million in new developments. \n2013 was Killam’s largest year for growth since 2005, adding $191 million of \nproperties to the portfolio, including $121 million in acquisitions and $70 \nmillion in new developments. looking ahead to 2014, Killam has targeted \na minimum of $75 million in acquisitions, and the development of two new \napartment buildings totaling approximately $46 million. ", + "page_start": 13, + "page_end": 13, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**PART VIII**\n\n**Risk Management**\nKillam faces a variety of risks, the majority of which are common to real estate entities. Real estate investments are generally subject to varying \ndegrees of risk, depending on the nature of the property. These risks include (i) changes in general economic conditions, (ii) changes in local \nconditions (such as an oversupply of space or a reduction in demand for real estate in the area), (iii) changes to government regulations (such as \nnew or revised residential tenant legislations), (iv) competition from others with available space, and (v) the ability of the landlord or owner to \nprovide adequate maintenance economically. \n\nReal estate is relatively illiquid. Such illiquidity will tend to limit Killam’s ability to rebalance its portfolio promptly in response to changing \neconomic or investment conditions. In addition, financial difficulties of other property owners, resulting in distress sales, may depress real estate \nvalues in the markets in which the company operates. \n\nKillam’s exposure to general risks associated with real estate investments is mitigated with both its geographic diversification, and investments in \nboth apartments and mHcs. \n\nKillam is exposed to other risks, as outlined below: \n\n**Interest Rate Risk**\nInterest risk is the risk that the Company would experience lower returns as the result of its exposure to a higher interest rate environment. The \nCompany is exposed to interest rate risk as a result of its mortgages and loans payable, however this risk is mitigated through the Company’s \nstrategy to have the majority of its mortgages payable in fixed‑term arrangements. The Company also structures its financings so as to stagger \nthe maturities of its debt, minimizing the Company’s exposure to interest rates in any one year. ", + "page_start": 58, + "page_end": 58, + "source_file": "TSX_KMP_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "TSX_KMP_2013.pdf", + "query": "What is the Killam Properties Inc 2013 performance about the Geographic Diversification objective ?", + "target_page": 8, + "target_passage": "Target achieved. Killam acquired $55 million in Ontario real estate in 2013, representing 45% of its acquisition program in the year. Assets acquired included a 102-unit property in Ottawa, a newly built, 179-unit, mixed-used property in downtown Toronto and a 5.2 acre parcel of land for development in Cambridge, Ontario. ", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "\n\nKillam properties inc \n**2013 annual report**", + "page_start": 0, + "page_end": 0, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Geographic Diversification is a Priority**\n\nGeographic diversification is a priority for Killam. Our asset base in Atlantic \nCanada is the foundation of the Company; however, with Atlantic Canada \nrepresenting only 5% of the Canadian rental market, our growth opportunities \nincrease significantly by expanding our target markets outside of this region. \nWith its strong operating platform, Killam can support a larger and more \ngeographically diverse portfolio. We are actively growing a portfolio of \napartments in Ontario in three target markets: Ottawa, the Greater Toronto \nArea, and Southwestern Ontario. An increased investment outside Atlantic \nCanada will increase not only Killam’s growth potential, it will also expand the \nCompany’s diversification and exposure to higher growth markets. \n\nAcquisitions in Ontario represented 45% of acquisitions in 2013. In addition \nto 1,359 apartment units in the province, we also have 2,144 manufactured \nhome community sites, representing 29% of the MHC NOI last year. Based on \nour current portfolio, 15% of Killam’s 2014 NOI will be generated in Ontario, \ncompared to our longer-term goal of generating 50% of NOI outside Atlantic \nCanada. We expect to reach this goal by focusing acquisition activity in \nOntario, with the majority of future investment anticipated in the province over \nthe next few years. We will look for additional development opportunities in \nOntario and we are exploring opportunities in Western Canada, attracted by \nthe strong population growth trends in Alberta’s urban markets. ", + "page_start": 10, + "page_end": 10, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Geographic**\n**Diversification**\n\n2013 acquisition \nprogram to include \ninvestments in Ontario. \n\nTarget achieved. Killam acquired $55 million in \nOntario real estate in 2013, representing 45% \nof its acquisition program in the year. Assets \nacquired included a 102-unit property in \nOttawa, a newly built, 179-unit, mixed-used \nproperty in downtown Toronto and a 5.2 acre \nparcel of land for development in Cambridge, \nOntario. \n\n**Growth in Same Store**\n**Net Operating Income**\n**(NOI)**\n\nSame store NOI growth \nof 2% to 4% in 2013. \n\nTarget not achieved. Despite generating 1.8% \ngrowth in same store revenue, high natural gas \nprices in Atlantic Canada caused total same \nstore utility and fuel expenses to increase 13.8% \nduring the year, which resulted in a decrease in \nsame store NOI of 0.4% for the year. ", + "page_start": 7, + "page_end": 7, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "With strong demand for the acquisition of apartments over the last three years, cap‑rates have declined and the pricing differential between \nolder and newer buildings has reduced. This enables Killam to increase the amount of newer apartments in its portfolio without paying a \nsignificant premium for quality assets. \n\n**Geographic Diversification**\n\nGeographic diversification in the apartment segment is a priority for Killam. With a 14.2% market share in its core markets in Atlantic Canada, \nKillam is the region’s largest residential landlord. The maximum market share Management foresees Killam reaching in Atlantic Canada is \nbetween 15%‑18%. With Atlantic Canada representing only 4.9% of the Canadian rental market, Killam’s growth opportunities increase \nsignificantly when considering assets outside Atlantic Canada. \n\nWith its strong operating platform, Killam can support a larger and more geographically diverse portfolio. The Company is actively building \na portfolio in targeted Ontario markets, including Ottawa, the Greater Toronto Area, and Southwestern Ontario. An increased investment in \nOntario, and potentially Western Canada, will increase the Company’s diversification and exposure in high growth centres in Canada. Based on \nthe Company’s portfolio at year‑end, 15% of Killam’s 2014 NOI will be generated in Ontario. Management has set a long‑term target of growing \nthe amount of NOI generated outside of Atlantic Canada to 50%. ", + "page_start": 28, + "page_end": 28, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Objective** **2013 Target** **2013 Performance**\n\n**Consolidation of**\n**the Multi-family**\n**Residential Real Estate**\n**Market**\n\nTo complete $75 million \nto $125 million in \nacquisitions. \n\nTarget achieved. $121 million in acquisitions \ncompleted in 2013, including $113 million in \napartment acquisitions, $7 million for three \nparcels of land for future development and $1 \nmillion for an MHC acquisition. \n\n**Increase Investment in**\n**New Properties**\n\nAcquire new properties \nas part of the acquisition \nprogram in 2013. \n\nTarget achieved. During 2013, 74% of the total \nunits added to the portfolio were constructed \nafter 2001. These acquisitions included three \nbuildings constructed in 2013, a 179-unit \nbuilding on Queen Street West in Toronto, an \n83-unit luxury building in Halifax, and a 48-unit \nbuilding in Moncton. \n\nComplete and lease- \nup Killam's four \ndevelopments and \ncommence two new \ndevelopment projects. \n\nTarget partially achieved. The Company \ncompleted the construction of four \ndevelopment projects totaling 282 units during \nthe first half of 2013. Two of the properties, \nBennett House and Brighton House, were \nfully leased within three months of opening, \nwhile S2 and The Plaza are expected to be \nsubstantially leased by the middle of 2014. \nKillam began two new developments during \nthe second half of the year, a 101-unit building \nin St. John’s, Newfoundland, and a 122-unit \nbuilding in Cambridge, Ontario. ", + "page_start": 7, + "page_end": 7, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Summary of 2013 Results and Operations**\n\n**Acquisitions and Developments Drive Revenue Growth of 5.6%**\n\nKillam completed $114.2 million in property acquisitions throughout 2013 and also completed $69.6 million of development projects in the first \nhalf of 2013, adding 1,025 apartment units and 65 MHC sites to the portfolio. $84.8 million of acquisitions completed throughout 2012 also \ncontributed to revenue growth in 2013. This growth was partially offset by the disposition of ten MHC properties located in New Brunswick for \nproceeds of $69.0 million during the fourth quarter of 2013 and the disposition of twelve MHCs during 2012 for $72.9 million. The development \nprojects completed in 2013 located in Halifax and Fredericton are expected to be substantially leased by mid‑2014 and will generate additional \nrevenue growth for the company in 2014. \n\n**Consolidated Same Store Revenue Growth of 1.8%**\n\nKillam’s same store portfolio posted a 1.8% increase in revenue growth compared to 2012, driven by an increase of 1.3% in rental rates related \nto the apartment portfolio and a 3.7% increase in rental rates related to the MHC portfolio. These rental rate gains were partially offset by higher \nvacancy during the first half of 2013, compared to 2012, and higher rental incentives due to increased competition in certain of the Company’s \ncore markets in Atlantic Canada as a result of increased supply. ", + "page_start": 24, + "page_end": 24, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "increasing Geographic \nDiversification \n\nWith a home base in Halifax, Killam’s roots are in atlantic canada and the \ncompany has successfully grown by consolidating the residential real estate \nmarket in the region’s urban centres. in order to meet its long-term growth \ntargets and increase its investment in canada’s most dynamic real estate \nmarkets, Killam has been actively expanding its apartment portfolio in ontario \nand is exploring investment opportunities in Western canada. since 2010, \nKillam has expanded its apartment target markets to include specific cities \nin ontario, and has invested approximately $200 million in real estate assets \nin the province. approximately 15% of Killam’s 2014 net operating income is \nexpected to be earned in ontario. the company has set a long-term target to \nearn 50% of its net operating income outside atlantic canada. ", + "page_start": 16, + "page_end": 16, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Continued Geographic Expansion in Ontario**\n\nKillam acquired two buildings in Ontario during 2013 including a 102‑unit building located in Ottawa for $10.4 million as well as a newly \nconstructed, 8‑storey, mixed‑use complex containing 21,242 square feet of street level retail (TD Bank, Shoppers Drug Mart and Tim Hortons) and \n179 apartment units in downtown Toronto for $40.0 million. With the completion of these two acquisitions, Killam’s future NOI generated from \nits Ontario properties is expected to increase to 15.0% from 7.5%. \n\n**Reduced Cap‑Rate Compression in 2013**\n\nDuring 2013 Killam recorded $13.1 million in fair value gains related to its portfolio compared to $37.7 million in 2012. This decrease \nyear‑over‑year was driven by a combination of reduced cap‑rate compression in 2013 and a slight uptick in cap‑rates of 25 bps in the Saint John \nmarket in the fourth quarter of 2013. The net gain in real estate valuations does not impact the Company’s FFO per share, its key measure of \nperformance. \n\n**Dividend Increase**\n\non December 23, 2013, Killam announced an increase in its annual dividend by 3.4% to $0.60 per share from $0.58 per share. the increase \nreflects Management’s expectation of earning’s growth to be generated in 2014. ", + "page_start": 25, + "page_end": 25, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Business Strategy**\n\n**Maximize NOI from Existing Portfolio**\n\nManagement is focused on increasing the value of its real estate portfolio by maximizing revenue and operating efficiencies. To achieve NOI \ngrowth, Killam must address three critical factors; occupancy, rental rates, and operating costs. The Company focuses on customer service, \ninvesting in its properties, leasing and marketing initiatives, and training its employees to maximize these outcomes. \n\nManagement is able to directly control approximately 40% of operating expenses, including labour costs, repairs and maintenance and property \ngeneral and administrative expenses. The remaining operating costs, including utilities and property taxes, are less controllable. Killam’s \napartments are currently heated with a combination of natural gas, electricity and oil. Volatile oil and natural gas prices have an impact on \nKillam’s operating costs. To mitigate this volatility, the Company is active in energy conservation initiatives and regularly monitors its energy \nusage. \n\n**Growth through Acquisitions**\n\nKillam is expanding its portfolio by acquiring newer, centrally located buildings and is focused on Ontario. During 2013 Killam completed $121.1 \nmillion in acquisitions, including properties in Toronto, Ottawa, Moncton and Prince Edward Island. \n\n**Growth through Development**\n\nKillam enhances its portfolio growth opportunities by developing properties. Killam started apartment developments in 2010 and has completed \nfive properties to‑date, including four in 2013. Building new properties directly allows Killam to control the quality and features of the buildings, \nmaximizes the use of excess land and eliminates the seller’s profit, generating higher returns than through acquisitions. Management expects to \nlimit development projects to approximately 5% of the balance sheet on an annual basis. ", + "page_start": 28, + "page_end": 28, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Killam complements its acquisition program with the construction of apartment buildings. During 2013, Killam completed the development \nof four projects totalling 282 units and commenced two additional projects in the second half of the year. Management does not expect \ndevelopments to exceed 5% of the total asset base in any given year. \n\nIn addition, the Company owns MHCs, also known as land‑lease communities or trailer parks. Killam owns the land and infrastructure supporting \neach community and leases the lots to tenants, who own their own homes and pay Killam a monthly site rent. Killam owns 35 communities \nwhich accounted for 14% of Killam’s NOI in 2013. During the year Killam sold ten MHC properties located in New Brunswick, allowing the \nCompany to crystallize the value of the properties at attractive cap‑rates and use the funds to continue to grow the apartment portfolio. \n\n**Key Performance Indicators (KPIs)**\n\nManagement measures Killam’s performance based on the following KPIs: ", + "page_start": 22, + "page_end": 22, + "source_file": "TSX_KMP_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv2_taclccby4_license.pdf", + "query": "What is the conventional workflow for BERT ?", + "target_page": 1, + "target_passage": "The conventional workflow for BERT consists of two stages: pre-training and fine-tuning. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Fundamentally, BERT is a stack of Transformer \nencoder layers (Vaswani et al., 2017) which consist \nof multiple self-attention \"heads\". For every input \ntoken in a sequence, each head computes key, value \nand query vectors, used to create a weighted repre- \nsentation. The outputs of all heads in the same layer \nare combined and run through a fully-connected \nlayer. Each layer is wrapped with a skip connection \nand followed by layer normalization. \n\nThe conventional workflow for BERT consists \nof two stages: pre-training and fine-tuning. Pre- \ntraining uses two self-supervised tasks: masked \nlanguage modeling (MLM, prediction of randomly \nmasked input tokens) and next sentence prediction \n(NSP, predicting if two input sentences are adjacent \nto each other). In fine-tuning for downstream ap- \nplications, one or more fully-connected layers are \ntypically added on top of the final encoder layer. \n\nThe input representations are computed as fol- \nlows: each word in the input is first tokenized into \nwordpieces (Wu et al., 2016), and then three em- \nbedding layers (token, position, and segment) are \ncombined to obtain a fixed-length vector. Special \ntoken [CLS] is used for classification predictions, \nand [SEP] separates input segments. ", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Canwen Xu, Wangchunshu Zhou, Tao Ge, Furu \nWei, and Ming Zhou. 2020. BERT-of-Theseus: \nCompressing BERT by Progressive Module Re- \nplacing. arXiv preprint arXiv:2002.02925. ", + "page_start": 21, + "page_end": 21, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Abstract \n\nTransformer-based models have pushed state \nof the art in many areas of NLP, but our un- \nderstanding of what is behind their success \nis still limited. This paper is the first sur- \nvey of over 150 studies of the popular BERT \nmodel. We review the current state of knowl- \nedge about how BERT works, what kind \nof information it learns and how it is repre- \nsented, common modifications to its training \nobjectives and architecture, the overparame- \nterization issue and approaches to compres- \nsion. We then outline directions for future \nresearch. ", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "improve BERT’s architecture, pre-training and fine- \ntuning. We conclude by discussing the issue of \noverparameterization, the approaches to compress- \ning BERT, and the nascent area of pruning as a \nmodel analysis technique. ", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "In a little over a year, BERT has become a ubiq- \nuitous baseline in NLP experiments and inspired \nnumerous studies analyzing the model and propos- \ning various improvements. The stream of papers \nseems to be accelerating rather than slowing down, \nand we hope that this survey helps the community \nto focus on the biggest unresolved questions. \n\n9 Acknowledgements \n\nWe thank the anonymous reviewers for their valu- \nable feedback. This work is funded in part by \nthe NSF award number IIS-1844740 to Anna \nRumshisky. ", + "page_start": 11, + "page_end": 11, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Since their introduction in 2017, Transformers \n(Vaswani et al., 2017) have taken NLP by storm, \noffering enhanced parallelization and better model- \ning of long-range dependencies. The best known \nTransformer-based model is BERT (Devlin et al., \n2019); it obtained state-of-the-art results in numer- \nous benchmarks and is still a must-have baseline. \nWhile it is clear that BERT works remarkably \nwell, it is less clear why, which limits further \nhypothesis-driven improvement of the architecture. \nUnlike CNNs, the Transformers have little cogni- \ntive motivation, and the size of these models limits \nour ability to experiment with pre-training and per- \nform ablation studies. This explains a large number \nof studies over the past year that attempted to un- \nderstand the reasons behind BERT’s performance. \nIn this paper, we provide an overview of what \nhas been learned to date, highlighting the questions \nwhich are still unresolved. We first consider the \nlinguistic aspects of it, i.e., the current evidence \nregarding the types of linguistic and world knowl- \nedge learned by BERT, as well as where and how \nthis knowledge may be stored in the model. We \nthen turn to the technical aspects of the model and \nprovide an overview of the current proposals to ", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Stochastic Parrots \n\nmBERT across 29 tasks. Either way, these models do not address \nthe inclusion problems raised by [65], who note that over 90% of \nthe world’s languages used by more than a billion people currently \nhave little to no support in terms of language technology. \n\nAlongside work investigating what information the models re- \ntain from the data, we see a trend in reducing the size of these \nmodels using various techniques such as knowledge distillation \n[26, 58], quantization [118, 153], factorized embedding parame- \nterization and cross-layer parameter sharing [70], and progressive \nmodule replacing [146]. Rogers et al. [110] provide a comprehensive \ncomparison of models derived from BERT using these techniques, \nsuch as DistilBERT [113] and ALBERT [70]. While these models \nmaintain and sometimes exceed the performance of the original \nBERT model, despite their much smaller size, they ultimately still \nrely on large quantities of data and significant processing and stor- \nage capabilities to both hold and reduce the model. ", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "Henry Tsai, Jason Riesa, Melvin Johnson, Naveen \nArivazhagan, Xin Li, and Amelia Archer. 2019. \nSmall and Practical BERT Models for Sequence \nLabeling. arXiv preprint arXiv:1909.00100. ", + "page_start": 20, + "page_end": 20, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Ofir Zafrir, Guy Boudoukh, Peter Izsak, and Moshe \nWasserblat. 2019. Q8BERT: Quantized 8bit \nBERT. arXiv preprint arXiv:1910.06188. \n\nRowan Zellers, Ari Holtzman, Yonatan Bisk, Ali \nFarhadi, and Yejin Choi. 2019. HellaSwag: Can \na Machine Really Finish Your Sentence? In Pro- \nceedings of the 57th Annual Meeting of the As- \nsociation for Computational Linguistics, pages \n4791–4800. \n\nZhengyan Zhang, Xu Han, Zhiyuan Liu, Xin Jiang, \nMaosong Sun, and Qun Liu. 2019. ERNIE: En- \nhanced Language Representation with Informa- \ntive Entities. In Proceedings of the 57th Annual \nMeeting of the Association for Computational \nLinguistics, pages 1441–1451, Florence, Italy. \nAssociation for Computational Linguistics. \n\nZhuosheng Zhang, Yuwei Wu, Hai Zhao, Zuchao \nLi, Shuailiang Zhang, Xi Zhou, and Xiang Zhou. \n2020. Semantics-aware BERT for Language \nUnderstanding. In AAAI 2020. ", + "page_start": 22, + "page_end": 22, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Xiaoqi Jiao, Yichun Yin, Lifeng Shang, Xin Jiang, \nXiao Chen, Linlin Li, Fang Wang, and Qun \nLiu. 2019. TinyBERT: Distilling BERT for nat- \nural language understanding. arXiv preprint \narXiv:1909.10351. ", + "page_start": 15, + "page_end": 15, + "source_file": "arxiv2_taclccby4_license.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv2_taclccby4_license.pdf", + "query": "Is syntaxis encoded with Bert model ?", + "target_page": 2, + "target_passage": " As far as how syntaxis represented, it seems that syntactic structure is not directly encoded in self-attention weights.", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "However, syntactic information can be recov- \nered from BERT token representations. Hewitt \nand Manning (2019) were able to learn transfor- \nmation matrices that successfully recovered syn- \ntactic dependencies in PennTreebank data from \nBERT’s token embeddings (see also Manning et al., \n2020). Jawahar et al. (2019) experimented with \ntransformations of the [CLS] token using Tensor \nProduct Decomposition Networks (McCoy et al., \n2019a), concluding that dependency trees are the \nbest match among 5 decomposition schemes (al- \nthough the reported MSE differences are very \nsmall). Miaschi and Dell’Orletta (2020) performs \na range of syntactic probing experiments with con- \ncatenated token representations as input. \n\nNote that all these approaches look for the \nevidence of gold-standard linguistic structures, \nand add some amount of extra knowledge to the \nprobe. Most recently, Wu et al. (2020) proposed a ", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Canwen Xu, Wangchunshu Zhou, Tao Ge, Furu \nWei, and Ming Zhou. 2020. BERT-of-Theseus: \nCompressing BERT by Progressive Module Re- \nplacing. arXiv preprint arXiv:2002.02925. ", + "page_start": 21, + "page_end": 21, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "As far as how syntax is represented, it seems \nthat syntactic structure is not directly encoded \nin self-attention weights. Htut et al. (2019) were \nunable to extract full parse trees from BERT heads \neven with the gold annotations for the root. Jawahar \net al. (2019) include a brief illustration of a depen- \ndency tree extracted directly from self-attention \nweights, but provide no quantitative evaluation. \n\nThe fill-in-the-gap probes of MLM showed that \nBERT takes subject-predicate agreement into \naccount when performing the cloze task (Gold- \nberg, 2019; van Schijndel et al., 2019), even for \nmeaningless sentences and sentences with distrac- \ntor clauses between the subject and the verb (Gold- \nberg, 2019). A study of negative polarity items \n(NPIs) by Warstadt et al. (2019) showed that BERT \nis better able to detect the presence of NPIs (e.g. \n\"ever\") and the words that allow their use (e.g. \n\"whether\") than scope violations. \n\nThe above claims of syntactic knowledge are be- \nlied by the evidence that BERT does not \"under- \nstand\" negation and is insensitive to malformed \ninput. In particular, its predictions were not al- \ntered2 even with shuffled word order, truncated \nsentences, removed subjects and objects (Ettinger, \n2019). This could mean that either BERT’s syn- \ntactic knowledge is incomplete, or it does not \nneed to rely on it for solving its tasks. The latter \nseems more likely, since Glavaš and Vuli´c (2020) ", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "3.1 Syntactic knowledge \n\nLin et al. (2019) showed that BERT represen- \ntations are hierarchical rather than linear, i.e. \nthere is something akin to syntactic tree structure \nin addition to the word order information. Ten- \nney et al. (2019b) and Liu et al. (2019a) also \nshowed that BERT embeddings encode informa- \ntion about parts of speech, syntactic chunks \nand roles. Enough syntactic information seems \nto be captured in the token embeddings themselves \nto recover syntactic trees (Vilares et al., 2020; Kim \net al., 2020; Rosa and Mareˇcek, 2019), although \nprobing classifiers could not recover the labels of \ndistant parent nodes in the syntactic tree (Liu et al., \n2019a). Warstadt and Bowman (2020) report evi- \ndence of hierarchical structure in three out of four \nprobing tasks. \n\nFigure 1: Parameter-free probe for syntactic knowledge: \nwords sharing syntactic subtrees have larger impact on \neach other in the MLM prediction (Wu et al., 2020) \n\nparameter-free approach based on measuring the \nimpact that one word has on predicting another \nword within a sequence in the MLM task (Figure 1). \nThey concluded that BERT \"naturally\" learns \nsome syntactic information, although it is not \nvery similar to linguistic annotated resources. ", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Since BERT embeddings are contextualized, an \ninteresting question is to what extent they cap- \nture phenomena like polysemy and homonymy. \nThere is indeed evidence that BERT’s contextu- \nalized embeddings form distinct clusters corre- \nsponding to word senses (Wiedemann et al., 2019; \nSchmidt and Hofmann, 2020), making BERT suc- \ncessful at word sense disambiguation task. How- \never, Mickus et al. (2019) note that the representa- \ntions of the same word depend on the position \nof the sentence in which it occurs, likely due to \nthe NSP objective. This is not desirable from the \nlinguistic point of view, and could be a promising \n\n3Voita et al. (2019a) look at the evolution of token embed- \ndings, showing that in the earlier Transformer layers, MLM \nforces the acquisition of contextual information at the expense \nof the token identity, which gets recreated in later layers. ", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Henry Tsai, Jason Riesa, Melvin Johnson, Naveen \nArivazhagan, Xin Li, and Amelia Archer. 2019. \nSmall and Practical BERT Models for Sequence \nLabeling. arXiv preprint arXiv:1909.00100. ", + "page_start": 20, + "page_end": 20, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "We also studied the capabilities of models on the \nFrench language when the language of the training \ndata varies. It is surprising to note the absence of a \nclear correlation between the language the model \nis trained on and its performance on French, as \nshown by the large standard deviation in Figure 2. \nFurthermore, monolingual models trained exclu- \nsively on English such as voyage-code-2 show \nvery good results on French datasets compared \nto models trained exclusively on French such as \nflaubert derivatives and distilbert-base-fr-cased \n(see Table D.1). \nThis is explained by the fact that a large part of the \nselected French models generate embeddings using \na pooling strategy. Only a few are sentence trans- \nformer models, for which the pooled representation \nis part of the model and trained with it, leading to \nhigher-quality embeddings. This is endorsed by \nthe excellent results of sentence-camembert-large, \na sentence transformer model trained on French \ncorpus and confirms the recent findings in terms of \nmodel architecture (Gao et al., 2021). \nFinally, it should be noted that a significant portion \nof the French data used to train the selected French \nmodels actually comes from English datasets \nthat have been machine translated (May, 2021). \nDespite the tremendous progress of machine \ntranslation, it is well known that the generated \ndata may be unrepresentative of the language \nused by native speakers and cause a reduced final \nperformance (Barbosa et al., 2021). ", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv4.pdf" + }, + { + "text": "ies) insufficient (Warstadt et al., 2019). A given \nmethod might also favor one model over another, \ne.g., RoBERTa trails BERT with one tree extraction \nmethod, but leads with another (Htut et al., 2019). \nThe choice of linguistic formalism also matters \n(Kuznetsov and Gurevych, 2020). \n\nSeveral studies reported that distilled contex- \ntualized embeddings better encode lexical se- \nmantic information (i.e. \nthey are better at tra- \nditional word-level tasks such as word similarity). \nThe methods to distill a contextualized represen- \ntation into static include aggregating the informa- \ntion across multiple contexts (Akbik et al., 2019; \nBommasani et al., 2020), encoding \"semantically \nbleached\" sentences that rely almost exclusively on \nthe meaning of a given word (e.g. \"This is <>\") \n(May et al., 2019), and even using contextualized \nembeddings to train static embeddings (Wang et al., \n2020d). \n\nIn view of all that, the alternative is to focus on \nidentifying what BERT actually relies on at infer- \nence time. This direction is currently pursued both \nat the level of architecture blocks (to be discussed \nin detail in subsection 6.3), and at the level of in- \nformation encoded in model weights. Amnesic \nprobing (Elazar et al., 2020) aims to specifically \nremove certain information from the model and see \nhow it changes performance, finding, for example, \nthat language modeling does rely on part-of-speech \ninformation. ", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Fundamentally, BERT is a stack of Transformer \nencoder layers (Vaswani et al., 2017) which consist \nof multiple self-attention \"heads\". For every input \ntoken in a sequence, each head computes key, value \nand query vectors, used to create a weighted repre- \nsentation. The outputs of all heads in the same layer \nare combined and run through a fully-connected \nlayer. Each layer is wrapped with a skip connection \nand followed by layer normalization. \n\nThe conventional workflow for BERT consists \nof two stages: pre-training and fine-tuning. Pre- \ntraining uses two self-supervised tasks: masked \nlanguage modeling (MLM, prediction of randomly \nmasked input tokens) and next sentence prediction \n(NSP, predicting if two input sentences are adjacent \nto each other). In fine-tuning for downstream ap- \nplications, one or more fully-connected layers are \ntypically added on top of the final encoder layer. \n\nThe input representations are computed as fol- \nlows: each word in the input is first tokenized into \nwordpieces (Wu et al., 2016), and then three em- \nbedding layers (token, position, and segment) are \ncombined to obtain a fixed-length vector. Special \ntoken [CLS] is used for classification predictions, \nand [SEP] separates input segments. ", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
AllelestingContextual Representations, In Proceeding the First Workshop on Commonsense Infere in Natural Language Processing, pages 1 Hong Kong, China. Association for CompTotal LinguesticsLinguishiolance, and Alsociation, and Also site IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII
\n\nKevin Clark, Urvashi Khandelwal, Omer Levy, \nand Christopher D. Manning. 2019. What Does \nBERT Look at? An Analysis of BERT’s Atten- \ntion. In Proceedings of the 2019 ACL Workshop \nBlackboxNLP: Analyzing and Interpreting Neu- \nral Networks for NLP, pages 276–286, Florence, \nItaly. Association for Computational Linguistics. ", + "page_start": 13, + "page_end": 13, + "source_file": "arxiv2_taclccby4_license.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv2_taclccby4_license.pdf", + "query": "Is BERT good with numbers representations ?", + "target_page": 3, + "target_passage": " BERTstruggles with representations of numbers. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "BERT struggles with representations of num- \nbers. Addition and number decoding tasks showed \nthat BERT does not form good representations for \nfloating point numbers and fails to generalize away \nfrom the training data (Wallace et al., 2019b). A \npart of the problem is BERT’s wordpiece tokeniza- \ntion, since numbers of similar values can be divided \nup into substantially different word chunks. \n\nHowever, BERT cannot reason based on its \nworld knowledge. Forbes et al. (2019) show that \nBERT can \"guess\" the affordances and properties of \nmany objects, but can not reason about the relation- \nship between properties and affordances. For ex- \nample, it “knows\" that people can walk into houses, \nand that houses are big, but it cannot infer that \nhouses are bigger than people. Zhou et al. (2020) \nand Richardson and Sabharwal (2019) also show \nthat the performance drops with the number of nec- \nessary inference steps. Some of BERT’s world \nknowledge success comes from learning stereotypi- \ncal associations (Poerner et al., 2019), e.g., a person \nwith an Italian-sounding name is predicted to be \nItalian, even when it is incorrect. ", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Henry Tsai, Jason Riesa, Melvin Johnson, Naveen \nArivazhagan, Xin Li, and Amelia Archer. 2019. \nSmall and Practical BERT Models for Sequence \nLabeling. arXiv preprint arXiv:1909.00100. ", + "page_start": 20, + "page_end": 20, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "avenue for future work. \n\nThe above discussion concerns token embed- \ndings, but BERT is typically used as a sentence or \ntext encoder. The standard way to generate sen- \ntence or text representations for classification is \nto use the [CLS] token, but alternatives are also \nbeing discussed, including concatenation of token \nrepresentations (Tanaka et al., 2020), normalized \nmean (Tanaka et al., 2020), and layer activations \n(Ma et al., 2019). See Toshniwal et al. (2020) for a \nsystematic comparison of several methods across \ntasks and sentence encoders. \n\nLin et al. (2019) present evidence that atten- \ntion weights are weak indicators of subject- \nverb agreement and reflexive anaphora. Instead \nof serving as strong pointers between tokens that \nshould be related, BERT’s self-attention weights \nwere close to a uniform attention baseline, but there \nwas some sensitivity to different types of distrac- \ntors coherent with psycholinguistic data. This is \nconsistent with conclusions by Ettinger (2019). \n4.2 Self-attention heads ", + "page_start": 4, + "page_end": 4, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Stochastic Parrots \n\nmBERT across 29 tasks. Either way, these models do not address \nthe inclusion problems raised by [65], who note that over 90% of \nthe world’s languages used by more than a billion people currently \nhave little to no support in terms of language technology. \n\nAlongside work investigating what information the models re- \ntain from the data, we see a trend in reducing the size of these \nmodels using various techniques such as knowledge distillation \n[26, 58], quantization [118, 153], factorized embedding parame- \nterization and cross-layer parameter sharing [70], and progressive \nmodule replacing [146]. Rogers et al. [110] provide a comprehensive \ncomparison of models derived from BERT using these techniques, \nsuch as DistilBERT [113] and ALBERT [70]. While these models \nmaintain and sometimes exceed the performance of the original \nBERT model, despite their much smaller size, they ultimately still \nrely on large quantities of data and significant processing and stor- \nage capabilities to both hold and reduce the model. ", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "Liu et al. (2019b) demonstrate the benefits of \nlarge-batch training: with 8k examples both the \nlanguage model perplexity and downstream task \nperformance are improved. They also publish their \nrecommendations for other parameters. You et al. \n(2019) report that with a batch size of 32k BERT’s \ntraining time can be significantly reduced with no \ndegradation in performance. Zhou et al. (2019) ob- \nserve that the normalization of the trained [CLS] \ntoken stabilizes the training and slightly improves \nperformance on text classification tasks. \n\n5 Training BERT \n\nThis section reviews the proposals to optimize the \ntraining and architecture of the original BERT. \n\nTo date, the most systematic study of BERT archi- \ntecture was performed by Wang et al. (2019b), who \nexperimented with the number of layers, heads, and \nmodel parameters, varying one option and freez- \ning the others. They concluded that the number \nof heads was not as significant as the number \nof layers. That is consistent with the findings \nof Voita et al. (2019b) and Michel et al. (2019) \n(section 6), and also the observation by Liu et al. \n(2019a) that the middle layers were the most trans- \nferable. Larger hidden representation size was con- ", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "6.1 Overparameterization \n\nTransformer-based models keep growing by or- \nders of magnitude: the 110M parameters of base \nBERT are now dwarfed by 17B parameters of \nTuring-NLG (Microsoft, 2020), which is dwarfed \nby 175B of GPT-3 (Brown et al., 2020). This trend \nraises concerns about computational complexity \nof self-attention (Wu et al., 2019a), environmental \nissues (Strubell et al., 2019; Schwartz et al., 2019), \nfair comparison of architectures (Aßenmacher and \nHeumann, 2020), and reproducibility. \n\nHuman language is incredibly complex, and \nwould perhaps take many more parameters to de- \nscribe fully, but the current models do not make \ngood use of the parameters they already have. Voita \net al. (2019b) showed that all but a few Trans- \nformer heads could be pruned without signif- \nicant losses in performance. For BERT, Clark \net al. (2019) observe that most heads in the same \nlayer show similar self-attention patterns (perhaps \nrelated to the fact that the output of all self-attention \nheads in a layer is passed through the same MLP), \nwhich explains why Michel et al. (2019) were able \nto reduce most layers to a single head. ", + "page_start": 9, + "page_end": 9, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "But this is not to say that there is no room for \nimprovement. Ethayarajh (2019) measure how \nsimilar the embeddings for identical words are in \nevery layer, reporting that later BERT layers pro- \nduce more context-specific representations3. They \nalso find that BERT embeddings occupy a narrow \ncone in the vector space, and this effect increases \nfrom the earlier to later layers. That is, two ran- \ndom words will on average have a much higher \ncosine similarity than expected if embeddings \nwere directionally uniform (isotropic). Since \nisotropy was shown to be beneficial for static word \nembeddings (Mu and Viswanath, 2018), this might \nbe a fruitful direction to explore for BERT. \n\nAnother direction is information-theoretic prob- \ning. Pimentel et al. (2020) operationalize prob- \ning as estimating mutual information between the \nlearned representation and a given linguistic prop- \nerty, which highlights that the focus should be not \non the amount of information contained in a rep- \nresentation, but rather on how easily it can be ex- \ntracted from it. Voita and Titov (2020) quantify \nthe amount of effort needed to extract information \nfrom a given representation as minimum descrip- \ntion length needed to communicate both the probe \nsize and the amount of data required for it to do \nwell on a task. ", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Abstract \n\nTransformer-based models have pushed state \nof the art in many areas of NLP, but our un- \nderstanding of what is behind their success \nis still limited. This paper is the first sur- \nvey of over 150 studies of the popular BERT \nmodel. We review the current state of knowl- \nedge about how BERT works, what kind \nof information it learns and how it is repre- \nsented, common modifications to its training \nobjectives and architecture, the overparame- \nterization issue and approaches to compres- \nsion. We then outline directions for future \nresearch. ", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "improve BERT’s architecture, pre-training and fine- \ntuning. We conclude by discussing the issue of \noverparameterization, the approaches to compress- \ning BERT, and the nascent area of pruning as a \nmodel analysis technique. ", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Zhenzhong Lan, Mingda Chen, Sebastian Good- \nman, Kevin Gimpel, Piyush Sharma, and Radu \nSoricut. 2020a. ALBERT: A Lite BERT for \nSelf-Supervised Learning of Language Repre- \nsentations. In ICLR. \n\nYinhan Liu, Myle Ott, Naman Goyal, Jingfei Du, \nMandar Joshi, Danqi Chen, Omer Levy, Mike \nLewis, Luke Zettlemoyer, and Veselin Stoyanov. \n2019b. RoBERTa: A Robustly Optimized BERT \nPretraining Approach. arXiv:1907.11692 [cs]. \n\nZhenzhong Lan, Mingda Chen, Sebastian Good- \nman, Kevin Gimpel, Piyush Sharma, and Radu \nSoricut. 2020b. ALBERT: A Lite BERT for \nSelf-supervised Learning of Language Represen- \ntations. In ICLR 2020. \nXiaofei Ma, Zhiguo Wang, Patrick Ng, Ramesh \nNallapati, and Bing Xiang. 2019. Universal Text \nRepresentation from BERT: An Empirical Study. \narXiv:1910.07973 [cs]. ", + "page_start": 16, + "page_end": 16, + "source_file": "arxiv2_taclccby4_license.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_FFIN_2002.pdf", + "query": "How many affiliate banks has First Financial Bankshares ?", + "target_page": 4, + "target_passage": "The corporation has 10 affiliate banks, which provide services from 28 full-service locations in the Central, West and High Plains regions of Texas. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "First Financial Bankshares, Inc. is a financial holding company \n\nheadquartered in Abilene, Texas, with consolidated assets of $2.0 billion \n\nas of December 31, 2002. The corporation has 10 affiliate banks, \n\nwhich provide services from 28 full-service locations in the Central, West \n\nand High Plains regions of Texas. The common stock of First Financial \n\nBankshares, Inc. is held by more than 3,500 shareholders and is listed \n\non The NASDAQ Stock Market® under the symbol FFIN. ", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "**First Financial Bankshares, Inc.**\n\nWe provide management and technical resources and policy direction to our subsidiary banks, which enables \nthem to improve or expand their banking services while continuing their local activity and identity. Each of our \nsubsidiary banks operates under the day-to-day management of its own board of directors and officers, with \nsubstantial authority in making decisions concerning their own investments, loan policies, interest rates, and service \ncharges. We provide resources and policy direction in, among other things, the following areas: \n\n• \n• \n• \n• \n\nasset and liability management; \n\naccounting, budgeting, planning and insurance; \n\ncapitalization; and \n\nregulatory compliance. \n\nIn particular, we assist our subsidiary banks with, among other things, decisions concerning major capital \nexpenditures, employee fringe benefits, including pension plans and group insurance, dividend policies, and \nappointment of officers and directors and their compensation. We also perform, through corporate staff groups or \nby outsourcing to third parties, internal audits and loan reviews of our subsidiary banks. Through First National \nBank of Abilene, we provide advice and specialized services for our banks related to lending, investing, purchasing, \nadvertising, public relations, and computer services. \n\nWhile we have no specific acquisition agreements in place or commitments to expand our branch network, we \nperiodically evaluate various potential financial institution acquisition opportunities and also periodically evaluate \npotential locations for new branch offices. We anticipate that funding for any acquisitions or expansions would be \nprovided from our existing cash balances, available dividends from subsidiary banks, utilization of available lines of \ncredit and future debt or equity offerings. ", + "page_start": 29, + "page_end": 29, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\n1. SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES: \n\nNature of Operations \n\nFirst Financial Bankshares, Inc. (a Texas corporation) (“Bankshares”) is a financial holding company which owns \n(through its wholly-owned Delaware subsidiary) all of the capital stock of ten banks located in Texas as of \nDecember 31, 2002. Those subsidiary banks are First National Bank of Abilene; Hereford State Bank; First \nNational Bank, Sweetwater; Eastland National Bank; First Financial Bank, National Association, Cleburne; \nStephenville Bank & Trust Co.; San Angelo National Bank; Weatherford National Bank; First Financial Bank, \nNational Association, Southlake and City National Bank, Mineral Wells. Each subsidiary bank’s primary source of \nrevenue is providing loans and banking services to consumers and commercial customers in the market area in \nwhich the subsidiary is located. \n\nA summary of significant accounting policies of Bankshares and subsidiaries (collectively, the “Company”) applied \nin the preparation of the accompanying consolidated financial statements follows. The accounting principles \nfollowed by the Company and the methods of applying them are in conformity with both accounting principles \ngenerally accepted in the United States of America and prevailing practices of the banking industry. ", + "page_start": 72, + "page_end": 72, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "Such statements reflect the current views of our management with respect to future events and are subject to these \nand other risks, uncertainties and assumptions relating to our operations, results of operations, growth strategy and \nliquidity. All subsequent written and oral forward-looking statements attributable to us or persons acting on our \nbehalf are expressly qualified in their entirety by this paragraph. \n\n**PART I**\n\n**ITEM 1.** **BUSINESS**\n\n**General**\n\nFirst Financial Bankshares, Inc., a Texas corporation, is a financial holding company registered under the Bank \nHolding Company Act of 1956, or BHCA. As such, we are supervised by the Board of Governors of the Federal \nReserve System, or Federal Reserve Board, as well as several other state and federal regulators. We were formed as \na bank holding company in 1956 under the original name F & M Operating Company, but our banking operations \ndate back to 1890, when Farmers and Merchants National Bank opened for business in Abilene, Texas. By virtue of \na series of reorganizations, mergers, and acquisitions since 1956, we now own, through our wholly-owned Delaware \nsubsidiary, First Financial Bankshares of Delaware, Inc., ten banks organized and located in Texas. These ten banks \nare: ", + "page_start": 28, + "page_end": 28, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "“With First Financial Bankshares, you know the \npeople that you work with, and they are friends. \nPeople that you trust.” \nMaggy Morford \nCivic Leader \nInvestor \nAbilene, Texas \n\n“You know the people you work \nwith, and they are friends. People \nthat you trust.” ", + "page_start": 12, + "page_end": 12, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "**REPORT OF INDEPENDENT AUDITORS**\n\nTo the Board of Directors and Shareholders of \nFirst Financial Bankshares, Inc. \n\nWe have audited the accompanying consolidated balance sheet of First Financial Bankshares, Inc. (a Texas \ncorporation) and subsidiaries as of December 31, 2002, and the related consolidated statements of earnings, \ncomprehensive earnings, shareholders’ equity, and cash flows for the year then ended. These financial statements \nare the responsibility of the Company’s management. Our responsibility is to express an opinion on these financial \nstatements based on our audit. The consolidated financial statements of First Financial Bankshares, Inc. and \nsubsidiaries as of December 31, 2001 and for each of the two years then ended, were audited by other auditors who \nhave ceased operations and whose report dated January 11, 2002, expressed an unqualified opinion on those \nstatements. \n\nWe conducted our audit in accordance with auditing standards generally accepted in the United States. Those \nstandards require that we plan and perform the audit to obtain reasonable assurance about whether the financial \nstatements are free of material misstatement. An audit includes examining, on a test basis, evidence supporting the \namounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used \nand significant estimates made by management, as well as evaluating the overall financial statement presentation. \nWe believe that our audit provides a reasonable basis for our opinion. ", + "page_start": 64, + "page_end": 64, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "As discussed above, the financial statements of First Financial Bankshares, Inc. as of December 31, 2001 and the \ntwo years then ended were audited by other auditors who have ceased operations. As described in Note 1, these \nfinancial statements have been revised to include the transitional disclosures required by Statement of Financial \nAccounting Standards No. 142,*Goodwill and Other Intangible Assets*, which was adopted by the Company as of \nJanuary 1, 2002. Our audit procedures with respect to the disclosures in Note 1 with respect to 2001 and 2000 \nincluded (a) agreeing the previously reported net income to the previously issued financial statements and the \nadjustments to reported net income representing amortization expense including related tax effects recognized in \nthose periods related to goodwill to the Company’s underlying records obtained from management, and (b) testing \nthe mathematical accuracy of the reconciliation of adjusted net income to reported net income, and the related \nearnings per share amounts. In our opinion, the disclosures for 2001 and 2000 are appropriate. However, we were \nnot engaged to audit, review, or apply any procedures to the 2001 and 2000 financial statements of the Company \nother than with respect to such disclosures and, accordingly, we do not express an opinion or any other form of \nassurance on the 2001 and 2000 financial statements taken as a whole. ", + "page_start": 64, + "page_end": 64, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\n17. BUSINESS COMBINATION: \n\nIn July 2001, the Company purchased all of the outstanding stock of City Bancshares, Inc. (“City”) and its \nsubsidiary, City National Bank for $16,500,000 in cash. The total purchase price exceeded the estimated fair market \nvalue of net assets acquired by approximately $7,800,000, of which approximately $950,000 was assigned to an \nidentifiable intangible asset with the balance recorded by the Company as goodwill. The identifiable intangible \nasset represents the future benefit associated with the acquisition of the core deposits of City and is being amortized \nover seven years utilizing a method that approximates the expected attrition of the deposits. \n\nThe primary purpose of the acquisition was to expand the Company’s market share in areas with close proximity to \nDallas/Ft. Worth, Texas. Factors that contributed to a purchase price resulting in goodwill include City’s \nhistorically stable record of earnings, capable management and its geographic location, which complements the \nCompany’s existing service locations. Subsequent to the acquisition, the Company liquidated the stock of City and \nCity National Bank is operating as a subsidiary of the Company. The results of operations of City National Bank are \nincluded in the consolidated earnings of the Company commencing July 1, 2001. ", + "page_start": 92, + "page_end": 92, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\n16. CONDENSED FINANCIAL INFORMATION - PARENT COMPANY: ", + "page_start": 90, + "page_end": 90, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "**REPORT OF INDEPENDENT PUBLIC ACCOUNTANTS**\n\nTo the Board of Directors and Shareholders of \nFirst Financial Bankshares, Inc. \n\nWe have audited the accompanying consolidated balance sheets of First Financial Bankshares, Inc. (a Texas \ncorporation) and subsidiaries as of December 31, 2001 and 2000, and the related consolidated statements of \nearnings, comprehensive earnings, shareholders’ equity, and cash flows for each of the three years in the period \nended December 31, 2001. These financial statements are the responsibility of the Company’s management. Our \nresponsibility is to express an opinion on these financial statements based on our audits. \n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States. Those \nstandards require that we plan and perform the audit to obtain reasonable assurance about whether the financial \nstatements are free of material misstatement. An audit includes examining, on a test basis, evidence supporting the \namounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used \nand significant estimates made by management, as well as evaluating the overall financial statement presentation. \nWe believe that our audits provide a reasonable basis for our opinion. \n\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the financial position \nof First Financial Bankshares, Inc. and subsidiaries as of December 31, 2001 and 2000, and the results of their \noperations and their cash flows for each of the three years in the period ended December 31, 2001, in conformity \nwith accounting principles generally accepted in the United States. ", + "page_start": 65, + "page_end": 65, + "source_file": "NASDAQ_FFIN_2002.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_FFIN_2002.pdf", + "query": "What was the net income of First Financial Bankshares in 1995 ?", + "target_page": 14, + "target_passage": " 16,355", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\n17. BUSINESS COMBINATION: \n\nIn July 2001, the Company purchased all of the outstanding stock of City Bancshares, Inc. (“City”) and its \nsubsidiary, City National Bank for $16,500,000 in cash. The total purchase price exceeded the estimated fair market \nvalue of net assets acquired by approximately $7,800,000, of which approximately $950,000 was assigned to an \nidentifiable intangible asset with the balance recorded by the Company as goodwill. The identifiable intangible \nasset represents the future benefit associated with the acquisition of the core deposits of City and is being amortized \nover seven years utilizing a method that approximates the expected attrition of the deposits. \n\nThe primary purpose of the acquisition was to expand the Company’s market share in areas with close proximity to \nDallas/Ft. Worth, Texas. Factors that contributed to a purchase price resulting in goodwill include City’s \nhistorically stable record of earnings, capable management and its geographic location, which complements the \nCompany’s existing service locations. Subsequent to the acquisition, the Company liquidated the stock of City and \nCity National Bank is operating as a subsidiary of the Company. The results of operations of City National Bank are \nincluded in the consolidated earnings of the Company commencing July 1, 2001. ", + "page_start": 92, + "page_end": 92, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "As discussed above, the financial statements of First Financial Bankshares, Inc. as of December 31, 2001 and the \ntwo years then ended were audited by other auditors who have ceased operations. As described in Note 1, these \nfinancial statements have been revised to include the transitional disclosures required by Statement of Financial \nAccounting Standards No. 142,*Goodwill and Other Intangible Assets*, which was adopted by the Company as of \nJanuary 1, 2002. Our audit procedures with respect to the disclosures in Note 1 with respect to 2001 and 2000 \nincluded (a) agreeing the previously reported net income to the previously issued financial statements and the \nadjustments to reported net income representing amortization expense including related tax effects recognized in \nthose periods related to goodwill to the Company’s underlying records obtained from management, and (b) testing \nthe mathematical accuracy of the reconciliation of adjusted net income to reported net income, and the related \nearnings per share amounts. In our opinion, the disclosures for 2001 and 2000 are appropriate. However, we were \nnot engaged to audit, review, or apply any procedures to the 2001 and 2000 financial statements of the Company \nother than with respect to such disclosures and, accordingly, we do not express an opinion or any other form of \nassurance on the 2001 and 2000 financial statements taken as a whole. ", + "page_start": 64, + "page_end": 64, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "First Financial Bankshares, Inc. is a financial holding company \n\nheadquartered in Abilene, Texas, with consolidated assets of $2.0 billion \n\nas of December 31, 2002. The corporation has 10 affiliate banks, \n\nwhich provide services from 28 full-service locations in the Central, West \n\nand High Plains regions of Texas. The common stock of First Financial \n\nBankshares, Inc. is held by more than 3,500 shareholders and is listed \n\non The NASDAQ Stock Market® under the symbol FFIN. ", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\n1. SUMMARY OF SIGNIFICANT ACCOUNTING POLICIES: \n\nNature of Operations \n\nFirst Financial Bankshares, Inc. (a Texas corporation) (“Bankshares”) is a financial holding company which owns \n(through its wholly-owned Delaware subsidiary) all of the capital stock of ten banks located in Texas as of \nDecember 31, 2002. Those subsidiary banks are First National Bank of Abilene; Hereford State Bank; First \nNational Bank, Sweetwater; Eastland National Bank; First Financial Bank, National Association, Cleburne; \nStephenville Bank & Trust Co.; San Angelo National Bank; Weatherford National Bank; First Financial Bank, \nNational Association, Southlake and City National Bank, Mineral Wells. Each subsidiary bank’s primary source of \nrevenue is providing loans and banking services to consumers and commercial customers in the market area in \nwhich the subsidiary is located. \n\nA summary of significant accounting policies of Bankshares and subsidiaries (collectively, the “Company”) applied \nin the preparation of the accompanying consolidated financial statements follows. The accounting principles \nfollowed by the Company and the methods of applying them are in conformity with both accounting principles \ngenerally accepted in the United States of America and prevailing practices of the banking industry. ", + "page_start": 72, + "page_end": 72, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "**REPORT OF INDEPENDENT PUBLIC ACCOUNTANTS**\n\nTo the Board of Directors and Shareholders of \nFirst Financial Bankshares, Inc. \n\nWe have audited the accompanying consolidated balance sheets of First Financial Bankshares, Inc. (a Texas \ncorporation) and subsidiaries as of December 31, 2001 and 2000, and the related consolidated statements of \nearnings, comprehensive earnings, shareholders’ equity, and cash flows for each of the three years in the period \nended December 31, 2001. These financial statements are the responsibility of the Company’s management. Our \nresponsibility is to express an opinion on these financial statements based on our audits. \n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States. Those \nstandards require that we plan and perform the audit to obtain reasonable assurance about whether the financial \nstatements are free of material misstatement. An audit includes examining, on a test basis, evidence supporting the \namounts and disclosures in the financial statements. An audit also includes assessing the accounting principles used \nand significant estimates made by management, as well as evaluating the overall financial statement presentation. \nWe believe that our audits provide a reasonable basis for our opinion. \n\nIn our opinion, the financial statements referred to above present fairly, in all material respects, the financial position \nof First Financial Bankshares, Inc. and subsidiaries as of December 31, 2001 and 2000, and the results of their \noperations and their cash flows for each of the three years in the period ended December 31, 2001, in conformity \nwith accounting principles generally accepted in the United States. ", + "page_start": 65, + "page_end": 65, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "18. AMOUNTS PER SHARE \n\n2004 \n*Mar. 31, 2005* *For the years ended*\n\nNet income: \n\nBasic ...................................................................................................................................................................................... ¥125.16 \nDiluted .................................................................................................................................................................................. 124.01 \n24.00 \n¥122.02 \n120.74 \n19.00 ¥117.75 \n116.88 \n14.00 Cash dividends applicable to the year................................................................................................................. \n\n*Yen*\n\n*U.S. dollars*\n2004 \n*Mar. 31, 2005* 2004 \n*Mar. 31, 2005* 2003 \n*Mar. 31, 2004* *As of*\n\nNet assets .................................................................................................................................................................................................................. ¥604.49 \n$5.649 \n¥493.85 ", + "page_start": 88, + "page_end": 88, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Earnings per share, assuming dilution: \n\nReported net earnings \nGoodwill amortization, net of income tax benefit \n$ 2.37 \n .10 \n $ 2.47 $ 2.27 \n .10 \n $ 2.37 Adjusted net earnings \n\nGoodwill arising from acquisitions of assets and liabilities, rather than acquisitions of stock, amounting to \n$13,000,000, is deductible for federal income tax purposes. \n\nOther identifiable intangible assets recorded by the Company represent the future benefit associated with the \nacquisition of the core deposits of City Bancshares, Inc. (Note 17) and is being amortized over seven years utilizing \na method that approximates the expected attrition of the deposits. \n\nSecurities Sold Under Agreements To Repurchase \n\nSecurities sold under agreements to repurchase, which are classified as secured borrowings, generally mature within \none to four days from the transaction date. Securities sold under agreements to repurchase are reflected at the \namount of the cash received in connection with the transaction. The Company may be required to provide additional \ncollateral based on the estimated fair value of the underlying securities. \n\nSegment Reporting \n\nThe Company has determined that it operates one line of business (community banking) located in a single \ngeographic area (Texas). \n\nStatements of Cash Flows \n\nFor purposes of reporting cash flows, cash and cash equivalents include cash on hand, amounts due from banks, and \nfederal funds sold. ", + "page_start": 74, + "page_end": 74, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\nThe estimated fair values, and carrying values at December 31, 2002 and 2001, were as follows: ", + "page_start": 83, + "page_end": 83, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "FIRST FINANCIAL BANKSHARES, INC. AND SUBSIDIARIES \nNotes to Consolidated Financial Statements \nDecember 31, 2002, 2001 and 2000 \n\nOn January 1, 2002, goodwill amounting to $23,765,896 was not subject to further amortization as a result of SFAS \nNo. 142. The Company conducted its initial impairment test in 2002, with no reduction of recorded goodwill \nresulting from the test. A reconciliation adjusting comparative net earnings and earnings per share for the years \nended December 31, 2001 and 2000, to show the effect of no longer amortizing the Company’s goodwill, follows: \n\n 2001 2000 \n\nReported net earnings \nAdd back: goodwill amortization \n$ 29,354,505 $ 28,316,047 \n\nGoodwill amortization, before income tax \nIncome tax benefit \nAdjusted net earnings 1,641,367 \n1,641,367 \n (420,000) \n (420,000) \n $ 30,575,872 $ 29,537,414 \n\nBasic earnings per share: \nReported net earnings \nGoodwill amortization, net of income tax benefit \n$ 2.38 \n .10 \n $ 2.48 $ 2.28 \n .10 \n$ 2.38 Adjusted net earnings ", + "page_start": 74, + "page_end": 74, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "Such statements reflect the current views of our management with respect to future events and are subject to these \nand other risks, uncertainties and assumptions relating to our operations, results of operations, growth strategy and \nliquidity. All subsequent written and oral forward-looking statements attributable to us or persons acting on our \nbehalf are expressly qualified in their entirety by this paragraph. \n\n**PART I**\n\n**ITEM 1.** **BUSINESS**\n\n**General**\n\nFirst Financial Bankshares, Inc., a Texas corporation, is a financial holding company registered under the Bank \nHolding Company Act of 1956, or BHCA. As such, we are supervised by the Board of Governors of the Federal \nReserve System, or Federal Reserve Board, as well as several other state and federal regulators. We were formed as \na bank holding company in 1956 under the original name F & M Operating Company, but our banking operations \ndate back to 1890, when Farmers and Merchants National Bank opened for business in Abilene, Texas. By virtue of \na series of reorganizations, mergers, and acquisitions since 1956, we now own, through our wholly-owned Delaware \nsubsidiary, First Financial Bankshares of Delaware, Inc., ten banks organized and located in Texas. These ten banks \nare: ", + "page_start": 28, + "page_end": 28, + "source_file": "NASDAQ_FFIN_2002.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_FFIN_2002.pdf", + "query": "What is the address of the San Angelo National Bank main office ?", + "target_page": 21, + "target_passage": "Main Office 301 W. Beauregard San Angelo, Texas 76903 Chartered 1997 ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "San Angelo National Bank \n\nMain Office \n301 W. Beauregard \nSan Angelo, Texas 76903 \n*Chartered 1997*\nBranch \n3471 Knickerbocker \nSan Angelo, Texas 76904 \n\nDirectors \nDal DeWees \n*Chairman of the Board*\nGeorge Alexander \n*Partner, Alexander Construction Company*\nMichael L. Boyd \n*President and Chief Executive Officer*\nW. Dan Cravy, M.D. \n*Physician*\nDavid B. Drake \n*Investment Advisor*\nF. Scott Dueser \n*First Financial Bankshares, Inc.*\nDoug Eakman \n*Owner, Pecos Street Pharmacy*\nJoe Henderson \n*President, Porter Henderson Implement*\n*Company, Inc.*\n\nSenior Officers \nMichael L. Boyd \n*President and Chief Executive Officer*\nDavid Byrd \n*Executive Vice President and Trust Officer*\nRobert Pate \n*Executive Vice President*\nKatherine Reeves \n*Executive Vice President and Cashier*", + "page_start": 20, + "page_end": 20, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "First National Bank of Abilene \n\nMain Office \n400 Pine Street \nAbilene, Texas 79601 \n*Chartered 1890*\nBranches \n4400 Buffalo Gap Road \nAbilene, Texas 79606 \n4350 Southwest Drive \nAbilene, Texas 79606 \n920 N. Willis \nAbilene, Texas 79603 \n3300 S. 14th Street \nAbilene, Texas 79605 \n1010 N. Judge Ely Blvd. \nAbilene, Texas 79601 \n701 Pine Street \nAbilene, Texas 79601 \n1345 Barrow Street \nAbilene, Texas 79605 \n\nAdvisory \nBob J. Surovik \n*McMahon, Surovik, Suttle, Buhrmann,*\n*Hicks and Gill, P.C.*\nSteve Suttle \n*McMahon, Surovik, Suttle, Buhrmann,*\n*Hicks and Gill, P.C.*\n\nSenior Officers \nF. Scott Dueser \n*Chairman of the Board*\nChuck A. Cowell \n*President and Chief Executive Officer*\nRon Fogle \n*Executive Vice President, Commercial Loans*\nRobert S. Patterson \n*Executive Vice President and*\n*Senior Trust Officer*\nJohn Prince \n*Executive Vice President, Personal Loans*", + "page_start": 15, + "page_end": 15, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "**Services Offered by Our Subsidiary Banks**\n\nEach of our subsidiary banks is a separate legal entity that operates under the day-to-day management of its own \nboard of directors and officers. Each of our subsidiary banks provides general commercial banking services, which \ninclude accepting and holding checking, savings and time deposits, making loans, automated teller machines, drive- \nin and night deposit services, safe deposit facilities, transmitting funds, and performing other customary commercial \nbanking services. Certain of our subsidiary banks also administer pension plans, profit sharing plans and other \nemployee benefit plans. First National Bank of Abilene, First National Bank, Sweetwater, Stephenville Bank and \nTrust Co. and San Angelo National Bank have active trust departments. The trust departments offer a complete ", + "page_start": 29, + "page_end": 29, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "• Eastland National Bank, Eastland, Texas; \n• First Financial Bank, National Association, Cleburne, Texas; \n• Stephenville Bank and Trust Co., Stephenville, Texas; \n• San Angelo National Bank, San Angelo, Texas; \n• Weatherford National Bank, Weatherford, Texas; \n• First Financial Bank, National Association, Southlake, Texas; and \n• City National Bank, Mineral Wells, Texas. \n\nAs described in more detail below, we elected to be treated as a financial holding company in September 2001. \n\nOur service centers are located primarily in North Central and West Texas. Considering the branches and \nlocations of all our subsidiary banks, as of December 31, 2002, we had 28 financial centers across Texas, with seven \nlocations in Abilene, two locations in Cleburne, two locations in Stephenville, two locations in San Angelo, three \nlocations in Weatherford, and one location each in Mineral Wells, Hereford, Sweetwater, Eastland, Southlake, \nAledo, Alvarado, Burleson, Keller, Trophy Club, Roby, and Trent. \n\nInformation on our revenues, profits and losses and total assets appears in the discussion of our Results of \nOperations contained in Item 7 hereof. ", + "page_start": 29, + "page_end": 29, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "**ITEM 2.** **PROPERTIES**\n\nOur principal office is located in the First National Bank Building at 400 Pine Street in downtown Abilene, \nTexas. We lease two spaces in a building owned by First National Bank of Abilene. The lease for approximately \n2,300 square feet of space expires December 31, 2004. The lease for approximately 1,100 square feet of space \nexpires May 31, 2006. Our subsidiary banks collectively own 22 banking facilities, some of which are detached \ndrive-ins, and they also lease six banking facilities. Our management considers all of our existing locations to be \nwell-suited for conducting the business of banking. We believe that our existing facilities are adequate to meet our \nrequirements and our subsidiary banks’ requirements for the foreseeable future. \n\n**ITEM 3.** **LEGAL PROCEEDINGS**\n\nFrom time to time we and our subsidiary banks are parties to lawsuits arising in the ordinary course of our \nbanking business. However, there are no material pending legal proceedings to which we, our subsidiary banks or \nour other direct and indirect subsidiaries, or any of their properties, are currently subject. Other than regular, routine \nexaminations by state and federal banking authorities, there are no proceedings pending or known to be \ncontemplated by any governmental authorities. ", + "page_start": 38, + "page_end": 38, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "First Financial Bank, \nNational Association, Cleburne \n\nMain Office \n403 N. Main \nCleburne, Texas 76033 \n*Chartered 1927*\nBranches \n200 N. Ridgeway \nCleburne, Texas 76033 \n1900 S.W. Wilshire \nBurleson, Texas 76028 \n201 E. Highway 67 \nAlvarado, Texas 76009 \n\nHomer S. Pittman, Jr. \n*Senior Vice President and Cashier*\nCraig Beskow \n*Senior Vice President*\nDerek Schmidt \n*Senior Vice President*\n\nJim Easdon \n*Investments*\nCurtis R. Harvey \n*First Financial Bankshares, Inc.*\nHollis E. (Gene) Joslin \n*Investments*\nBrent D. Magers \n*Chief Executive Officer and Administrator,*\n*Walls Regional Hospital*\nGeorge Marti \n*Marti Enterprises*\n\nDirectors \nRonald E. Schneider \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nAlbert A. Archer \n*Chairman of the Board, Walls Industries, Inc.*\nGary Bennett \n*Bennett Printing & Office Supply*\nRobert T. Childress \n*Investments*\nF. Scott Dueser \n*First Financial Bankshares, Inc.*\n\nSenior Officers \nRonald E. Schneider \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nPerry Ginn \n*Executive Vice President*", + "page_start": 16, + "page_end": 16, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "City National Bank, Mineral Wells \n\nOffice \n1800 E. Hubbard \nMineral Wells, Texas 76068 \n*Chartered 1925*\n\nDirectors \nKen A. Williamson \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nF. Scott Dueser \n*First Financial Bankshares, Inc.*\nTerry L. Murphy \n*President and Chief Executive Officer,*\n*Murphy and Murphy, Inc.*\nDon O’Neal \n*Don O’Neal Distributing Company, Inc.,*\n*O’Neal Enterprises, Inc.*\nDavid Ramsey, M.D. \n*Family Practice Center*\n\nBrad Seay \n*Executive Vice President*\nJimmy Seay \n*Investments and Ranching*\nWalter Joe Thomas, D.D.S. \n*Dentist*\n\nSenior Officers \nKen A. Williamson \n*Chairman of the Board, President and*\n*Chief Executive Officer*\nBrad Seay \n*Executive Vice President, Lending*\nEddie Gregory \n*Vice President*\nKay Hudspeth \n*Cashier*\nMike Mearse \n*Vice President*", + "page_start": 19, + "page_end": 19, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "First Financial Bank, \nNational Association, Southlake \n\nMain Office \n3205 E. Highway 114 \nSouthlake, Texas 76092 \n*Chartered 1985*\nBranches \n95 Trophy Club Drive \nTrophy Club, Texas 76262 \n891 E. Keller Parkway \nSuite 100 \nKeller, Texas 76248 \n\nSenior Officers \nPerry D. Elliott \n*Chairman of the Board*\nMark L. Jones \n*President and Chief Executive Officer*\nF. Mills Shallene \n*Senior Vice President*\nJ. Sean Shope \n*Senior Vice President*\nMichele P. Stevens \n*Senior Vice President and Cashier*\n\nJack Dortch \n*Jack Dortch Insurance Agency*\nF. Scott Dueser \n*First Financial Bankshares, Inc.*\nDerrell Johnson \n*President, American Council of Engineering*\n*Companies Life Health Trust*\nMark L. Jones \n*President and Chief Executive Officer*\nK. Wayne Lee \n*President, DDFW Properties*\nRobert S. Mundlin \n*Owner, Lifetime Benefits Insurance*\nJim Ridenour \n*President, Sunbelt Station Service*\n\nDirectors \nPerry D. Elliott \n*Chairman of the Board*\nJames E. Burger \n*Burger Construction*", + "page_start": 21, + "page_end": 21, + "source_file": "NASDAQ_FFIN_2002.pdf" + }, + { + "text": "**REGISTERED AND HEAD OFFICE**\nGround Floor, Santos House \n91 King William Street \nAdelaide, South Australia 5000 \nGPO Box 2455 \nAdelaide, South Australia 5001 \nTelephone 08 8218 5111 \nFacsimile 08 8218 5274 \n\n**SHARE REGISTER**\nGround Floor, Santos House \n91 King William Street \nAdelaide, South Australia 5000 \nGPO Box 2455 \nAdelaide, South Australia 5001 \nTelephone 08 8218 5111 \nFacsimile 08 8218 5950 \n\n**OFFICES**\n**Brisbane**\nLevel 14, Santos House \n60 Edward Street \nBrisbane, Queensland 4000 \nTelephone 07 3228 6666 \nFacsimile 07 3228 6920 ", + "page_start": 95, + "page_end": 95, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "**REGISTERED AND HEAD OFFICE**\nGround Floor, Santos House \n91 King William Street \nAdelaide, South Australia 5000 \nGPO Box 2455 \nAdelaide, South Australia 5001 \nTelephone 08 8218 5111 \nFacsimile 08 8218 5274 \n\n**SHARE REGISTER**\nGround Floor, Santos House \n91 King William Street \nAdelaide, South Australia 5000 \nGPO Box 2455 \nAdelaide, South Australia 5001 \nTelephone 08 8218 5111 \nFacsimile 08 8218 5950 \n\n**OFFICES**\n**Brisbane**\nLevel 14, Santos House \n60 Edward Street \nBrisbane, Queensland 4000 \nTelephone 07 3228 6666 \nFacsimile 07 3228 6920 ", + "page_start": 0, + "page_end": 0, + "source_file": "ASX_STO_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "news3.pdf", + "query": "What kind of scholarship programs are available to start a financial career?", + "target_page": 1, + "target_passage": "Some are offered directly through colleges and universities that have financial planning degree and certificate programs. Others are available through nonprofits and organizations like the CFP Board Center for Financial Planning", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "MON EY \n\n3 Great Resources to Kick-Start Your Financial \nPlanning Career \n\n11/23/2022 \n\n(NewsUSA) - Finding a rewarding career that offers growth potential, work-life balance and the satisfaction of \n\nhelping others is a key priority for many job seekers. With those goals in mind, a career in financial planning should \n\nbe a top contender, whether you are just starting out or looking to make a career change. But once you have \n\ndecided that financial planning is the field for you, how do you get started? Here are three resources that can help \n\nyou launch a successful financial planning career. \n\n1. Guide to Careers in Financial Planning. Based on interviews with leading financial services firms, this guide \n\nintroduces you to the wide range of career opportunities in the financial planning profession. It identifies typical entry \n\npoints and career tracks, explores the types of companies that hire financial planners and provides information on \n\nhow to find financial planning career opportunities. It also includes resources such as a list of recommended \n\nquestions to ask in a job interview. \n\n2. Scholarship Programs. Dozens of scholarship programs are available to support you on your professional \n\njourney. Some are offered directly through colleges and universities that have financial planning degree and \n\ncertificate programs. Others are available through nonprofits and organizations like the CFP Board Center for \n\nFinancial Planning, which administers 16 scholarship programs that help pay for the education and exam \n\nrequirements to become a CERTIFIED FINANCIAL PLANNERTM professional. Financial services firms may offer \n\nscholarships or tuition reimbursements to employees to cover the costs of obtaining professional designations and \n\ncredentials such as CFP® certification -- some of which may be required to advance within the company. ", + "page_start": 0, + "page_end": 0, + "source_file": "news3.pdf" + }, + { + "text": "3. Career Fairs. In-person and virtual career fairs provide valuable opportunities to connect with prospective \n\nemployers. CFP Board’s spring and fall career fairs are some of the most popular hiring events in the profession, \n\nwith dozens of firms participating in these online exhibitions. Job seekers can visit employers’ virtual exhibit booths \n\nand view open jobs and internships, apply for open positions and interact with employers through one-on-one video \n\nmeetings and messaging. You can also visit the CFP Board Career Center to browse current job and internship \n\nopportunities in financial planning, as well as a collection of articles providing career guidance. \n\nOther top resources include career offices at your college or university, financial services companies’ career \n\nwebsites and professional organizations that may have a local chapter near you. \n\nMaking the most of these resources will not only help you find a financial planning job, but also support your growth \n\nand development as a future financial planning professional. To learn more about CFP® certification, visit the CFP \n\nBoard website. \n\nArticle Link \n\nhttps://about.newsusa.com/3-great-resources-to-kick-start-your-financial-planni… ", + "page_start": 0, + "page_end": 0, + "source_file": "news3.pdf" + }, + { + "text": "**China**\n**2**\n\n**Scholarships at major universities**\n\nSumitomo Mitsui Banking Corporation (China) Limited \nSumitomo Mitsui Banking Corporation (China) Limited \nestablished a scholarship program for students of Zhejiang \nestablished a scholarship program for students of Zhejiang \nUniversity, Shanghai Inter \nUniversity, Shanghai Inter- \nnational Studies University, \nnational Studies University, \nSun Yat-sen University, \nSun Yat-sen University, \nand other universities. \nand other universities. ", + "page_start": 14, + "page_end": 14, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "\n\nFINANCIAL SECTION ", + "page_start": 69, + "page_end": 69, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "to selected students pursuing careers in finance, economics, accounting, \nmarketing, business administration, computer science and information \ntechnology. In addition, scholars will take part in a Chesapeake Presiden- \ntial Leadership Course facilitated by faculty members in coordination with \ndesignated Chesapeake leadership coaches, including a Chesapeake senior \nvice president and OCU alumni. \n\nvolunteer program in which employees roll up their sleeves in the com- \nmunities they call home. \n\nIn 2007 Chesapeake launched a scholarship program in Texas with an \ninitial $1.25 million contribution, challenging the cities of Fort Worth and Dal- \nlas to match its gift within a year. The cities responded and matched the gift, \nso Chesapeake in 2008 added another $1.25 million to the fund, bringing the \ntotal to $3.75 million. The Chesapeake Scholarship Fund currently funds the \ncost of higher education for 48 minority students. The fund provides each \nstudent $20,000 a year for up to four years at the school of their choice. To \ndate more than $1.0 million has been distributed to deserving local students. \nTo help ensure the training of qualified geologists, engineers, land- \nmen and energy lawyers in the next generation, we award scholarships \nto students pursuing energy-related degrees. We also help mentor them \nthrough Chesapeake’s Peak Program. Junior- and senior-level scholarship \nrecipients are paired with Chesapeake employee mentors who help devel- \nop students’ knowledge and provide career advice. There are currently 25 \nmentors and 40 scholarship recipients participating in the Peak Program. \n\nChesapeake partners with other companies and organizations to meet \nbasic, practical needs in hundreds of communities. An example is our ", + "page_start": 26, + "page_end": 26, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "\n\nFINANCE ", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Financial services \nAI is also making waves in the financial sector, offering smarter and more secure ways to manage \nmoney. From AI-driven investment platforms that provide personalized financial advice to fraud \ndetection systems that protect against cyber threats, AI can analyze vast amounts of data to identify \ntrends and make more informed financial decisions. \n\nEnhanced education \nIn education, enhanced learning tools provide personalized learning experiences that adapt to each \nstudent’s strengths and weaknesses. This technology can offer real-time feedback, helping students \nimprove their skills more effectively. Additionally, AI can assist educators by automating administrative \ntasks and providing insights into student performance, allowing for more focused and effective \nteaching. \n\nLearn more at intel.com/aipc. \n\nwww.newscanada.com \n\nWord Count: 346 ", + "page_start": 0, + "page_end": 0, + "source_file": "news4.pdf" + }, + { + "text": "**The United States**\n**10**\n\n**SMBC GLOBAL FOUNDATION**\n\nBased in the United States, SMBC Global Foundation has \nBased in the United States, SMBC Global Foundation has \nprovided scholarships to more than 5,000 university students \nprovided scholarships to more than 5,000 university students \nin Asian countries since its establishment in 1994. In the \nin Asian countries since its establishment in 1994. In the \nUnited States, it supports educational trips to Japan \nUnited States, it supports educational trips to Japan \norganized by a high school located in Harlem, New York City, \norganized by a high school located in Harlem, New York City, \nand volunteer employees of SMBC and JRI to participate in \nand volunteer employees of SMBC and JRI to participate in \nschool beautification programs. The foundation also provides \nschool beautification programs. The foundation also provides \nmatching gifts for SMBC employees. \nmatching gifts for SMBC employees. ", + "page_start": 14, + "page_end": 14, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "We also established the Chesapeake Energy Presidential Scholars Pro- \ngram at the Oklahoma City University Meinders School of Business, making \na $5.0 million commitment to be distributed over the next five years. The \nChesapeake Scholars Program will provide up to $25,000 per year in tuition \n**24%**", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**Transition alternatives.**There are two allowable transition alternatives – the modified- \nprospective transition or the modified-retrospective transition. Under the modified- \nprospective transition, we would begin applying the valuation and other criteria to \nstock options granted beginning July 1, 2005. We would begin recognizing expense for \nthe unvested portion of previously issued grants at the same time, based on the valua- \ntion and attribution methods originally used to calculate the disclosures. Under the \nmodified-retrospective transition, we would restate prior periods to reflect the previous- \nly calculated amounts in the pro forma disclosures as actual expenses of the prior \nperiod (with no change in valuation or attribution methods). Future accounting would ", + "page_start": 46, + "page_end": 46, + "source_file": "NYSE_MGM_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "news3.pdf", + "query": "what are career fairs for?", + "target_page": 1, + "target_passage": " In-person and virtual career fairs provide valuable opportunities to connect with prospective employers.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "3. Career Fairs. In-person and virtual career fairs provide valuable opportunities to connect with prospective \n\nemployers. CFP Board’s spring and fall career fairs are some of the most popular hiring events in the profession, \n\nwith dozens of firms participating in these online exhibitions. Job seekers can visit employers’ virtual exhibit booths \n\nand view open jobs and internships, apply for open positions and interact with employers through one-on-one video \n\nmeetings and messaging. You can also visit the CFP Board Career Center to browse current job and internship \n\nopportunities in financial planning, as well as a collection of articles providing career guidance. \n\nOther top resources include career offices at your college or university, financial services companies’ career \n\nwebsites and professional organizations that may have a local chapter near you. \n\nMaking the most of these resources will not only help you find a financial planning job, but also support your growth \n\nand development as a future financial planning professional. To learn more about CFP® certification, visit the CFP \n\nBoard website. \n\nArticle Link \n\nhttps://about.newsusa.com/3-great-resources-to-kick-start-your-financial-planni… ", + "page_start": 0, + "page_end": 0, + "source_file": "news3.pdf" + }, + { + "text": "You need to use this opportunity to introduce yourself and your \nskills, and to set yourself apart from all the other candidates. \nYou can also use this opportunity to explain any gaps in your CV, \nand to motivate why you are the right person for the job. ", + "page_start": 44, + "page_end": 44, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "In a career context, good language skills can also: \n\n• Affect your credibility. Poor grammar indicates to a prospective \n\nemployer that you are sloppy, while flawless grammar indicates that \n\nyou pay attention to detail. \n\nImprove your relationships with your co- workers. If you are able \nto express yourself clearly, you can eliminate the confusion and \nmisunderstanding that often leads to conflict. \n\n• \n\nIncrease your chances of being promoted. \n• \n\n• Help you to create a good impression. \n\nImprove your ability to persuade others (which is a valuable skill in the \nworking world). \n\n• \n\n• Develop your basic English language skills. \n\n• Improve your English grammar. \n\n Apply your language and communication skills in a business contexT. \n(www.oxbridgeacademy.co.za/find-a- course/business-administration- \ncourses/) ", + "page_start": 4, + "page_end": 4, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "**Hit the ground running now!**Build confidence by trying things on your own. Go to the meet now button \n(at the top right corner on the Calendar tab) to play around and test all the meetings functionalities before you're in the spotlight! ", + "page_start": 0, + "page_end": 0, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "**Test meetings**\n\n**Keep learning**\n1. \n\nUse the Meet now button in the \nCalendar tab \n\nNo matter how you like to learn and practice, we've got \nresources to support and inspire you: \n\nThen select “Start meeting” 2. \n\n3. And then \"Join now” \n\n• \n\nVirtual classes: We have instructors to answer your \nquestions and walk you through all the details. \n\nHere you can try to share your screen, \nstart a whiteboard or even record \nyourself while you are practicing a \npresentation. This is your safe space \nto test everything out! \n\n• \n\nSupport articles and step-by-step guides: To get answers to \nyour most common questions. ", + "page_start": 5, + "page_end": 5, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + }, + { + "text": "employees registered on the system for open positions \n\nthey have and proactively post job vacancies on the open- \n\nentry system portal. Although the open-entry system has a \n\nlonger history, the self-career system began in early fiscal \n\n2005 in Japan. We plan to expand both these programs on \n\na global basis. ", + "page_start": 57, + "page_end": 57, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "The Eco-Products exhibition, held each \nThe Eco-Products exhibition, held each \n\ns largest envi- \nDecember, is one of Japan’s largest envi \nDecember, is one of Japan \n\nronmental exhibitions. Under it, SMFG held \nronmental exhibitions. Under it, SMFG held \n\nthe SMFG Environmental Business Forum, \nthe SMFG Environmental Business Forum, \n\na unique event to which the whole SMFG \na unique event to which the whole SMFG \n\nGroup contributed. \nGroup contributed. \n\nThe SMFG Environmental Business Forum \nThe SMFG Environmental Business Forum \n\nenables encounters and information \nenables encounters and information \n\nexchange in the field of environmental \nexchange in the field of environmental \n\nbusiness. SMFG and its Group companies \nbusiness. SMFG and its Group companies \n\nprovide various platforms, including business \nprovide various platforms, including business \n\n**Sumitomo Mitsui**\n**Finance & Leasing:**\n**Promoting recycling**\n**and reuse**\n\nmatching events, stands and catalogue \nmatching events, stands and catalogue \n\nexhibitions, and lectures and seminars, \nexhibitions, and lectures and seminars, \n\nwith the aim of giving new business \nwith the aim of giving new business \n\nopportunities to companies and other \nopportunities to companies and other \n\norganizations that are considering entering \norganizations that are considering entering ", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "MON EY \n\n3 Great Resources to Kick-Start Your Financial \nPlanning Career \n\n11/23/2022 \n\n(NewsUSA) - Finding a rewarding career that offers growth potential, work-life balance and the satisfaction of \n\nhelping others is a key priority for many job seekers. With those goals in mind, a career in financial planning should \n\nbe a top contender, whether you are just starting out or looking to make a career change. But once you have \n\ndecided that financial planning is the field for you, how do you get started? Here are three resources that can help \n\nyou launch a successful financial planning career. \n\n1. Guide to Careers in Financial Planning. Based on interviews with leading financial services firms, this guide \n\nintroduces you to the wide range of career opportunities in the financial planning profession. It identifies typical entry \n\npoints and career tracks, explores the types of companies that hire financial planners and provides information on \n\nhow to find financial planning career opportunities. It also includes resources such as a list of recommended \n\nquestions to ask in a job interview. \n\n2. Scholarship Programs. Dozens of scholarship programs are available to support you on your professional \n\njourney. Some are offered directly through colleges and universities that have financial planning degree and \n\ncertificate programs. Others are available through nonprofits and organizations like the CFP Board Center for \n\nFinancial Planning, which administers 16 scholarship programs that help pay for the education and exam \n\nrequirements to become a CERTIFIED FINANCIAL PLANNERTM professional. Financial services firms may offer \n\nscholarships or tuition reimbursements to employees to cover the costs of obtaining professional designations and \n\ncredentials such as CFP® certification -- some of which may be required to advance within the company. ", + "page_start": 0, + "page_end": 0, + "source_file": "news3.pdf" + }, + { + "text": "we had many foreign executives working at Nissan \n\nheadquarters, and the majority of communications were in \n\nEnglish as well as Japanese. As a result, more employees, \n\nincluding non-management staff, are being assigned to \n\nwork outside of Japan. In addition, proficiency in English is \n\nnow a prerequisite for all managers at Nissan. These efforts \n\nto promote diversity are transforming our corporate culture. \n\nOne of the most interesting developments of NISSAN \n\n180 was the advent of the Career Coach system, which we \n\nimported from our Alliance partner, Renault. In a modern \n\nbusiness structure, HR is in charge of structural and \n\nsystem functions such as compensation. The Career Coach \n\nsystem provides career development for the individual \n\nemployee. There are five career coaches at this time, one \n\nfor each of the major functions. Their collective task is to \n\nidentify people of high potential and create career plans for \n\nthem. In a sense, they work outside of HR, although they \n\nreport to me. The coaches gather once a month for the \n\nNissan Assignment Committee, headed by Mr. Ghosn, to \n\nreport on their activities. \n\nEmployees at Nissan also have the chance to control \n\ntheir career paths through our internal “self-career” system \n\non the Company’s intranet. Managers can search for ", + "page_start": 57, + "page_end": 57, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Mar 06, 2024 Mar 06, 2024 \n\nCelebrate St. Patrick's Day with Say Hello to Your Big Break at the \n\nNo Booze, Just Pure Irish Fun and Stapleton Library Job Fair in \n\nEntertainment Vocation, Trade, or Civil Service ", + "page_start": 0, + "page_end": 0, + "source_file": "news1.pdf" + } + ] + }, + { + "references": { + "source_file": "news3.pdf", + "query": "What are the priorities for job seekers ?", + "target_page": 1, + "target_passage": " Finding a rewarding career that offers growth potential, work-life balance and the satisfaction of helping others is a key priority for many job seekers.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "\n\nrequirements for ", + "page_start": 209, + "page_end": 209, + "source_file": "00-80T-80.pdf" + }, + { + "text": "**Priority Issues for Us**\n\n**11** **Our Mission and CSR at SMFG**\n\n〈**Specific Examples of CSR Activities**〉 \n\n**13** **Together with Our Customers**\n\n**Together with Our Shareholders**\n**and Markets** **17**\n\n**19** **Together with Our Employees**\n\n**21** **Environmental Activities**\n\n**Social Contribution Activities**\n\n**Corporate Outline/Editorial Policy**", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "You need to use this opportunity to introduce yourself and your \nskills, and to set yourself apart from all the other candidates. \nYou can also use this opportunity to explain any gaps in your CV, \nand to motivate why you are the right person for the job. ", + "page_start": 44, + "page_end": 44, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Only include this if you are sincere, and don’t make any promises \nthat you won’t be able to keep. You could, for example, assure your \nemployer that you will finish your current projects or hand them over to \na colleague. You could also offer to train the person who will be replacing \nyou. ", + "page_start": 49, + "page_end": 49, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "When we think about our careers, and what we need to do to establish them, we \noften forget about the need to develop an essential skill: communication. If you \nstart reading through the job descriptions in a industry, you will find that the vast \nmajority of jobs require one or more of the following: ", + "page_start": 4, + "page_end": 4, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "**E-mail address**\nPlease provide a valid e-mail address that you check on a regular \nbasis, as we’ll be using this address to communicate with you \nthroughout your studies. \n**Occupation**\nRefers to your current job (if you are employed). If you are \nunemployed, you can simply write “unemployed” or “not applicable”. \n**Delivery address**\nRefers to the address at which you want your study material to be \ndelivered. The reason why we prefer you to select your work address \nis so that there will always be someone available to receive your \nstudy material, even if you are not there when the courier arrives. ", + "page_start": 22, + "page_end": 22, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "In addition to the many ideas sent in under \nIn addition to the many ideas sent in under \n\nthe “SPN” campaign with regard to supporting \nthe “SPN” campaign with regard to supporting \n\nreconstruction in the disaster-hit areas, some \nreconstruction in the disaster-hit areas, some \n\nemployees said they wanted to go to the \nemployees said they wanted to go to the \n\nTohoku region to work as volunteers. To \nTohoku region to work as volunteers. To \n\nsupport those wishing to do “what can be \nsupport those wishing to do “what can be \n\ndone now” as a first step, SMBC set up a \ndone now” as a first step, SMBC set up a \n\nframework to enable employees to take \nframework to enable employees to take \n\nspecial leave for volunteer activities in the \nspecial leave for volunteer activities in the \n\nearthquake and tsunami area. This system \nearthquake and tsunami area. This system \n\nbecame operational in May 2011. \nbecame operational in May 2011. \n\nTo date, volunteers have been recruited not \nTo date, volunteers have been recruited not \n\nonly from the bank but also from other SMFG \nonly from the bank but also from other SMFG ", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "\nDELIVERING WHAT’S NEXT ", + "page_start": 17, + "page_end": 17, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Group companies. Based on needs identified \nGroup companies. Based on needs identified \n\nby local government and volunteer centers \nby local government and volunteer centers \n\nin the areas concerned, SMFG staff have \nin the areas concerned, SMFG staff have \n\nbeen involved in voluntary activities such \nbeen involved in voluntary activities such \n\nas clearing mud from residential areas and \nas clearing mud from residential areas and \n\nconcrete water runoff troughs alongside \nconcrete water runoff troughs alongside \n\nroads, clearing up debris, and cleaning and \nroads, clearing up debris, and cleaning and \n\nrestoring photographs and other personal \nrestoring photographs and other personal \n\nitems with memorabilia value. \nitems with memorabilia value. \n\nIn July 2011, over 400 employees of SMBC \nIn July 2011, over 400 employees of SMBC \n\nNikko Securities — mainly 350 new hires — \nNikko Securities — mainly 350 new hires — \n\nwere divided into three teams, each of which \nwere divided into three teams, each of which \n\nspent one to three weeks on volunteer \nspent one to three weeks on volunteer ", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "SMBC has surveyed approximately 1,000 \n\nfemale employees on their careers and \n\nmajor events in their lives. Role models \n\nhave been created based on 50 of these \n\nindividual interviews, and presented in \nsubsidies and other infrastructure needed \nsubsidies and other infrastructure needed \nthe form of book, which is distributed as a \nto provide and enable old-age care services. \nto provide and enable old-age care services. \nguide to individual women’s career paths \nIf the old-age dependency ratio continues to \nIf the old-age dependency ratio continues to \nand as a management aid for superiors in \nclimb, we expect the number of employees \nclimb, we expect the number of employees \nexecutive training. \nwith care responsibilities to increase. In light \nwith care responsibilities to increase. In light \n\n**Career development handbook**\n**for young mothers**\nof this, we have broadened the scope of \nof this, we have broadened the scope of \n\nour support program to achieve a sounder \nour support program to achieve a sounder \n\nSMBC has compiled a career development \n\nhandbook covering maternity leave for all \n\nwomen employees wishing to strike a \n**After**\nbetter balance between work and family \n\nlife. It provides pathways for mothers \n\npursuing careers, citing answers by \n\nwomen who have been through this \n\nexperience to questions such as “What do \n\nI need to do to return to work?” and “How \n\ndo I go about arranging nursery school?” \n\nIt also includes preparatory exercises for \n\nexpectant mothers and support lectures \n\non child-raising leave after they return to \n\nthe workplace. ", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_SMFG_2011.pdf" + } + ] + }, + { + "references": { + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf", + "query": "What does ShareAlike mean in terms of licencing ?", + "target_page": 1, + "target_passage": "adaptations based on this work must be licensed under the same license.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "BY (\"Attribution\"): users must credit the author of the work they \nare using. \nSA (\"ShareAlike\"): adaptations based on this work must be \nlicensed under the same license. \nNC (\"NonCommercial\"): the work is only available to be used for \nnoncommercial purposes. \nND (\"NoDerivative\"): reusers making cannot share adaptations of \nthe work. ", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "CC BY (\"Attribution\") allows people to use the work for any purpose (even \ncommercially and even in modified form) as long as they give attribution to the \ncreator. \nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose \n(even commercially and even in modified form), as long as they give attribution to the \ncreator and make any adaptations they share with others available under the same or \na compatible license. \nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for \nnoncommercial purposes only, and only as long as they give attribution to the \ncreator. \nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the \nwork for noncommercial purposes only, and only as long as they give attribution to \nthe creator and make any adaptations they share with others available under the \nsame or a compatible license. \nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for \nany purpose (even commercially), as long as they give attribution to the creator. \nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the \nunadapted work for noncommercial purposes only, and only as long as they give \nattribution to the licensor. ", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "I am aware of the above [framework] [specific] contract, especially Articles [I.10 and II.13] \nconcerning intellectual property rights and exploitation of the results and I confirm that I \ntransferred all the relevant rights to [*insert name of contractor or other intermediary right*\n*holder*]. \n\nI declare that [I have received full remuneration] [I agreed to receive remuneration by \n[*insert date*]]. \n\n[As creator, I also confirm that I do not object to the following: \n\n(a) that my name be mentioned or not mentioned when the results are presented to \n\nthe public; \n\n(b) that the results be divulged or not after they have been delivered in their final \n\nversion to the contracting authority; \n\n(c) that the results be adapted, provided that this is done in a manner which is not \nprejudicial to my honour or reputation.] \n\nDate, place, signature ", + "page_start": 48, + "page_end": 48, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "\n\nDIRECTOR SHARE \nOWNERSHIP \nGUIDELINES ", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "The Company has a Common Share Purchase Rights Plan, which is intended to protect the interests of stockholders in the event of a hostile attempt to take \nover the Company. The rights, which are not presently exercisable and do not have any voting powers, represent the right of the Company’s stockholders \nto purchase at a substantial discount, upon the occurrence of certain events, shares of common stock of the Company or of an acquiring company involved \nin a business combination with the Company. In January 2000, this plan, which was adopted in February 1990, was extended until February 2005. ", + "page_start": 18, + "page_end": 18, + "source_file": "NASDAQ_ATRI_2003.pdf" + }, + { + "text": " In this way, we do not use “commons” in the narrow sense of permissively licensed. What’s more, this \n4 \nresource could also be governed as more of a data “trust,” and, indeed, we discuss extensively the work \nof HathiTrust as a relevant project in this domain. However, our use of the word “commons” is not \nmeant to preclude this or other arrangements. \n\n There are, of course, a range of other types of texts that are not on the web and/or not digital at all - \n5 \ne.g., periodicals, journals, government documents. These are out of scope for this paper, but also worthy \nof further analysis. ", + "page_start": 2, + "page_end": 2, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "entities working for it or cooperating with it, including contractors and subcontractors, \nwhether legal or natural persons, but only for the purpose of their mission for the \ncontracting authority; \n\n(b) if the*result*is a \"document\" such as a report or a study, and it is meant to be published, \nthe existence of*pre-existing materials*in the*result*may not prevent the publication of the \ndocument, its translation or its \"reuse\", it being understood however that the \"reuse\" may \nonly be made of the*result*as a whole and not of the*pre-existing materials*taken separately \nfrom the*result*; for the sake of this provision, \"reuse\" and \"document\" have the meaning \ngiven by the Commission Decision of 12 December 2011 on the reuse of Commission \ndocuments (2011/833/EU). \n\nAll*pre-existing rights*are licensed to the contracting authority from the moment the*results*\nare delivered and approved by the contracting authority. \n\nThe licensing of*pre-existing rights*to the contracting authority under this FWC covers all \nterritories worldwide and is valid for the duration of intellectual property rights protection. \n\nThe payment of the price as set out in the specific contracts is deemed to also include any \nfees payable to the contractor in relation to the licensing of*pre-existing rights*to the \ncontracting authority, including for all forms of exploitation and of use of the*results*. ", + "page_start": 23, + "page_end": 23, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "trained to) directly publish themselves online, in ways that would allow everybody, not just \n\nGroupon, to present the deals to customers in ways more profitable for merchants? The point is, \n\nhow many merchants, merchant associations and majors (whose budgets always and immediately \n\n*26/34*\n\n*Copyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)*", + "page_start": 25, + "page_end": 25, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "**THREE-LAYER DESIGN**\nCreative Commons (CC) license has three layers: \n\n\"Legal Code\" (base layer): contains terms and conditions to be \nused by lawyers and legally applicable in court. \n\"Human Readable\" (commons deeds): contain the summary of \nthe legal code and key terms. \n\"Machine Readable\": contains HTML or codes for machines to \nrecognize a work is available under a Creative Commons license. ", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "difference whether those third parties are private, for-profit corporations or even other Public \n\nAdministrations. Unless, of course, there are national laws already in place that define in advance \n\nwhat is the license of all present and future Public Data,*no matter how they were generated and by*\n\n*whom*, those data can be lost in any moment for society. In all other cases, the legal status of data \n\nwill be either officially closed and locked, or uncertain enough to prevent most or all reuses. In \n\nFebruary 2011, the news came that, even if they weren't the original copyright holders, Public \n\nEngines had been able to put together enough legal claims to convince Report See to give up. \n\nDisputes like this should not happen and would not happen if all contracts regarding collection and \n\nmanagement of PSI clearly specified that all the resulting data either go directly into the public \n\ndomain (after being anonymized if necessary, of course) or remain exclusive property of the ", + "page_start": 12, + "page_end": 12, + "source_file": "Open_Data_Report.pdf" + } + ] + }, + { + "references": { + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf", + "query": "What is the most restricive Creative Common licence ?", + "target_page": 1, + "target_passage": "CC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the unadapted work for noncommercial purposes only, and only as long as they give attribution to the licensor.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Creative Commons (CC) is the global nonprofit organization behind the CC \nLicenses and public domain tools, which power open sharing on popular \nplatforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. \nSince 2002, the CC Licenses have served as an alternative to traditional \ncopyright, providing a simple, standardized, and legal way for individuals and \ninstitutions to freely share images, music, research, educational resources, and \ncultural artifacts. \n\n**Chief Executive Officer**\nAnna Tumadóttir \n\n**General Counsel**\nKat Walsh ", + "page_start": 1, + "page_end": 1, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "BY (\"Attribution\"): users must credit the author of the work they \nare using. \nSA (\"ShareAlike\"): adaptations based on this work must be \nlicensed under the same license. \nNC (\"NonCommercial\"): the work is only available to be used for \nnoncommercial purposes. \nND (\"NoDerivative\"): reusers making cannot share adaptations of \nthe work. ", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "**THREE-LAYER DESIGN**\nCreative Commons (CC) license has three layers: \n\n\"Legal Code\" (base layer): contains terms and conditions to be \nused by lawyers and legally applicable in court. \n\"Human Readable\" (commons deeds): contain the summary of \nthe legal code and key terms. \n\"Machine Readable\": contains HTML or codes for machines to \nrecognize a work is available under a Creative Commons license. ", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "Texts are adapted from CC Certification for Educators. CC BY license. \nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. \n3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. \nLine, icons, and gradients are from Canva, and subject to their policies. ", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "***6. Cross-cutting design questions***\n\nThe workshops briefly touched on several cross-cutting design questions. While most \nrelevant for approaches that depend on limitations and exceptions, considerations of these \nquestions may be relevant across both tracks. \n\n*Would authors, publishers, and other relevant rightsholders*\n*and creators have any ability to exclude their works?*\n\nOne of the greatest sources of controversy in this area is the extent to which rightsholders of \ncopyrighted works, as well as the original creators of such works (e.g., book authors in this \ncontext), should be able to prevent use of their works for AI training. \n\nWhile a system that required affirmative “opt-in” consent would limit utility significantly (as \ndiscussed above in the context of directly licensing works), a system that allowed some \nforms of “opt-out” could still be quite useful to some types of AI development. In the context \nof use cases like development of LLMs, the performance impact may not be so significant. \nSince most in-copyright books are not actively managed, the majority of books would remain \nin the corpus by default. The performance of LLMs can still be improved across various \ndimensions without including, for example, the most famous writers or those who continue \nto commercially exploit their works and may choose to exercise an opt-out. Perhaps the \npotential for licensing relationships (and revenue) may induce some rightsholders to come \nforward and begin actively managing their works. In such a case, uses that do require a \nlicense may once again become more feasible once the rightsholder can be reached. ", + "page_start": 17, + "page_end": 17, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "**Licenses and Public Domain Tools**\n\nThe first CC License was created in 2002. Today, we boast**six CC Licenses**and \ntwo public domain tools, setting a global standard for sharing. \n\n**We’ve estimated that over 2.5 billion pieces of content**\n**were CC Licensed by the end of 2023.**\n\nOur legal and technology staff \ncontinued to make key \ninfrastructure updates and \nmanage daily maintenance to \nensure these Licenses work for \neveryone. ", + "page_start": 3, + "page_end": 3, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**REMIND THAT…**\nCC license only applicable to the work that is within the scope of \ncopyright law. CC license can be used when … \n\nyou want to give others permissions to freely copy and \nredistribute your work, and \nyou want to give others permission to freely transform, alter, or \notherwise create derivative works based on your work. ", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": " In the EU, the 2019 Copyright Directive introduced specific provisions on the \"use of out-of-commerce \n\n17 \nworks and other subject matter by cultural heritage institutions\" (Articles 8-11 CDSMD). These \nprovisions allow cultural heritage institutions to \"make available, for non-commercial purposes, out-of- \ncommerce works or other subject matter permanently in their collections\". The limitation to non- \ncommercial purposes means that works made available under these provisions would be of limited use \nin building a books data commons. \n\n For one assessment of the difficulties of complying with the CC licenses in this context, to the extent \n18 \nthey are applicable, see Lee, K., A. Feder Cooper, & Grimmelmann, J. (2023). Talkin’ ‘Bout AI Generation: \nCopyright and the Generative AI Supply Chain. Forthcoming,*Journal of the Copyright Society*2024. \nhttps://doi.org/10.2139/ssrn.4523551. ", + "page_start": 9, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "with. The vast majority of in-copyright books are out-of-print or out-of-commerce, and most \nare not actively managed by their rightsholders. There is no official registry of copyrighted \nworks and their owners, and existing datasets can be incomplete or erroneous. 16 \n\nAs a result, there may be no way to license the vast majority of in-copyright books, especially \nthose that have or have had limited commercial value. \n Put differently, the barrier to using \nmost books is not simply to pay publishers; even if one had significant financial resources, \nlicensing would not enable access to most works. \n\n17 \n\n**Permissively licensed works**\n\nThere are books that have been permissively licensed in an easily identifiable way, such as \nworks placed under Creative Commons (CC) licenses. Such works explicitly allow particular \nuses of works subject to various responsibilities (e.g., requiring attribution by the user in their \nfollow-on use). \n\nWhile such works could be candidates for inclusion in a books data commons, their inclusion \ndepends on whether the license’s terms can be complied with in the context of AI training. \nFor instance, in the context of CC licensed works, there are requirements for proper \nattribution across all licenses (the CC tools Public Domain Dedication (CC0) and Public \nDomain Mark (PDM) are not licenses and do not require attribution). 18 ", + "page_start": 9, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "**SIX LICENSES**\n\n", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + } + ] + }, + { + "references": { + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf", + "query": "In which case CC licence can't be used ?", + "target_page": 1, + "target_passage": "fair use, fair dealing, or some other limitation and exception to copyright applies the the work.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**REMIND THAT…**\nCC license only applicable to the work that is within the scope of \ncopyright law. CC license can be used when … \n\nyou want to give others permissions to freely copy and \nredistribute your work, and \nyou want to give others permission to freely transform, alter, or \notherwise create derivative works based on your work. ", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "**THREE-LAYER DESIGN**\nCreative Commons (CC) license has three layers: \n\n\"Legal Code\" (base layer): contains terms and conditions to be \nused by lawyers and legally applicable in court. \n\"Human Readable\" (commons deeds): contain the summary of \nthe legal code and key terms. \n\"Machine Readable\": contains HTML or codes for machines to \nrecognize a work is available under a Creative Commons license. ", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": " In the EU, the 2019 Copyright Directive introduced specific provisions on the \"use of out-of-commerce \n\n17 \nworks and other subject matter by cultural heritage institutions\" (Articles 8-11 CDSMD). These \nprovisions allow cultural heritage institutions to \"make available, for non-commercial purposes, out-of- \ncommerce works or other subject matter permanently in their collections\". The limitation to non- \ncommercial purposes means that works made available under these provisions would be of limited use \nin building a books data commons. \n\n For one assessment of the difficulties of complying with the CC licenses in this context, to the extent \n18 \nthey are applicable, see Lee, K., A. Feder Cooper, & Grimmelmann, J. (2023). Talkin’ ‘Bout AI Generation: \nCopyright and the Generative AI Supply Chain. Forthcoming,*Journal of the Copyright Society*2024. \nhttps://doi.org/10.2139/ssrn.4523551. ", + "page_start": 9, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "**Training in how to use CC Licenses is**\n**key to their adoption.**\n\nWe offer a ten-week**CC Certificate**program that is now tailored not only to the \neducation and library sectors, but also galleries, archives, libraries, and museums \nand**available in 10 languages**. ", + "page_start": 4, + "page_end": 4, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "CC0 (“CC Zero”) is intended for use only \nby authors or holders of copyright and \n\nrelated rights (including database rights), in connection \nwith works that are still subject to those rights in one or \nmore countries. \n\nWhen CC0 is applied to a work, copyright and related \nrights are relinquished worldwide, making the work free \nfrom those restrictions to the greatest extent possible. \n\nThe Public Domain Mark (PDM) is used \nto label works that are already free of \n\nknown copyright restrictions. Unlike CC0, PDM doesn’t \nchange the copyright status of a work. \n\nPDM can be used by anyone, and is intended for use \nwith works that are already free of known copyright \nrestrictions throughout the world. ", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "\n\nis restricted ", + "page_start": 332, + "page_end": 332, + "source_file": "00-80T-80.pdf" + }, + { + "text": "Any additional licenses must be procured per every enclosure where they are planned to be \nused. For example, if you plan to build a disk array with compression enabled in one \nenclosure only (no matter if this enclosure is the control or expansion enclosure), you must \npurchase only one compression license. ", + "page_start": 40, + "page_end": 40, + "source_file": "sg247938.pdf" + }, + { + "text": "\nlimitation: ", + "page_start": 128, + "page_end": 128, + "source_file": "00-80T-80.pdf" + }, + { + "text": "CC BY (\"Attribution\") allows people to use the work for any purpose (even \ncommercially and even in modified form) as long as they give attribution to the \ncreator. \nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose \n(even commercially and even in modified form), as long as they give attribution to the \ncreator and make any adaptations they share with others available under the same or \na compatible license. \nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for \nnoncommercial purposes only, and only as long as they give attribution to the \ncreator. \nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the \nwork for noncommercial purposes only, and only as long as they give attribution to \nthe creator and make any adaptations they share with others available under the \nsame or a compatible license. \nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for \nany purpose (even commercially), as long as they give attribution to the creator. \nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the \nunadapted work for noncommercial purposes only, and only as long as they give \nattribution to the licensor. ", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "**Licenses and Public Domain Tools**\n\nThe first CC License was created in 2002. Today, we boast**six CC Licenses**and \ntwo public domain tools, setting a global standard for sharing. \n\n**We’ve estimated that over 2.5 billion pieces of content**\n**were CC Licensed by the end of 2023.**\n\nOur legal and technology staff \ncontinued to make key \ninfrastructure updates and \nmanage daily maintenance to \nensure these Licenses work for \neveryone. ", + "page_start": 3, + "page_end": 3, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_RSG_2004.pdf", + "query": "In how many regions the Republic Services operations are organized ?", + "target_page": 9, + "target_passage": "As of December 31, 2004, our operations were organized into five regions whose boundaries may change from time to time: Eastern, Central, Southern, Southwestern and Western.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n\n \n \n \n \n [html]\n
2003Gross RevenueIntercompany Revenue ( b )Net RevenueDepreciation, Amortization, Depletion and Accretion ( c )Operating IncomeCapital Expenditures ( d )Total AssetsEastern Region........
$ 600.2$ ( 93.0 )$ 50$ 36.4$ 71.3$ 40.7$ 826.9Central Region..........671.7
( 151.6 )520.174.0106.675.7960.5Southern Region......680.3( 76.9 )
603.462.8107.569.9865.6Southwestern Region...332.6( 31.2 )301.4
28.750.228.9409.4Western Region.......729.4( 143.9 )585.546.2
148.851.4813.2Corporate Entities ( a ). 2. 23.7( 71.7 )
6.6678.5Total..........................$ 3.014.4$( 496.6 )$ 2.517.8$ 251.8$ 412.7$ 273.2
$ 4.554.12002Gross RevenueIntercompany Revenue ( b )Net RevenueDepreciation, Amortization, and Depletion ( c )Other Charges ( Income )Operating IncomeCapital Expenditures ( d )
Total AssetsEastern Region..........564.1$ ( 79.7 )$484.4$ 32.0$( 4.1 )$ 87.0
$ 39.2$ 822.2Central Region.......589.6( 120.2 )469.453.6( 1.5 )105.3
77.1950.9Southern Region.....643.1( 65.5 )577.652.7118.3
58.0830.7Southwestern Region...311.8( 29.1 )282.722.841.9
30.6374.6Western Region......690.0( 139.1 )550.941.3145.5
47.3826.7Corporate Entities ( a ).... 2(. 1 ). 1( 2.8 )( 38.5 )
6.4404.0Total..........................$ 2.798.8$ ( 433.7 )$ 2.365.1$ 199.6$( 5.6 )$ 459.5
$ 258.6$ 4.209.1
", + "page_start": 88, + "page_end": 88, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "\n\nregion.” ", + "page_start": 422, + "page_end": 422, + "source_file": "00-80T-80.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n**NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n**(All tables in millions, except per share data) Ì (Continued)**\n\n**Cumulative EÅect**\n**of Changes in**\n**Accounting**\n**Principles** **Balance as of**\n**December 31,**\n**2002** **Balance as of**\n**December 31,**\n**2003** **Acquisitions** **Divestitures**\n\nEastern Region ÏÏÏÏÏÏÏÏ \nCentral Region ÏÏÏÏÏÏÏÏ \nSouthern Region ÏÏÏÏÏÏÏ \nSouthwestern Region ÏÏÏ \nWestern RegionÏÏÏÏÏÏÏÏ $ 429.0 \n343.0 \n323.2 \n134.7 \n314.3 $ 7.2 \n7.5 \n2.6 \n.3 \n3.6 $(.3) \nÌ \nÌ \nÌ \nÌ $ Ì \nÌ \nÌ \nÌ \n(7.0) $ 435.9 \n350.5 \n325.8 \n135.0 \n310.9 \n\nTotal ÏÏÏÏÏÏÏÏÏÏÏÏÏÏÏ $1,544.2 $21.2 $(.3) $(7.0) $1,558.1 \n\nRevenue of the Company by revenue source for the years ended December 31, 2004, 2003 and 2002 is as \nfollows: ", + "page_start": 89, + "page_end": 89, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n\n \n \n \n \n [html]\n
YearEnded December31,
200420032002
Patients$ 23$ 177.6$
239.6PercentageSpecification154.0
141.0126.1Specification98.4
92.867.4Patients7.0
5.36.1Specifications13.7
12.7__Specificity57.6
178.973.1Specifications8.0
10.411.2.........10.6
6.74.0Specificity2.1
( 1.8 )( 4.8 )tax...
37.8Patients( 27.5 )
− 21.8 )( 13.6 ).........91.8
( 109.4 )( 5.9 )Patients15.3
9.037.1.......( 2.6 )
61.329.4666.3600.5
569.7Patients( 283.8 )( 273.2 )
( 258.6 ).........5.79.1
14.6Specificity( 47.3 )( 51.5 )
( 55.8 ).........3.2
18.9Patients( 3.7 )( 17.6 )
( 2.7 ).........( 21.4 )( 40.0 )
( 32.7 ).........143.8( 182.4 )
( 206.7 )( 552.4 )( 316.3 )
Specification____( 30.0 )
Specificity88.886.396.9
( 252.2 )( 2.6 )( 2.2 )Patients
38.249.129.9Patients
( 266.1 )( 184.2 )( 150.0 ).........
( 46.0 )( 19.0 ).........
( 72.6 )( 437.3 )
( 70.4 )( 128.0 )ENTS22.3
( 22.3 )125.4ERIOD119.2
141.516.1Patients$ 141.5
$ 119.2$ 141.5
\n\nCASH PROVIDED BY OPERATING ACTIVITIES: ", + "page_start": 63, + "page_end": 63, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n\n \n \n \n \n [html]( in millions, except earnings per share data )Year\n
Med Decer1,2004
20__2002REVENUE$ 2.7
708.1
$ 2.517.8$ 2.365.1EXPENSES :Cost of operations
1.714.41.605.41.472.9Depreciation, amortization and depletion
259.4239.1199.6Accretion
13.712.7Selling, general and administrative
268.3247.9238.7Other charges ( income )
( 5.6 )OPERATING INCOME
452.3412.7459.5INTEREST EXPENSE
( 76.7 )( 78.0 )( 77.0 )INTEREST INCOME
6.99.54.3OTHER INCOME ( EXPENSE ), NET
1.23.2_ (. 3 )INCOME BEFORE INCOME TAXES
383.7347.4386.5PROVISION FOR INCOME TAXES
145.8132.0146.9INCOME BEFORE CUMULATIVE EFFECT OF CHANGES IN
ACCOUNTING PRINCIPLES
237.9215.4239.6CUMULATIVE EFFECT OF CHANGES IN ACCOUNTING
PRINCIPLES, NET OF TAX( 37.8 )
NET INCOME
$ __2237.9$ _177.6$ 239.6
BASIC EARNINGS PER SHARE :Before cumulative effect of changes in accounting principles$1.56
$1.341Cumulative effect of changes in accounting principles, net of tax
(. 23 )Basic earnings per share................................................................................................................................
. 56
S1.11SpeciesWeighted average common shares outstanding
152.8160.3165.4DILUTED EARNINGS PER SHARE :
Before cumulative effect of changes in accounting principles$1.53$
1.33$1.44Cumulative effect of changes in accounting principles, net of tax
(. 23 )Diluted earnings per share
$ ___
. 53$1.10$ __1.44
Weighted average common and common equivalent shares outstanding..............................____5.3_
62.1__166.7CASH DIVIDENDS PER COMMON SHARE36
", + "page_start": 61, + "page_end": 61, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n**NOTES TO CONSOLIDATED FINANCIAL STATEMENTS**\n**(All tables in millions, except per share data) Ì (Continued)**\n\n**Other Current Liabilities**\n\nA summary of other current liabilities is as follows: ", + "page_start": 70, + "page_end": 70, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**REPUBLIC SERVICES, INC. AND SUBSIDIARIES**\n\n\n \n \n \n \n [html]( in millions )Common Stock Shares, NetAdditional Paid - In CapitalDeferred Compensation\n
Retained EarningsTreasury StockAccumulated Other Comprehensive Income ( Loss )Comprehensive_IncomeBALANCE ATDECEMBER 31.2001169.6$ 1.8
$ 1.264.7
$$ 641.1$( 150.1 )$( 1.6 )Net income
239.6$ 239.6Issuances of common stock2.034.0
Purchases of common stockfor treasury.......( 8.0 )
( 150.0 )Change in value ofderivative instruments, net of tax...............................................
1.6___1.6Total comprehensive income
$ 241.2BALANCE ATDECEMBER 31.2002163.6
1.81.298.7880.7( 300.1 )Net income
177.6$ 177.6Cash dividends
( 19.0 )Issuances of common stock2.6
49.1Purchases of common stockfor treasury........( 8.4 )
( 184.2 )Change in value ofinvestments, net of tax
(. 1 )__ (. 1 )Total comprehensive income
$ 177.5BALANCE AT
DECEMBER 31.2003157.81.81.347.81.039.3( 484.3 )(. 1 )Net income
237.9$ 237.9Cash dividends
( 54.6 )Issuances of common stock
2.3. 148.8Issuances of restricted stock and deferred stock units.
. 12.8( 2.8 )Amortization of deferred
compensation1.8
Purchases of common stockfor treasury.......( 9.6 )( 266.1 )
Change in value ofinvestments, net of tax
. 1____1Total comprehensive income
$ 238.0BALANCE ATDECEMBER 31.2004150.6$ 1.9$ 1.399.4$( 1.0 )$ 1.222.6
$( 750.4 )
5 = 5
", + "page_start": 62, + "page_end": 62, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "ten thousand people involved in R&D, but we also have two \n\nmajor centers in North America and Europe, and smaller \n\noperations in Taiwan, China, Thailand, South Africa and \n\nBrazil. In the past, these entities were mostly standalone \n\noperations, but today there are many more joint projects ", + "page_start": 45, + "page_end": 45, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**AWS cloud infrastructure**\n\nAWS provides services across the globe. You only need to understand how regions, availability \n\nzones, and data centers are related so that you can select a region. You will see the region code in \n\nURLs and Amazon Resource Names (ARNs), unique identifiers for AWS resources. ", + "page_start": 16, + "page_end": 16, + "source_file": "serverless-core.pdf" + }, + { + "text": "**Corporate Headquarters**\n\n**110 SE 6th Street, 28th Floor, Fort Lauderdale, Florida 33301**\n\n**Phone: (954) 769-2400 • Fax: (954) 769-2664 • www.republicservices.com**", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_RSG_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_MGM_2004.pdf", + "query": "What was one of the seminal moment of 2004 for MGM MIRAGE ?", + "target_page": 12, + "target_passage": "The announcement of the merger between MGM MIRAGE and Mandalay Resort Group was one of the seminal moments of 2004", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "\n\nThe announcement of \nthe merger between \nMGM MIRAGE and \nMandalay Resort Group \nwas one of the seminal \nmoments of 2004. ", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "convention center. Our casino marketing people will be able \nto offer their customers wonderful new amenities to expand \nour market reach. And our development people will be able \nto maximize the potential of priceless Las Vegas Strip land. \nThe Mandalay merger represents another defining \nmoment for MGM MIRAGE, much like the Mirage Resorts \ntransaction in 2000, at a time when Las Vegas is in a state of \nastounding metamorphosis. No company is better positioned \nto help shape the future of Las Vegas than MGM MIRAGE. \nWe employ more people, invest more money and hold more \nprime real estate than any other company in Las Vegas. The ", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "**BELLAGIO**underwent a significant expansion during 2004 result- \ning in the opening of the Spa Tower and several important new \namenities at this AAA Five Diamond property. Bellagio remains \nLas Vegas’ first and only hotel-casino to receive this prestigious \nrecognition. These new additions add dimension and depth to the \nworld-famous experience awaiting guests at Bellagio. \n\n**MGM GRAND LAS VEGAS**completed a transformation, begun \nin 2003, of its food and beverage and entertainment offerings. \nMGM Grand is one of the must-see attractions of \n\nLas Vegas, with Cirque du Soleil’s newest pro- \nduction, KA`TM, and several of the Strip’s \nfinest restaurants and hottest nightspots. \n**1**\n**8**\n**.0**\n**%**\n\n**TI**’s transformation was no less extensive, \nas the property’s management team \n\n**47.6%**\n**9 . 5 %**\n**14.9 %**\n\n**1**\nconceived and implemented a program to \nenliven the property with new restaurants \nand nightlife. **%**\n**0**\n\n**THE MIRAGE**was the site of a revolution in \nLas Vegas’ history as the venerable buffet was given \nnew life as a top dining establishment, Cravings. \n2004 Revenue Mix \nOthers may follow this lead, but The Mirage was \nthe first property to breathe new life into what \nremained of the last bastion of “old” Las Vegas. ", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "Defining Momentum for Our Industry \n\nThe gaming industry in America is maturing, and \ninternational expansion, while exciting in select markets, \nremains challenging. As a result, your company has \npursued a growth strategy that calls for maximizing the \nassets we currently own and seeking prudent development \nopportunities and strategic acquisitions. \n\nUpon completion of our merger with Mandalay, \nMGM MIRAGE will be the world’s leading gaming and \nleisure company. The combination will result in a well- \ncapitalized company uniquely situated to invest in its \ncurrent portfolio in addition to creating new projects \nin the United States and around the world. \nWe believe this is an outstanding \n\ntransaction for the shareholders of \nboth companies. With this \nacquisition, we will own, \noperate and have investments \nin 28 properties throughout Nevada, Mississippi, \nIllinois, Michigan, and New Jersey. \n\nThe combined company will have an asset portfolio \nwhich includes some of the most widely recognized brand \nnames in the world. These properties cater to a broad \ncustomer base, ranging from value-oriented to the ultra- \nhigh end. Each resort provides a unique customer experience \nthrough its specific personality and combination of amenities. ", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "**NOTE 1 — ORGANIZATION**\nMGM MIRAGE (the “Company”), formerly MGM Grand, Inc., is a Delaware \ncorporation, incorporated on January 29, 1986. As of December 31, 2004 \napproximately 58% of the outstanding shares of the Company's common stock \nwere owned by Tracinda Corporation, a Nevada corporation wholly owned by Kirk \nKerkorian. MGM MIRAGE acts largely as a holding company and, through \nwholly-owned subsidiaries, owns and/or operates casino resorts. \n\nThe Company owns and operates the following casino resorts on the Las Vegas \nStrip in Las Vegas, Nevada: Bellagio, MGM Grand Las Vegas, The Mirage, Treasure \nIsland (“TI”), New York-New York and the Boardwalk Hotel and Casino. The \nCompany owns a 50% interest in the joint venture that owns and operates the \nMonte Carlo Resort & Casino, also located on the Las Vegas Strip. \n\nThe Company owns three resorts in Primm, Nevada at the California/Nevada state \nline – Whiskey Pete’s, Buffalo Bill’s and the Primm Valley Resort – as well as two \nchampionship golf courses located near the resorts. The Company also owns \nShadow Creek, an exclusive world-class golf course located approximately ten miles \nnorth of its Las Vegas Strip resorts. ", + "page_start": 55, + "page_end": 55, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "But the bricks and mortar tell only part of the story \nof this transaction. At the heart of Mandalay is its people. \nMandalay employees at all levels are energetic and talented \nand will be a tremendous asset to us. Together, we will become \na family in excess of 70,000 people committed to delivering \nthe best possible experiences for our guests. The transaction \nalso will create unparalleled opportunities for our entire family \nof employees. \n\nIn short, this groundbreaking transaction creates \n\nunstoppable momentum for all stakeholders in the \nMGM MIRAGE family. \n\nDefining Momentum in our Properties \n\nIn 2004, your company invested over $690 million of \ncapital in the creation of new restaurants, clubs, shows and \nnightspots as well as the development of strategic enhance- \nments to existing amenities. These investments generated \nexceptional returns in a time when competition for the \nentertainment dollar has never been higher. ", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "o some, momentum is intangible – a product of fortune, a power that cannot be harnessed, and typically \na short-lived sensation. Others wonder how they lost their momentum. At MGM MIRAGE, we are con- \nstantly thinking of better ways to maximize it. We believe momentum is a product of effort and excellence, \n\nT \n\na force which can be observed and measured, and something that can be a lasting and defining quality of a great \ncompany. Our 2004 results are a clear reminder of the power of moving forward. Our financial policies have long \nbeen designed to create and maintain momentum. By investing in our best assets and thinking of new ways to add \nvalue to our shareholders, we are able to redefine our Company’s place in history every year – and 2004 was a defin- \ning time even by our exacting standards. \n\nSo how did we get here? Last year, we discussed the importance of focus, and the laser-like precision with which \n\nwe operated our resorts in 2004 affirms the power of our single-minded dedication to excellence. The hard work of \nour 40,000 employees resulted in a record year in almost every regard. Net revenues increased 10% over 2003 to a \nrecord $4.2 billion, with 12% REVPAR growth at our Las Vegas resorts; property-level EBITDA was an all-time \nrecord, nearly $1.5 billion, and 23% higher than the prior year. We exceeded the expectations of every market \nobserver, and significantly beat our forecasts. And 2004 will not be a zenith year for your company – rather, we \nexpect to continue our excellent operating performance, re-invest the resulting cash flow to stimulate future growth \nand move forward to new defining moments. ", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "Recently, we opened the SKYLOFTS, a new level of luxury \nfor guests atop MGM Grand Las Vegas. \n\nWe’ll follow the success of these new resort features \nwith a category-defining new nightclub at The Mirage, two \nfabulous restaurants by Joël Robuchon at MGM Grand Las \nVegas and gaming upgrades company-wide. Second, we are \ndoubling down on Las Vegas by merging with Mandalay, \na company we have long admired. The Mandalay merger \nrepresents a tremendous opportunity to build on the mo- \nmentum established by Mike Ensign and his team. And \nthird, we are dreaming of a not-so-distant future, when ", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "**WILLIAM MCBEATH**President, \nThe Mirage **ROBERT V. MOON**Chairman, \nMGM MIRAGE Marketing **FELIX D. RAPPAPORT**President, \nNew York-New York \n**SCOTT SIBELLA**President, TI ", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "**BELLAGIO ADDS A JEWEL TO THE**\n**FAMILY CROWN.**The Mirage Resorts \nmerger provided outstanding resorts, \npeople and land, and has propelled our \nearnings and provided an unparalleled \nplatform for future growth. ", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_MGM_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_MGM_2004.pdf", + "query": " What are the most significant piece of undeveloped land remaining on the Las Vegas Strip ?", + "target_page": 21, + "target_passage": "W RESIDENTIAL In lofts, brown stones and high-rise buildings, residential options abound to populate the new city and ener gize the surrounding areas. e have been working for some time on con ceiving the best use of the 66 acres between Monte Carlo and Bellagio, the most significant piece of undeveloped land remaining on the Las Vegas Strip.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "W \n**e have been working for some time on con-**\n**ceiving the best use of the 66 acres between**\n**Monte Carlo and Bellagio, the most signifi-**\n\n**cant piece of undeveloped land remaining on the Las**\n**Vegas Strip. We certainly could have come up with a**\n**spectacular casino-hotel. But, the truth is, Las Vegas is**\n**ready for so much more.**", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "**MANDALAY RESORT GROUP**\n**AND MGM MIRAGE ANNOUNCE**\n**MERGER.**Mandalay Resort \nGroup will add iconic resorts and \ngreat people to our family. We \nwill own 832 acres in the heart \nof Las Vegas, the fastest growing \ncity in the United States. ", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "**Future Developments**\n**Project CityCenter.**In November 2004, we announced a plan to develop a multi- \nbillion dollar urban metropolis, initially called Project CityCenter, on 66 acres of \nland on the Las Vegas Strip, between Bellagio and Monte Carlo. We anticipate that \nthe first phase of Project CityCenter will include a 4,000-room casino resort, three \n400-room boutique hotels, approximately 550,000 square feet of retail shops, \ndining and entertainment venues, and 1,650 units of luxury condominium, \nhotel/condominium and private residence clubs. \n\nWe expect that the complete design work for Project CityCenter will take 18 \nmonths and that the first phase will open in 2009. The design, budget and schedule \nof Project CityCenter are still preliminary however, and the ultimate timing, cost \nand scope of Project CityCenter are subject to risks attendant to large-scale projects. \n\n**Atlantic City, New Jersey.**We own approximately 130 acres on Renaissance Pointe \nin Atlantic City, New Jersey. In addition, Borgata occupies 29 acres at Renaissance \nPointe, including 27 acres it owns and two acres we lease to Borgata. Of the \nremaining land, approximately 95 acres are suitable for development, and a portion \nof these acres consists of common roads, landscaping and master plan improve- \nments which we designed and developed as required by our agreement with Boyd. ", + "page_start": 38, + "page_end": 38, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "In October 2002, we announced the suspension of our development activities on our \nwholly-owned project on the Renaissance Pointe land in Atlantic City. We must \napply for and receive numerous governmental permits and satisfy other conditions \nbefore construction of a new resort on the Renaissance Pointe site could begin. No \nassurance can be given that we will develop a casino resort in New Jersey, or its \nultimate schedule, size, configuration or cost if we do develop a casino resort. \n\n**Detroit, Michigan.**MGM Grand Detroit, LLC, in which we hold a controlling \ninterest, has operated an interim casino facility in Detroit, Michigan since July 1999. \nIn August 2002, the Detroit City Council approved revised development agreements \nwith us and two other developers. The revised development agreement released us and \nthe City from certain of the obligations under the original agreement and significantly \nchanged other provisions of the original agreement. We are currently in the process of \nobtaining land and developing plans for the permanent facility. The design, budget \nand schedule of the permanent facility are not finalized, and the ultimate timing, cost \nand scope of the facility are subject to risks attendant to large-scale projects. \n\nThe ability to construct the permanent casino facility is currently subject to resolu- \ntion of the Lac Vieux litigation. The 6th Circuit Court of Appeals has issued an \ninjunction prohibiting the City and the developers from commencing construction \npending further action of the 6th Circuit Court. Therefore, we do not know when \nwe will be able to commence construction of, or complete, the permanent facility. ", + "page_start": 38, + "page_end": 38, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "The Company is currently in the process of obtaining land and developing plans for \nthe permanent casino facility. The design, budget and schedule of the permanent \nfacility are not finalized, and the ultimate timing, cost and scope of the project are \nsubject to risks attendant to large-scale projects. The ability to construct the perma- ", + "page_start": 70, + "page_end": 70, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "**ATLANTIC CITY LAND/BORGATA EXPANSION Our prime real**\n**estate in Atlantic City, in a location we defined as Renaissance**\n**Pointe, holds spectacular promise to expand MGM MIRAGE’s market**\n**presence on the East Coast.**", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
A City is Idate – Project CityCenter, at the heart of the Las Vega Strip. The Las Vegas Strip has no sense of city now – but wecity? Las Vegas has long beenbelieve it can. The future of Las Vegas is centered around our
capital of the world. The resorts in innovative leaders in the hospitalitygreat resorts and our future development. There are many reasons we believe Project CityCenter is the right project forthe tremendous growth in visitor rates and surging food, beverage,Las Vegas Strip development. We believe there is a social imperative that Las Vegas mature as a city, not just a con -
", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "**Project CityCenter represents a new era of the**\n\n**urban complex, one that encompasses tourism,**\n**entertainment, gaming, retail and residential elements.**\n**Only MGM MIRAGE has the momentum – financially,**\n**intellectually and professionally – to effectively develop**\n**such a project.**\n\n**The signature building within Project CityCenter**\n\n**As the city eclipses two million residents on its way**\n\n**is the 4,000-room hotel-casino. The internationally**\n**acclaimed architect Cesar Pelli has been commissioned**\n**to design this iconic structure. Pelli’s initial concept**\n**drawing defines a new generation of urban landscape for**\n**the Las Vegas Strip, one which includes gaming at its**\n**economic center but not as an emotional centerpiece.**\n**Project CityCenter will provide the momentum** **to passing three million by the end of the decade, and**\n**with land prices on the Strip soaring, it has become**\n**clear that there is a much better and higher use**\n**for this location. As Las Vegas marks its Centennial,**\n**Project CityCenter stands as a defining moment for**\n**development in this fabled city.**\n\n**for the next era of amazing growth for your company**\n**and Las Vegas.**", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "We generate a majority of our net revenues and operating income from our Las \nVegas Strip resorts. In 2004, over 75% of our net revenues and operating income \nwas generated by wholly-owned Las Vegas Strip resorts. We believe that we own the \npremier casino resorts on the Las Vegas Strip, and a main focus of our strategy is to \ncontinually reinvest in these resorts to maintain that competitive advantage. Our \nconcentration on the Las Vegas Strip exposes us to certain risks outside of our \ncontrol, such as competition from other Las Vegas Strip resorts as well as new or \nexpanded resorts in Las Vegas, including Wynn Las Vegas expected to open in 2005, \nand the impact from potential expansion of gaming in California. This concentra- \ntion also exposes us to risks related to tourism and the general economy, including \nnational and global economic conditions and terrorist attacks or other global events. ", + "page_start": 29, + "page_end": 29, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "**NOTE 1 — ORGANIZATION**\nMGM MIRAGE (the “Company”), formerly MGM Grand, Inc., is a Delaware \ncorporation, incorporated on January 29, 1986. As of December 31, 2004 \napproximately 58% of the outstanding shares of the Company's common stock \nwere owned by Tracinda Corporation, a Nevada corporation wholly owned by Kirk \nKerkorian. MGM MIRAGE acts largely as a holding company and, through \nwholly-owned subsidiaries, owns and/or operates casino resorts. \n\nThe Company owns and operates the following casino resorts on the Las Vegas \nStrip in Las Vegas, Nevada: Bellagio, MGM Grand Las Vegas, The Mirage, Treasure \nIsland (“TI”), New York-New York and the Boardwalk Hotel and Casino. The \nCompany owns a 50% interest in the joint venture that owns and operates the \nMonte Carlo Resort & Casino, also located on the Las Vegas Strip. \n\nThe Company owns three resorts in Primm, Nevada at the California/Nevada state \nline – Whiskey Pete’s, Buffalo Bill’s and the Primm Valley Resort – as well as two \nchampionship golf courses located near the resorts. The Company also owns \nShadow Creek, an exclusive world-class golf course located approximately ten miles \nnorth of its Las Vegas Strip resorts. ", + "page_start": 55, + "page_end": 55, + "source_file": "NYSE_MGM_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_MGM_2004.pdf", + "query": "Which events negatively impacted leisure travel and MCM Mirage high-end gaming business in late 2002 and early 2003 ?", + "target_page": 32, + "target_passage": "The war with Iraq and the outbreak of SARS in Asia, both of which negatively impacted leisure travel and our high-end gaming business in late 2002 and early 2003", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "On a consolidated basis, the most important factors and trends contributing to our \noperating performance over the last three years have been: \n\n• The war with Iraq and the outbreak of SARS in Asia, both of which negatively \nimpacted leisure travel and our high-end gaming business in late 2002 and \nearly 2003; \n\n• The new labor contract covering our Las Vegas Strip employees since mid-2002, \nwhich calls for significant annual wage and benefits increases through 2007; \n• The current economic recovery in the United States, which began to impact our \noperations in the latter half of 2003 and continued to positively affect our results \nin 2004. ", + "page_start": 31, + "page_end": 31, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "production. Also, the Company terminated a restaurant lease and closed two \nmarketing offices, resulting in $4 million of contract termination charges. Other \nseverance of $1 million in 2003 related primarily to restructuring of table games \nstaffing at several resorts. \n\nThe Company recorded $3 million of restructuring charges in December 2002 \nrelated to contract termination costs for a restaurant and the EFX! show at MGM \nGrand Las Vegas. In December 2002, the Company recorded a restructuring credit \nof $10 million related to a lease contract termination accrual originally recorded in \nJune 2000. In December 2002 management determined that payment under this \nobligation was not probable. In 2001, management responded to a decline in busi- \nness volumes caused by the September 11 attacks by implementing cost contain- \nment strategies which included a significant reduction in payroll and a refocusing of \nseveral of the Company’s marketing programs. This resulted in a $22 million charge \nagainst earnings. As a result of improving business levels and the Company’s success \nat re-hiring a substantial number of previously laid off or terminated employees, \nmanagement determined in 2002 that a portion of the remaining accrual would \nnow not be necessary. This resulted in a restructuring credit of $10 million. ", + "page_start": 73, + "page_end": 73, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "Defining Momentum for Our Industry \n\nThe gaming industry in America is maturing, and \ninternational expansion, while exciting in select markets, \nremains challenging. As a result, your company has \npursued a growth strategy that calls for maximizing the \nassets we currently own and seeking prudent development \nopportunities and strategic acquisitions. \n\nUpon completion of our merger with Mandalay, \nMGM MIRAGE will be the world’s leading gaming and \nleisure company. The combination will result in a well- \ncapitalized company uniquely situated to invest in its \ncurrent portfolio in addition to creating new projects \nin the United States and around the world. \nWe believe this is an outstanding \n\ntransaction for the shareholders of \nboth companies. With this \nacquisition, we will own, \noperate and have investments \nin 28 properties throughout Nevada, Mississippi, \nIllinois, Michigan, and New Jersey. \n\nThe combined company will have an asset portfolio \nwhich includes some of the most widely recognized brand \nnames in the world. These properties cater to a broad \ncustomer base, ranging from value-oriented to the ultra- \nhigh end. Each resort provides a unique customer experience \nthrough its specific personality and combination of amenities. ", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
TableTable
ofTable
\n\n**Overall Outlook**\nWe have invested heavily in our existing operations in 2003 and 2004, and expect \nto continue to do so on a targeted basis in 2005. Our Las Vegas Strip resorts require \nongoing capital investment to maintain their competitive advantages. We believe \nthe investments in additional non-gaming amenities we made in 2003 and 2004 \nhave enhanced our ability to generate increased visitor volume and allowed us to \ncharge premium prices for our amenities. \n\nwill be some impact on these resorts from Wynn Las Vegas, but also believe that the \nbreadth of amenities in our portfolio of resorts and our loyalty and other marketing \nprograms will help minimize these competitive pressures. The proximity of Wynn \nLas Vegas to TI and The Mirage, along with pedestrian bridges linking TI with the \nFashion Show Mall and Venetian, will also benefit these resorts. ", + "page_start": 30, + "page_end": 30, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "**NOTE 1 — ORGANIZATION**\nMGM MIRAGE (the “Company”), formerly MGM Grand, Inc., is a Delaware \ncorporation, incorporated on January 29, 1986. As of December 31, 2004 \napproximately 58% of the outstanding shares of the Company's common stock \nwere owned by Tracinda Corporation, a Nevada corporation wholly owned by Kirk \nKerkorian. MGM MIRAGE acts largely as a holding company and, through \nwholly-owned subsidiaries, owns and/or operates casino resorts. \n\nThe Company owns and operates the following casino resorts on the Las Vegas \nStrip in Las Vegas, Nevada: Bellagio, MGM Grand Las Vegas, The Mirage, Treasure \nIsland (“TI”), New York-New York and the Boardwalk Hotel and Casino. The \nCompany owns a 50% interest in the joint venture that owns and operates the \nMonte Carlo Resort & Casino, also located on the Las Vegas Strip. \n\nThe Company owns three resorts in Primm, Nevada at the California/Nevada state \nline – Whiskey Pete’s, Buffalo Bill’s and the Primm Valley Resort – as well as two \nchampionship golf courses located near the resorts. The Company also owns \nShadow Creek, an exclusive world-class golf course located approximately ten miles \nnorth of its Las Vegas Strip resorts. ", + "page_start": 55, + "page_end": 55, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "**BELLAGIO**underwent a significant expansion during 2004 result- \ning in the opening of the Spa Tower and several important new \namenities at this AAA Five Diamond property. Bellagio remains \nLas Vegas’ first and only hotel-casino to receive this prestigious \nrecognition. These new additions add dimension and depth to the \nworld-famous experience awaiting guests at Bellagio. \n\n**MGM GRAND LAS VEGAS**completed a transformation, begun \nin 2003, of its food and beverage and entertainment offerings. \nMGM Grand is one of the must-see attractions of \n\nLas Vegas, with Cirque du Soleil’s newest pro- \nduction, KA`TM, and several of the Strip’s \nfinest restaurants and hottest nightspots. \n**1**\n**8**\n**.0**\n**%**\n\n**TI**’s transformation was no less extensive, \nas the property’s management team \n\n**47.6%**\n**9 . 5 %**\n**14.9 %**\n\n**1**\nconceived and implemented a program to \nenliven the property with new restaurants \nand nightlife. **%**\n**0**\n\n**THE MIRAGE**was the site of a revolution in \nLas Vegas’ history as the venerable buffet was given \nnew life as a top dining establishment, Cravings. \n2004 Revenue Mix \nOthers may follow this lead, but The Mirage was \nthe first property to breathe new life into what \nremained of the last bastion of “old” Las Vegas. ", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "convention center. Our casino marketing people will be able \nto offer their customers wonderful new amenities to expand \nour market reach. And our development people will be able \nto maximize the potential of priceless Las Vegas Strip land. \nThe Mandalay merger represents another defining \nmoment for MGM MIRAGE, much like the Mirage Resorts \ntransaction in 2000, at a time when Las Vegas is in a state of \nastounding metamorphosis. No company is better positioned \nto help shape the future of Las Vegas than MGM MIRAGE. \nWe employ more people, invest more money and hold more \nprime real estate than any other company in Las Vegas. The ", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "\n\nThe announcement of \nthe merger between \nMGM MIRAGE and \nMandalay Resort Group \nwas one of the seminal \nmoments of 2004. ", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "**(1) On December 13, 1999, the Board of Directors approved an initial quarterly cash dividend of $0.10 per share to stockholders of record on February 10, 2000. The dividend was**\n**paid on March 1, 2000. As a result of the acquisition of Mirage Resorts, Incorporated, we announced on April 19, 2000 that the quarterly dividend policy was discontinued.**\n\n**The acquisition of Mirage Resorts occurred on May 31, 2000. In June 2003, we ceased operations of PLAYMGMMIRAGE.com, our online gaming website (“Online”). In January**\n**2004, we sold the Golden Nugget Las Vegas and the Golden Nugget Laughlin including substantially all of the assets and liabilities of those resorts (the “Golden Nugget**\n**Subsidiaries”). In July 2004, we sold the subsidiaries that own and operate MGM Grand Australia. The results of Online, the Golden Nugget Subsidiaries and MGM Grand Australia**\n**are classified as discontinued operations for all periods presented.**", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "• The ongoing capital investments in upscale amenities at our resorts, which we \n\nbelieve is allowing us to market more effectively to visitors, capture a greater share \nof these visitors’ increased travel budgets, and generate premium pricing for our \nresorts’ rooms and other amenities. \n\nAs a result of the above trends, our net revenues increased 10% in 2004, while \nincreasing only 3% in 2003. Net revenues at MGM Grand Las Vegas increased \n14% in 2004, due to the addition of several new restaurants, bars and other \namenities, and in spite of fewer rooms in service due to room remodel activity. \nNet revenues at New York-New York increased 26% as the resort continues to \nbenefit from*Zumanity*and Nine Fine Irishmen, both of which opened in summer \n2003. Net revenues at The Mirage decreased 2% as the resort was without the \nSiegfried & Roy show and the buffet was closed for a portion of the year while \nCravings was constructed. \n\nOur operating income in 2004 increased 36%, due primarily to the strong revenue \ntrends and a full year of Borgata’s results. The increase in income from unconsoli- \ndated affiliates is responsible for approximately one-third of the increase in \noperating income, while improvements at our operating resorts, particularly \nBellagio, MGM Grand Las Vegas and New York-New York, make up the rest of the \nincrease. Operating income at MGM Grand Detroit was essentially flat year-over- \nyear, despite an increase in the gaming tax rate from 18% to 24% effective \nSeptember 2004. Several other factors largely offset: Higher corporate expense due \nto increased development costs; lower bad debt expense due to improved collec- \ntions; lower preopening expenses due to Borgata preopening expenses in 2003; and \nhigher property transactions, net due to a $37 million gain on sale of land in 2003. ", + "page_start": 32, + "page_end": 32, + "source_file": "NYSE_MGM_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "00-80T-80.pdf", + "query": "What possess all naval aviators ?", + "target_page": 5, + "target_passage": "All Naval Aviators possess a natural interest in the basic aerodynamic factors which affect the performance of all aircraft. ", + "chunk_present": { + "presence": true, + "index": 5 + } + }, + "top_chunk": [ + { + "text": "\n\nin Naval Aviation ", + "page_start": 52, + "page_end": 52, + "source_file": "00-80T-80.pdf" + }, + { + "text": "**NA VAIR 00·801·80**\n\n**AERODYNAMICS FOR NAVAL**\n**AVIATORS**\n\n**BY**\n**H. H. HURT, JR.**\n**UNIVERSITY OF SOUTHERN CALIFORNIA**", + "page_start": 0, + "page_end": 0, + "source_file": "00-80T-80.pdf" + }, + { + "text": "**PUBLISHED BY DIRECTION OF COMMANDER, NAVAL AIR SYSTEMS COMMAND**\n\n(cid:19)(cid:27)(cid:19)(cid:19)(cid:47)(cid:51)(cid:20)(cid:20)(cid:20)(cid:23)(cid:23)(cid:25)(cid:21) ", + "page_start": 0, + "page_end": 0, + "source_file": "00-80T-80.pdf" + }, + { + "text": "Much of the specialized mathematical detail of aerodynamics has \nbeen omitted wherever it was considered unnecessary in the field of \nflying operations. Also, many of the basic assumptions and limita- \ntions of certain parts of aerodynamic theory have been omitted for the \nIn order to contend with \nsake of simplicity and clarity of presentation. \nthese specific shortcomings, the Naval Aviator should rely on the \nassistance of certain specially qualified individuals within Naval Avia- \ntion. For example, graduate aeronautical engineers, graduates of the \nTest Pilot Training School at the Naval Air Test Center, graduates of \nthe Naval Aviation Safety Officers Course, and technical representatives \nof the manufacturers are qualified to assist in interpreting and applying \nthe more difficult parts of aerodynamics and aeronautical engineering. \nTo be sure, the specialized qualifications of these individuals should \nbe utilized wherever possible. \n\niii ", + "page_start": 4, + "page_end": 4, + "source_file": "00-80T-80.pdf" + }, + { + "text": "The majority of aircraft accidents are due to some type of error of \nthe pilot. This fact has been true in the past and, unfortunately, most \nprobably will be true in the future. Each Naval Aviator should strive \nto arm himself with knowledge, training, and exacting, professional \nattitudes and techniques. The fundamentals of aerodynamics as pre- \nsented in this text will provide the knowledge and background for \nsafe and effective flying operations. The flight handbooks for the air- \ncraft will provide the particular techniques, procedures, and operating \ndata which are necessary for each aircraft. Diligent study and continu- \nous training are necessary to develop the professional skills and tech- \nniques for successful flying operations. \n\nThe author takes this opportunity to express appreciation to those \nwho have assisted in the preparation of the manuscript. \nIn particular, \nthe por- \nthanks are due to Mr. J. E. Fairchild for his assistance with \ntions dealing with helicopter aerodynamics and roll coupling phenom- \nena. Also, thanks are due to Mr. J. F. Detwiler and Mr. E. Dimitruk \nfor their review of the text material. \n\nHUGH HARRISON HURT, Jr. ", + "page_start": 5, + "page_end": 5, + "source_file": "00-80T-80.pdf" + }, + { + "text": "The purpose of this textbook is to present the elements of applied \nto \naerodynamics and aeronautical engineering which relate directly \nthe problems of flying operations. All Naval Aviators possess a natural \ninterest in the basic aerodynamic factors which affect the performance \nof all aircraft. Due .to the increasing complexity of modern aircraft, \nthis natural interest must be applied to develop a sound understanding \nof basic engineering principles and an appreciation of some of the more \nadvanced problems of aerodynamics and engineering. The safety and \neffectiveness of flying operations will depend greatly on the under- \nstanding and appreciation of how and why an airplane flies. The \nprinciples of aerodynamics will provide the foundations for developing \nexacting and precise flying techniques and operational procedures. \n\nThe content of this textbook has been arranged to provide as com- \nplete as possible a reference for all phases of flying in Naval Aviation. \nHence, the text material is applicable to the problems of flight train- \ntraining, and general flying operations. The manner \ning, transition \nof presentation throughout \nthe text has been designed to provide the \nelements of both theory and application and will allow either directed \nor unassisted study. As a result, the text material’will be applicable \nto supplement formal class Iectures and briefings and provide reading \nmaterial as a background for training and flying operations. ", + "page_start": 4, + "page_end": 4, + "source_file": "00-80T-80.pdf" + }, + { + "text": "It is frequently stated that the career Naval \nAviator spends more than half his life “below \na thousand feet and a hundred knots.” \nRe- \ngardless of the implications of such a state- \nment, the thought does cunnute the relation- \nflying speeds and carrier \nship of minimum \naviation. Only \nis there \nsuch importance assigned to precision control \nof the aircraft at high lift conditions. Safe \noperation in carrier aviation demands precision \ncontrol of the airplane at high lift conditions. \nThe aerodynamic lift characteristics of an \nairplane are portrayed by the curve of lift \ncoefficient versus angle of attack. Such a \ncurve is illustrated in figure 1.15 for a specific \nairplane in the clean and flap down configura- \ntions. A given aerodynamic configuration ex- \nperiences increases in lift coefficient with \nin- \ncreases in angle of attack until the maximum \nlift coefficient is obtained. A further increase \nin angIe of attack produces stall and the lift \ncoefficient then decreases. Since the maximum \nthe minimum \nlift coefficient corresponds to \nspeed available in flight, \nis an important \npoint of reference. The stall speed of the air- \ncraft in level flight is related by the equation: ", + "page_start": 52, + "page_end": 52, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\nSTARBOARD WING ", + "page_start": 319, + "page_end": 319, + "source_file": "00-80T-80.pdf" + }, + { + "text": "**7.**A pilot, as defined in paragraph 22(1) of Schedule 3A to the Merchant Shipping Act 1995(**c**), \nwhere they have travelled to the United Kingdom in the course of their work or have been \nrepatriated to the United Kingdom. \n\n**8.**An inspector, or a surveyor of ships, appointed under section 256 of the Merchant Shipping \nAct 1995, or by a government of a relevant British possession as defined in section 313(1) of that \nAct, where they have travelled to the United Kingdom in the course of their work. ", + "page_start": 36, + "page_end": 36, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "\nthe aircraft ", + "page_start": 202, + "page_end": 202, + "source_file": "00-80T-80.pdf" + } + ] + }, + { + "references": { + "source_file": "00-80T-80.pdf", + "query": "What is the static pressure of the aire at standard sea level ?", + "target_page": 20, + "target_passage": "At standard sea level conditions the static pressure of the air is 2,116 psf (or 14.7 psi, 29.92 in. Hg, etc.) ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "the proportion of the ambient air temperature \nand the standard sea level air temperature. \nThis temperature ratio is assigned the short- \nhand notation of 0 (theta). \nTemperature ratio \n\npercent water vapor, argon, carbon dioxide, \netc. For the majority of all aerodynamic con- \nis considered as a uniform \nsiderations air \nmixture of these gases. The usual quantities \nused to define the properties of an air mass are \nas follows: \n\nAmbient air temperature \n=Standard sea level air temperature \n\nSTATIC PRESSURE. The absolute static \npressure of the air is a property of primary \nimportance. The static pressure of the air \nat any altitude results from the mass of air \nsupported above that level. At standard sea \nlevel conditions the static pressure of the air \nis 2,116 psf (or 14.7 psi, 29.92 in. Hg, etc.) \nand at 40,000 feet altitude this static pressure \ndecreases to approximately 19 percent of the \nsea level value. The shorthand notation for \nthe ambient static pressure is “p” \nand the \nstandard sea level static pressure is given the \nsubscript “a” \nfor zero altitude, pa. A more \nusual reference in aerodynamics and perform- \nance is the proportion of the ambient sta~tic \npressure and the standard sea level static \npressure. This static pressure ratio is assigned \nthe shorthand notation of 8 (delta). \n\n@=TITtl \n,+273 \n\n288 \n\nMany items of compressibility effects and jet \nengine performance involve consideration of \nthe temperature ratio. ", + "page_start": 19, + "page_end": 19, + "source_file": "00-80T-80.pdf" + }, + { + "text": "Altitude pressure ratio \n\nAmbient static pressure \n=Standard sea level static pressure \n\n6 = PIP0 \n\nMany items of gas turbine engine perform- \nance are directly related to some parameter \nthe altitude pressure ratio. \ninvolving \nTEMPERATURE. The absolute tempera- \ncure of the air is another important property. \nThe ordinary temperature measurement by the \nCentigrade scale has a/datum at the freezing \npoint of water but absolute zero temperature \nis obtained at a temperature of -273“ Centi- \ngrade. Thus, the standard sea level tcmpera- \nture of 15” C. is an absolute temperature of \n288”. This scale of absolute temperature using \nthe Centigrade increments is the Kelvin scale, \nfor the \ne.g., o K. The shorthand notation \nambient air temperature is “T” \nand the stand- \nard sea level air temperature of 288’ K. is \nsignified by Ta. The more usual reference is, \n\n2 ", + "page_start": 19, + "page_end": 19, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\nSTATIC \nPRESSURE ", + "page_start": 132, + "page_end": 132, + "source_file": "00-80T-80.pdf" + }, + { + "text": "DENSITY. The density of the air is a prop- \nerty of greatest importance in the study of \naerodynamics. The density of air is simply \nthe mass of air per~cubic foot of volume and \nis a direct measure of the quantity of matter \nin each cubic foot of air. Air at standard sea \nlcvcl conditions weighs 0.0765 pounds per cubic \nfoot and has a density of 0.002378 slugs per \ncubic foot. At an altitude of 40,000 feet the \nair density is approximately 25 percent of the \nsea level value. \n\nThe shorthand notation used for air density \nis p (rho) and the standard sea level air density \nis then pO. In many parts of aerodynamics it \nis very convenient to consider the proportion \nof the ambient air density and standard sea \nlevel air density. This density ratio is assigned \nthe shorthand notation of c (sigma). \n\nambient air density \nstandard sea level air density \n\na = PIP0 \n\nA general gas law defines the relationship of \npressure temperature, and density when there \nis no change of state or heat transfer. Simply \nstated this would be “density varies directly \nwith pressure, inversely with \ntemperature.” \nUsing the properties previously defined, ", + "page_start": 19, + "page_end": 19, + "source_file": "00-80T-80.pdf" + }, + { + "text": "Figure 1.3 illustrates the variation of static, \nflowing \ndynamic, and total pressure of air \nthe total \nthrough a closed tube. Note that \npressure is con,stant throughout \nthe length \nand any change in dynamic pressure produces \nthe same magnitude change in static pressure. \nThe dynamic pressure of a free airstream is \nthe one ‘common denominator of all aero- \ndynamic forces and moments. Dynamic pres- \nsure represents the kinetic energy of the free \nairstream and is a factor relating the capability \nfor producing changes in static pressure on a \nsurface. As defined, the dynamic, pressure \nvaries directly as the density and the square of \nthe velocity. Typical values of dynamic pres- \nsure, 4, are shown in table l-1 for various true \nairspeeds in the standard atmosphere. Notice \nthat the dynamic pressure at some fixed veloc- \nity varies directly with the density ratio at any \naltitude. Also, appreciate the fact that at an \naltitude of 40,oM) feet (where the density ratio, \nb, is 0.2462) it is necessary to have a true air \ntwice that at sea level in order to \nvelocity \nproduct the same dynamic pressure. ", + "page_start": 26, + "page_end": 26, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n\nSEA.LEVEL ", + "page_start": 188, + "page_end": 188, + "source_file": "00-80T-80.pdf" + }, + { + "text": "pressure, q. The pressure gauge is then cali- \nbrated to indicate flight speed in the standard \nsea level air mass. For example, a dynamic \npressure of 305 psf would be realized at a sea \nlevel flight ,speed of 300 knots. \n\nsurface anflow continues to the aft stagnation \npoint where the local velocity is again zero. \nThe important point of this example of aero- \ndynamic flow is existence of the stagnation \npoint. The change in airflow static pressure \nwhich takes place at the stagnation point IS \nequal to the free stream dynamic pressure, q. \nThe measurement of free stream dynamic \npressure is fundamental to the indication of \nIn fact, airspeed indicators are sim- \nairspeed. \nply pressure gauges which measure dynamic \npressure related to various airspeeds. Typical \nin \nairspeed measuring systems are illustrated \nfigure 1.5. The pitot head has no internal \nflow velocity and the pressure in the pitot tube \nis equal to the total pressure of the airstream. \nThe purpose of the static-ports is to sense the \ntrue static pressure of the free airstream. The \ntotal pressure and static pressure lines are \nattached to a differential pressure gauge and \nis the dynamic \nthe net pressure indicated \n\nthere can be many conditions of \nflight where the airspeed indicator does not \ntruly reflect the actual velocity through \nthe \nair mass. The corrections that must be applied \nare many and lisred in sequence below: \n(1) The indicated airspeed (IAS) \n\nActually \n\nis the \nactual instrument indication for some given \nflight condition. Factors such as an altitude \nother than standard sea level, errors of the \ninstrument and errors due to the installation, \ncompressibility, etc. may create great vari- \nance between this instrument indication and \nthe actual flight speed. \n\n(2) The calibrated airspeed (CM) ", + "page_start": 27, + "page_end": 27, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n\nwhere \n\nS1= standard sea level landing dis- \n\ntance \n\nSa=Ianding distance at altitude \nc=altitude density ratio ", + "page_start": 216, + "page_end": 216, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n\nSEA \nLEVEL’ \n0 ", + "page_start": 137, + "page_end": 137, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n\nw / :% \n. I. q \n\nPRESSURE INDICATED BY GAUGE IS \nDIFFERENCE BETWEEN TOTAL AND \nSTATIC PRESSURE, H-p= q \n\nFigure. 1.5. Airspeed Measurement ", + "page_start": 28, + "page_end": 28, + "source_file": "00-80T-80.pdf" + } + ] + }, + { + "references": { + "source_file": "00-80T-80.pdf", + "query": "What is the phenomenon associated with the production of lift by an airfoil ?", + "target_page": 34, + "target_passage": "An important phenomenon associated with the production of lift by an airfoil is the “circulation” parted to the airstream. ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "\n\nAIRFOIL LIFT ", + "page_start": 34, + "page_end": 34, + "source_file": "00-80T-80.pdf" + }, + { + "text": "and high power, the dynamic pressure in the \nshaded area can be much greater than the free \nstream and this causes considerably greater \nlift \nthan at zero thrust. At high power con- \nditions the induced flow also causes an effect \nsimilar to boundary layer control and increases \nthe maximum lift angle of attack. The typical \nfour-engine propeller driven airplane may have \n60 to 80 percent of the wing area affected by \nthe induced flow and power effects on stall \nspeeds may be considerable. Also, the lift of \nthe airplane at a given angle of attack and air- \nspeed will be greatly affected. Suppose the \nairplane shown is in the process of landing \nflare from a power-on approach. \nIf there is \na sharp, sudden reduction of power, the air- \nplane may drop suddenly because of the reduced \nlift. \n\nnet lift produced by the airfoil \nis difference \nbetween the lifts on the upper and lower sur- \nfaces. The point along the chord where the \nis effectively concentrated is \ndistributed \ntermed the “center of pressure, c.p.“ \nThe \ncenter of pressure is essentially the “center of \ngravity” \nlift pressure and \nthe location of the c.p. is a function of camber \nand section lift coe&cient \n\nlift ", + "page_start": 64, + "page_end": 64, + "source_file": "00-80T-80.pdf" + }, + { + "text": "Parts (c) and (d) of figure 3.8 show the \nwave pattern and resulting pressure distribu- \ntion for a double wedge airfoil at zero lift. \nThe airstream moving over the surface passes \nthrough an oblique shock, an expansion wave, \nand another oblique shock. The resulting \npressure distribution on the surfaces produces \nno net lift, but the increased pressure on the \nthe de- \nforward half of the chord along with \ncreased pressure on the aft half of the chord \nproduces a “wave” \ndrag. This wave drag is \ncaused by the components of pressure forces \nwhich are parallel to the free scream direction. \nThe wave drag is in addition to the drag due \nto friction, separatien, lift, etc., and can be \na very considerable part of the total drag at \nhigh supersonic speeds. \n\nIn order to appreciate the effect of these \nvarious wave forms on the aerodynamic char- \nacteristics in supersonic flow, inspect figure 3.8. \nParts (a) and (b) show the wave pattern and \nresulting pressure distribution \nfor a thin flat \nplate at a positive angle of attack. The air- \nstream moving over the upper surface passes \nthrough an expansion wave at the leading edge \nand then an oblique shock wave at the trailing \nedge. Thus, a uniform suction pressure exists \nover the upper surface. The airstream moving \nunderneath the flat plate passes through an \noblique shock wave at the leading edge then an \nexpansion wave at the trailing edge. This pro- \nduces a uniform positive pressure on the under- \nside of the section. This distribution of pres- \nsure on the surface will produce a net lift and \nincur a subsequent drag due co lift from the in- \nclination of the resultant lift \nfrom a perpen- \ndicular co the free stream. Parts (e) and (f) of figure 3.8 illustrate the \nwave pattern and resulting pressure distribu- \ntion for the double wedge airfoil at a small \npositive angle of attack. The net pressure ", + "page_start": 230, + "page_end": 230, + "source_file": "00-80T-80.pdf" + }, + { + "text": "the cambered airfoil of \nNext, consider \nfigure 1.21 at zero lift. \nTo produce zero lift, \nthe upper and lower surface lifts must be equal. \nOne difference noted from the symmetrical air- \nfoil is that the upper and lower surface lifts are \nnot opposite one another. While no net lift \nthe couple produced by \nexists on the airfoil, \nthe upper and lower surface lifts creates a nose \ndown moment. As the angle of attack is in- \ncreased, the upper surface lift \nincreases while \nlower surface lift decreases. While a \nthe \nchange in lift has taken place, no change in \nmoment takes place about the point where \nthe lift change occurs. Since the moment \nabout the aerodynamic center is the product \nof a force (lift at the c.P.) and a lever arm \n(distance from c.9. to a.~.), an increase in lift \nmoves the center of pressure toward the aero- \ndynamic center. \n\nDEVELOPMENT OF AERODYNAMIC \n\nPITCHING MOMENTS \n\nThe distribution of pressure over a surface \nis the ,source of the aerodynamic moments as \nwell as the aerodynamic forces. A typical \nexample of this fact is the pressure distribution \nacting on the cambered airfoil of figure 1.21. \nThe upper surface has pressures distributed \nwhich produce the upper surface lift; the lower \nsurface has pressures distributed which pro- \nduce the lower surface lift. Of course, the It should be noted that the symmetrical air- \nfoil at zero lift has no pitching moment about \nthe aerodynamic center because the upper and ", + "page_start": 64, + "page_end": 64, + "source_file": "00-80T-80.pdf" + }, + { + "text": "The effect of free stream density and velocity \nis a necessary consideration when studying the \ndevelopment of the various aerodynamic forces. \nSuppose that a particular shape of airfoil \nis \nfixed at a particular angle to the airstream. \nThe relative velocity and pressure distribution \nwill be determined by the shape of the airfoil \nand the angle to the airstream. The effect of \nvarying the airfoil size, air density and air- \nspeed is shown in figure 1.9. \nIf the same air- \nfoil shape is placed at the same angle to an \nairstream with \ntwice as great a dynamic pres- \nsure the magnitude of the pressure distribution \nwill be twice as great but the r&rive shape of \nthe pressure distribution will be the same. \nWith \ntwice as great a pressure existing over \nthe surface, all aerodynamic forces and mo- \nib \nments will ~double. If a half-size airfoil \nplaced at the same angle to the original air- \nstream, the magnitude of the pressure distri- \nbution is the same as the origina! airfoi! and \nagain the relative shape of the pressure dis- \ntribution \nis identical. The same pressure act- \ning on the half-size surface would reduce all \naerodynamic forces to one-half that of the \noriginal. This similarity of \nflow patterns \nmeans that the stagnation point occurs at the \nsame place, the peak suction pressure occurs \nat the same place, and the actual magnitude of \nthe aerodynamic forces and moments depends \nupon the airstream dynamic pressure and the \nsurface area. This concept is extremely im- \nportant when attempting to separate and ana- \nlyze the most important factors affecting the \ndevelopment of aerodynamic forces. ", + "page_start": 37, + "page_end": 37, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\nlift coefficients during ", + "page_start": 88, + "page_end": 88, + "source_file": "00-80T-80.pdf" + }, + { + "text": "J.f a wing is producing lift, a pressure differ- \nential will exist between the upper and lower \nsurfaces, i.e., for positive lift, \nthe static pres- \nsure on the upper surface will be less than on \nthe lower surface. At the tips of the wing, \nthe existence of this pressure differential creates \nthe spanwise flow components shown in figure \n1.29: For the rectangular wing, \nthe lateral \nflow developed at the tip is quite strong and a \nstrong vortex is created at the tip. The lateral \n‘flow-and consequent vortex strength-reduces \nit is zero at the \ninboard from the tip until \ncenterline. \n\nto \n(6) Considering the wing planform \nhave straight lines for the leading and trail- \ning edges, the taper ratio, A (lambda), is the \nratio of the tip chord to the root chord. \n\n(7) The sweep angle, A (cap lambda), is \nusually measured as the angle between the \nline of 25 percent chords and a perpendicular \nto the root chord. The sweep of a wing \ncauses definite changes in compressibility, \nmaximum lift, and stall characteristics. \n\nThe existence of the tip vortex is described \n\nto produce the resultant ", + "page_start": 80, + "page_end": 80, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n\nDECREASED LOCAL \nVELOCITY \n\nFigure 1.8. Generation of Lift (sheet 1 of 2) \n\n17 ", + "page_start": 34, + "page_end": 34, + "source_file": "00-80T-80.pdf" + }, + { + "text": "distribution produces an inclined \nlift with \ndrag due to lift which is in addition to the \nwave drag at zero lift. Part (g) of figure 3.8 \nshows the wave pattern for a circular arc air- \nfoil. After the airflow traverses the oblique \nshock wave at the leading edge, the airflow \nundergoes a gradual but continual expansion \nuntil \nthe trailing edge shock wave is en- \ncountered. Part (h) of figure 3.8 illustrates \nthe wave pattern on a conventional blunt nose \nairfoil in supersonic flow. When the nose is \nblunt \nthe wave must detach and become a \nnormal shock wave immediately ahead of the \nleading edge. Of course, this wave \nform \nproduces an area of subsonic airflow at the \nleading edge with very high pressure and \ndensity behind the detached wave. \n\nTRANSONIC AND SUPERSONIC PLIGHT \n\nAny object in subsonic flight which has some \nfinite thickness or is producing lift will have \nlocal velocities on \nthe surface which are \ngreater than the free stream velocity. Hence, \ncompressibility effects can be expected to \noccur at flight speeds less than the speed of \nsound. The transonic regime of flight pro- \nvides the opportunity for mixed subsonic and \nsupersonic flow and. accounts for \nsignificant effects of compressibility. \n\nthe \ntypical patterns of supersonic flow and point \nout these facts concerning aerodynamic surfaces \nin two dimensional supersonic flow: \n\nThe drawings of figure 3.8 illustrate \n\nthe first 1 (1) All ", + "page_start": 232, + "page_end": 232, + "source_file": "00-80T-80.pdf" + }, + { + "text": "‘Boundary larcr control devices are additional \nmeans of increasing the maximum lift coe&- \ncient of a section. The thin layer of airflow \nadjacent to the surface of an airfoil shows re- \nduced local velocities from the effect of skin \nfriction. When at high angles of attack this \nboundary layer on the upper surface tends to ", + "page_start": 60, + "page_end": 60, + "source_file": "00-80T-80.pdf" + } + ] + }, + { + "references": { + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf", + "query": "What are the recyclable waste ?", + "target_page": 3, + "target_passage": "All types of paper and cardboard, Metal packaging, even the smallest ones, Plastic bottles and flasks, All other packaging", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**RECYCLABLE WASTE**\n\n**All types of paper**\n**and cardboard**\n\n", + "page_start": 2, + "page_end": 2, + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" + }, + { + "text": "**Recycling of rare earths**\n**used in smart cards**\n\nExpired \ncredit cards \nwith IC chips \n\nRecovery \n\nAt Sumitomo Mitsui Card, rare earths \nAt Sumitomo Mitsui Card, rare earths \n\nextracted from IC chips from expired credit \nextracted from IC chips from expired credit \n\ncards are recycled. \ncards are recycled. ", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**REDUCING**\n**OUR**\n**CARBON**\n**FOOTPRINT**\n\nour annual report is printed on stock \ncontaining recycled material. Please \nrecycle. our report is also available \non‑line at: killamproperties.com/ \nfinancial‑reports \n\nK i l l a m P r oPe r t i e s in c | 2 0 1 3 9 7 ", + "page_start": 96, + "page_end": 96, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "*Other Services.*We have 35 materials recovery facilities and other recycling operations, which are \ngenerally required to fulÑll our obligations under long-term municipal contracts for residential collection \nservices. These facilities sort recyclable paper, aluminum, glass and other materials. Most of these recyclable \nmaterials are internally collected by our residential collection operations. In some areas, we receive \ncommercial and industrial solid waste that is sorted at our facilities into recyclable materials and non- \nrecyclable waste. The recyclable materials are salvaged, repackaged and sold to third parties and the non- \nrecyclable waste is disposed of at landÑlls or incinerators. Wherever possible, our strategy is to reduce our \nexposure to Öuctuations in recyclable commodity prices by utilizing third party recycling facilities, thereby \nminimizing our recycling investment. \n\nWe provide remediation and other heavy construction services primarily through our subsidiary located in \nMissouri. \n\nWe also have a Texas-based compost, mulch and soil business at which yard, mill and other waste is \nprocessed, packaged and sold as various products. \n\n**Sales and Marketing**\n\nWe seek to provide quality services that will enable our company to maintain high levels of customer \nsatisfaction. We derive our business from a broad customer base which we believe will enable our company to \nexperience stable growth. We focus our marketing eÅorts on continuing and expanding business with existing \ncustomers, as well as attracting new customers. ", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "**Environmental**\n**Activities**\n\n", + "page_start": 12, + "page_end": 12, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Recycling yields approximately 0.1mg of rare \nRecycling yields approximately 0.1mg of rare \n\nearth product per expired card. \nearth product per expired card. \n\nRare earths are special metals, unobtainable \nRare earths are special metals, unobtainable \n\ns and \nin Japan, which are essential to PCs and \nin Japan, which are essential to \n\ncellphones, electric vehicles and solar power \ncellphones, electric vehicles and solar power \n\ngenerators. Given that Japan is dependent on \ngenerators. Given that Japan is dependent on \n\nimports for nearly its entire supply, we believe \nimports for nearly its entire supply, we believe \n\nrecycling rare earths is a worthwhile endeavor \nrecycling rare earths is a worthwhile endeavor \n\nin terms of national energy policy. \nin terms of national energy policy. \n\nCard microcircuits that have become unusable \nCard microcircuits that have become unusable \n\ndue to changes in card design are collected \ndue to changes in card design are collected \n\nfrom cards with IC chips, which are separated \nfrom cards with IC chips, which are separated ", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Compost Beginnings \nThe yard debris or food scraps*that you \nplace into your home compost bin, take to \na drop-off site, or set out for curbside \ncollection could become the compost that \nyou later use on your garden, lawn, and \nflowerbeds. ", + "page_start": 4, + "page_end": 4, + "source_file": "CompostGuide.pdf" + }, + { + "text": "**//50% green materials : all fruit and vegetable**\n**peelings, leftover meat, egg shells, tea and**\n**coffee…**\n\n**//50% brown materials : dead leaves, twigs,**\n**kitchen rolls, shavings, possibly paper,**\n**newspaper and cardboard …**", + "page_start": 2, + "page_end": 2, + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" + }, + { + "text": "A project of the Washington Organic Recycling Council, with \nsupport from the Washington State Department of Ecology’s \nPublic Participation Grant program. \n\nThis product was partly funded through a grant from the \nWashington Department of Ecology. While these materials \nwere reviewed for grant consistency, this does not necessarily \nconstitute endorsement by the department. \n\n**Special thanks:**the original version of this brochure in 2003 \nwas created by the Washington County, Oregon Solid Waste and \nRecycling Program in cooperation with the Washington Organic \nRecycling Council and the Composting Council of Oregon. ", + "page_start": 1, + "page_end": 1, + "source_file": "CompostGuide.pdf" + }, + { + "text": "***Materials and supplies:***New and reusable materials are carried in inventory at the lower of average cost or market \nvalue. Inventory held for sale, such as telephones and accessories, are carried at the lower of average cost or market \nvalue. Non-reusable material is carried at estimated salvage value. ", + "page_start": 20, + "page_end": 20, + "source_file": "NASDAQ_SHEN_2003.pdf" + } + ] + }, + { + "references": { + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf", + "query": "What is the day of the black container in Lachapelle ?", + "target_page": 4, + "target_passage": "LACHAPELLE MONDAY green weeks", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "**OUT BLACK CONTAINER** **FULL CONTAINER OR**\n\n\n \n \n \n \n [html]\n
TableITSTHE SAME PHCEONAY WHEN FULLNUARYFEBRUARYMARCH
APRILMAYJUNEa.1
MW||23w
F −,theM_4T.S_
..T_5FS75
.·W_6$–M_Age
Table|8MW8
iS_ 9 STWT −99
_*M_1TS_1
,?T__1F.S_J_1
.5W_1etM.__1
1:1Mw −21
|(1TT −1
offSensitivityWF_0.1
oftT___FS −in
.IW_2SM.1.5
of.Z>Sex_2
_*2MWSequence
.22TWT −2
_5M_2TS_2
,·T_2F.SN = 2
iW_25 −MT22
of12MW_2
.3TT__3JULY
AUGUSTSEPTEMBEROCTOBERNOVEMBERDECEMBER.
.S_1T.F__,M_2
vsS__.:T_3T.
S_3ofTableW_4F
M_|.F_6Sw
ofof.S_7MT_
_:BTcF__3
rM_1T3 −1.9
.5T_1T.Sex_1
.In_1F.IVI_N = 3
.)ofPTurn.
|.1MT21
Tablei1TF1
1.tM 1WS_1.1
.:T_1T.S___1
.IW_1F_M_L_1
,1yType________________________________________________________________________________________________________________________________________________________________________________________________________
.12S.W_2.
the;2M
", + "page_start": 1, + "page_end": 1, + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" + }, + { + "text": "Mar 06, 2024 Mar 06, 2024 \n\nCelebrate St. Patrick's Day with Say Hello to Your Big Break at the \n\nNo Booze, Just Pure Irish Fun and Stapleton Library Job Fair in \n\nEntertainment Vocation, Trade, or Civil Service ", + "page_start": 0, + "page_end": 0, + "source_file": "news1.pdf" + }, + { + "text": "\n\nWhen ", + "page_start": 299, + "page_end": 299, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Black containerYellow containerAGNAC
TUESDAY white weeksTHURSDAY green weeksALLEMANS - DU - DROPT
MONDAY green weeksWEDNESDAY white weeksARMILLAC
TUESDAY white weeksTHURSDAY green weeksBOURGOUGNAGUE
WEDNESDAY green weeksFRIDAY white weeksCAMBES
MONDAY green weeksWEDNESDAY white weeksLACHAPELLE
MONDAY green weeksTHURSDAY white weeksLAPERCHE
TUESDAY white weeksWEDNESDAY green weeksLA - SAUVETAT - DU - DROPT
TUESDAY white weeksTHURSDAY green weeksLAUZUN
MONDAY green weeksFRIDAY white weeksLAVERGNE
TUESDAY white weeksTHURSDAY green weeksMIRAMONT - DE - GUYENNE
TUESDAY green weeksTHURSDAY white weeksMONTIGNAC - DE - LAUZUN
WEDNESDAY white weeksWEDNESDAY green weeksMONTIGNAC - TOUPINERIE
TUESDAY white weeksTHURSDAY green weeksMOUSTIER
WEDNESDAY green weeksWEDNESDAY white weeksPEYRIERE
MONDAY green weeksTHURSDAY white weeksPUYSSERAMPION
MONDAY green weeksWEDNESDAY white weeks113
ROUMAGNEMONDAY white weeksTHURSDAY green weeks
SAINT - COLOMB - DE - LAUZUNWEDNESDAY white weeksWEDNESDAY green weeks
SAINT - PARDOUX - ISAACMONDAY white weeksFRIDAY green weeks
SEGALASWEDNESDAY white weeksWEDNESDAY green weeks
", + "page_start": 3, + "page_end": 3, + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf" + }, + { + "text": "\n\nP E R F E C T M A T C H # 4 ", + "page_start": 24, + "page_end": 24, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "Higgs portal dark matter in the minimal gauged U (1)B L model \n− \n\nNobuchika Okada∗ \n\nDepartment of Physics and Astronomy, \n\nUniversity of Alabama, Tuscaloosa, AL 35487, USA ", + "page_start": 0, + "page_end": 0, + "source_file": "1002.2525.pdf" + }, + { + "text": "\n\nP E R F E C T M A T C H # 3 ", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "k \n2 k \n2 \nh(Jcluster/2)(Sj1 + Sj2 + Sj3 + Sj4)2 + \n1j)2 + 2j)2 \n(QE (QE \nX \ncluster j \n\nSj1 Sj4 + Sj2 Sj3 + Sj2 \n\nSj4 + Sj1 \n√12 \n\nSj3 2Sj1 Sj2 2Sj3 Sj4 \n+ J ′ \n(cid:16)QE \n· · · · − · − · \n1j \n\nSj2 Sj4 + Sj1 Sj3 Sj1 Sj4 Sj2 Sj3 \n+ QE \n2j \n· · \n− \n2 \n· − · \n(cid:17)i \n\n4Jxk2 \n3J ′2 QE \n1j · 4Jyk2 \n3J ′2 QE \n2j · 16Jzk4 \n9J ′4 QE \nQE \n2k + \n1k − X 2j · − X \nX \nz−links x−links y−links ", + "page_start": 5, + "page_end": 5, + "source_file": "1001.0266.pdf" + }, + { + "text": "31. Braudel 1984 p. 327 \n32. Pierre Edmond DESVIGNES. \"Quartier renaissance Lyon : Vieux Lyon, quartier ancien et secteur sauvegarde \nLyon\" (https://web.archive.org/web/20110119152753/http://www.vieux-lyon.org/lyon-epoque-renaissance_f01 \n150.htm). Vieux-lyon.org. Archived from the original (http://www.vieux-lyon.org/lyon-epoque-renaissance_f011 \n50.htm) on 19 January 2011. Retrieved 3 April 2011. \n\n33. \"CHRD Lyon\" (https://web.archive.org/web/20110124140355/http://www.chrd.lyon.fr/chrd/sections/fr/pied/engli \nsh_1).*Chrd.lyon.fr*. 2017. Archived from the original (http://www.chrd.lyon.fr/chrd/sections/fr/pied/english_1) \non 24 January 2011. Retrieved 21 December 2017. \n\n34. Cosgrove, Michael (4 June 2009). \"Lyon: The Resistance and Deportation Museum\" (http://www.digitaljournal. ", + "page_start": 22, + "page_end": 22, + "source_file": "wikipedia4.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Snaoshot Date+Volume SizeVolume G...TypeState
III10 / 12 / 17 / 138 : 37 I / M7 / 1.001 ‐ C2 / HF - 3Cinmplete10 / 13 / 1.7 : 10 : 58 PM
10.00 GiBInorem...Complet
", + "page_start": 531, + "page_end": 531, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "BD-EN_calendrier-Lauzun-2024.pdf", + "query": "What to do if my container is stolen ?", + "target_page": 4, + "target_passage": "Container stolen: What to do? In case of theft, your container will be replaced on presentation of a theft report effected at your local police station.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**12.7 Recovering from a provider loss**\n\nIf both encryption key providers are enabled, and you lose one of them (by losing all copies of \nthe encryption key kept on the USB flash drives or by losing all SKLM servers), you can \nrecover from this situation by disabling the provider to which you lost the access. To disable \nthe unavailable provider, you must have access to a valid master access key on the remaining \nprovider. \n\nIf you have lost access to the encryption key server provider, issue the following command: \n\nchencryption -keyserver disable \n\nIf you have lost access to the USB flash drives provider, issue the following command: \n\nchencryption -usb disable \n\nIf you want to restore the configuration with both encryption key providers, follow the \ninstructions that are described in 12.5, “Configuring more providers” on page 647. \n\n**Note:**If you lose access to all encryption key providers that are defined in the system, no \nmethod is available to recover access to the data protected by the master access key. ", + "page_start": 677, + "page_end": 677, + "source_file": "sg247938.pdf" + }, + { + "text": "Figure 6-27 Taking a drive offline \n\nIf a spare drive is available and the drive is taken offline, the MDisk of which the failed drive is \na member remains*Online*. The spare is automatically reassigned. If no spare drive is \navailable and the drive is taken offline, the status of the array of which the failed drive is a \nmember becomes*Degraded*. Therefore, the status of the storage pool to which the MDisk \nbelongs becomes*Degraded*as well. \n\nThe system prevents you from taking the drive offline if one of the following conditions is true: \n\n(cid:2) The first option was selected and no suitable spares are available. \n\n(cid:2) Losing another drive in the array results in data loss. \n\nA drive that is taken offline is considered*Failed*, as shown in Figure 6-28 on page 211. ", + "page_start": 231, + "page_end": 231, + "source_file": "sg247938.pdf" + }, + { + "text": "Figure 5-93 Enclosure removed \n\nAs part of the enclosure removal process, consult your company security policies about how \nto handle sensitive data on removed storage devices before they leave the secure data \ncenter. Most companies require data to be encrypted or logically shredded. \n\n**5.11.3 Restarting the GUI Service**\n\nThe service that runs that GUI operates from the configuration node. Occasionally, you might \nneed to restart this service if the GUI is not performing to your expectation (or you cannot \nconnect). To do this, you log on to the service assistant and identify the configuration node, as \nshown in Figure 5-94. ", + "page_start": 210, + "page_end": 210, + "source_file": "sg247938.pdf" + }, + { + "text": "**Notes:**Generally, create at least one extra copy on another USB flash drive for storage in \na secure location. You can also copy the encryption key from the USB drive and store the \ndata on other media, which can provide extra resilience and mitigate risk that the USB \ndrives used to store the encryption key come from a faulty batch. \n\nEvery encryption key copy must be stored securely to maintain confidentiality of the \nencrypted data. ", + "page_start": 643, + "page_end": 643, + "source_file": "sg247938.pdf" + }, + { + "text": "C:\\putty> \n\nC:\\>**dir V7000backup**\n Volume in drive C has no label. \n Volume Serial Number is 0608-239A \n\n Directory of C:\\V7000backup \n\n24.10.2018 10:57 . \n24.10.2018 10:57 .. \n24.10.2018 10:57 137.107 svc.config.backup.bak_7822DFF-1 \n24.10.2018 10:57 17.196 svc.config.backup.log_7822DFF-1 \n24.10.2018 10:57 6.018 svc.config.backup.sh_7822DFF-1 \n24.10.2018 10:58 108.208 svc.config.backup.xml_7822DFF-1 \n 4 File(s) 268.529 bytes \n 2 Dir(s) 79.028.662.272 bytes free \n\nC:\\> ", + "page_start": 705, + "page_end": 705, + "source_file": "sg247938.pdf" + }, + { + "text": "\n\n1 \n\nPULL ", + "page_start": 289, + "page_end": 289, + "source_file": "00-80T-80.pdf" + }, + { + "text": "Figure 6-30 Identifying an internal drive \n\nYour action makes an amber LED flash (turn on and off continuously) for the drive that you \nwant to identify. \n\nClick**Turn LED Off**when you are finished. The LED returns to its initial state. \n\nIn the CLI, this action requires a command that operates with the drive enclosure. The LED \ndoes not belong to a drive itself, but to the slot of the enclosure, so the command is \n**chenclosureslot**. See Example 6-14 for commands to turn on and off identification LED on \nslot 3 of enclosure 1, populated with drive id 21. \n\nExample 6-14 Changing slot LED to identification mode with CLI ", + "page_start": 233, + "page_end": 233, + "source_file": "sg247938.pdf" + }, + { + "text": "**Managing Tivoli Storage Manager storage**\nFor each automated library, Tivoli Storage Manager tracks in its volume inventory for the \nlibrary whether a volume has scratch or private status: \n\n(cid:2) A*scratch volume*is a labeled volume that is empty or contains no valid data, and it can be \nused to satisfy any request to mount a scratch volume. To support Content Manager \nOnDemand, you define scratch volumes to Tivoli Storage Manager. Tivoli Storage \nManager uses scratch volumes as needed, and returns the volumes to scratch when they \nbecome empty (for example, when all data on the volume expires). \n\n(cid:2) A*private volume*is a volume that is in use or owned by an application, and it might contain \nvalid data. Volumes that you define to Tivoli Storage Manager are private volumes. A \nprivate volume is used to satisfy only a request to mount that volume by name. When \nTivoli Storage Manager uses a scratch volume, it changes the volume’s status to private. \nTivoli Storage Manager tracks whether defined volumes were originally scratch volumes. \nVolumes that were originally scratch volumes return to scratch status when they become \nempty. \n\n**Secondary storage of storage volumes**\nFor instructions that describe how to handle physical storage volumes and remove them from \nthe library, see the documentation that is provided by the library manufacturer. ", + "page_start": 257, + "page_end": 257, + "source_file": "sg246915.pdf" + }, + { + "text": "**Offsite**\n**location**\nBackup system \n\n\n\nbacku ps ", + "page_start": 155, + "page_end": 155, + "source_file": "sg246915.pdf" + }, + { + "text": "– Encapsulation and isolation is the first level of security for any containerized \n\napplication. A rogue application does not affect other applications of the hosting \nenvironment \n\n– Container engine inherits default security features from hosting platform \n\n– Namespace provides an isolated view; for example, file system, mount point, network, \n\nprocess ID, and User ID \n\n**2.3.2 History of containers**\n\nContainer seems a latest buzzword with cloud technology. However, a similar concept was \nused for the first time as early as 1970 where application code was decoupled from UNIX \nnative system calls. \n\nOvertime, a few more enhancements were made, from stand-alone computer systems to \nintegrated environments. Then, virtualization features evolved with LPAR and workload \npartition (WPAR) concepts. Although these virtualization features added flexibility, application \nportability always was a challenge. With containerization, new age software developers \nreceived all of the flexibility, portability, and security that they needed. ", + "page_start": 35, + "page_end": 35, + "source_file": "sg248459.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed6_cc4.pdf", + "query": "How many people include the Dyspnea study ?", + "target_page": 1, + "target_passage": "This population-based study included 2,857 adults who were experiencing respiratory symptoms.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Dyspnea not only affects individuals with diagnosed \nrespiratory conditions but also poses a significant \nburden on those with undiagnosed conditions. In a \nsystematic review by Müller et al,4 the combined \n\nStudy Design and Methods \nRecruitment of Undiagnosed Cases and Healthy \nControl Patients \nBetween June 2017 and January 2023, adults aged $ 18 \nyears were recruited through a two-step process into the \nUndiagnosed COPD and Asthma Population (UCAP) \nstudy, a multicenter case finding study. Approval for \n\nthe study was obtained from the research ethics boards \nof \nthe 17 participating study sites across Canada. \nInformed, written consent was provided by all study \nparticipants. \n\nBoth landlines and cellphones within a 90-minute radius \nof any of the 17 study sites were dialed randomly. A ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "prevalence of dyspnea in the adult general population \nacross 11 studies was estimated to be 10%. Dyspnea can \narise from a broad spectrum of underlying factors, \nincluding both respiratory and nonrespiratory \nconditions. Studies have revealed that dyspnea is not \nsolely attributable to respiratory conditions but is also \nheavily influenced by cardiovascular deconditioning and \nby nonrespiratory factors, including psychosocial, social, \nand environmental determinants.5,6 ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "There were significant but modest differences in mean \ndyspnea levels across the 17 study sites (data not \nshown), which are not explained by the risk factors we \naccounted for in our study. This finding is not surprising \nbecause some of the potential contributing factors \npreviously mentioned and other site-specific factors \nThe affective dimension of dyspnea can be captured \nusing additional questionnaires (eg, Multidimensional \nDyspnea Profile, Dyspnea-12). Studies have explored the \nuse of the Multidimensional Dyspnea Profile in \n\nTABLE 7 ] Unadjusted and Adjusted Dyspnea Associations With Quality of Life (SF-36) ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "(eg, climate, air quality/industrialization, socioeconomic \nstatus) of the catchment population tend to vary across \nstudy sites. \n\nApproximately 65% of the variability in dyspnea \nremained unexplained by the factors examined in our \nstudy. Most individuals in our study showed normal \nspirometry results but still carried a substantial \nburden of dyspnea, an inconsistency that needs \nexplanation. Several factors not included in our \nanalysis may have contributed to the unexplained \nvariation. Environmental factors (eg, air pollution, \nallergen exposure, seasonal variations in symptoms) \nare potential contributors to this unexplained \nvariability.22 Genetic predispositions could also play a \nsignificant role, as suggested by a study that revealed \nthat parents with dyspnea were 1.8 times more likely \nto have offspring with dyspnea.23 Additionally, fitness \ncould be a contributing factor, especially in \nindividuals with undiagnosed PRISm, asthma, or \nCOPD who may restrict their activities to avoid \ndyspnea, and hence become deconditioned.6 \n\nDyspnea is a complex, subjective symptom that is \nmodified by nonrespiratory factors including \npsychosocial, social, and environmental influences.5 \nInterindividual variability in the perception of dyspnea, \ninfluenced by these nonrespiratory factors, may play an \nimportant role. A study conducted by Ziegler et al24 \nassessed the perception of dyspnea in 42 healthy \nindividuals using a standardized inspiratory resistive \nloading stimulus. The study used the modified Borg \nscale to measure dyspnea perception levels. Among the \nparticipants subjected to the same inspiratory resistive \nload, 31%, 45%, and 24% of participants classified their \nlevel of dyspnea as low, intermediate, and high, \nrespectively. The study revealed that differences between \nindividuals contribute considerable variability to the \nperception of dyspnea, even among healthy participants. ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Dyspnea was severe and prevalent within our study \ngroup; however, it remained undiagnosed. A study \nconducted by Stefan et al32 revealed that physicians \nunderestimated their patients’ dyspnea 37.9% of the \ntime, whereas nurses underestimated it 3.5% of the time. \nMoreover, many patients limit their physical activities, \nwhich lead them to downplay the extent of their \ndyspnea.19 Patient underreporting of symptoms, coupled \n\nFunding/Support \nThis study is supported by the Canadian Institutes of \nHealth Research [FDN Grant 154322]. \n\nFinancial/Nonfinancial Disclosures \nNone declared. ", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Dyspnea is a prevalent symptom with consequences that \nextend beyond its physiologic implications. A study in \nEuropean patients with COPD explored the burden of \ndyspnea and identified potential correlates. The study \nrevealed that higher dyspnea impact correlated with \nlower health-related quality of life, increased work \nimpairment, and a higher frequency of emergency \ndepartment visits.7 \n\nDyspnea refers to a subjective sensation of breathing \ndiscomfort.1 In a study involving a community-based \npopulation aged > 70 years, the prevalence of dyspnea \nwas found to be 32%.2 Dyspnea can lead to limitations in \ndaily activities, reduced exercise tolerance, and \nheightened mortality risks.3 \n\nThe three objectives of our study were as follows: (1) to \nevaluate the impact of dyspnea in adults from the \ngeneral population who had no prior diagnosis of \nrespiratory disease but who reported having significant \nrespiratory symptoms in the past 6 months; (2) to \nidentify associated risk factors for dyspnea and estimate \ntheir influence on the symptom; and (3) to explore the \nrelationship between dyspnea and health care utilization, \nquality of life, and work productivity in adults with \nundiagnosed respiratory symptoms. ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Impact of Dyspnea on Adults With \nRespiratory Symptoms Without a Defined \nDiagnosis \n\nJared Bierbrier, BSc; Emily Gerstein; George A. Whitmore, PhD; Katherine L. Vandemheen, MScN; Celine Bergeron, MD; \n\nLouis-Philippe Boulet, MD; Andreanne Cote, MD; Stephen K. Field, MD; Erika Penz, MD; R. Andrew McIvor, MD; \n\nCatherine Lemière, MD; Samir Gupta, MD; Paul Hernandez, MD; Irvin Mayers, MD; Mohit Bhutani, MD; \n\nM. Diane Lougheed, MD; Christopher J. Licskai, MD; Tanweer Azher, MD; Nicole Ezer, MD; Martha Ainslie, MD; \n\nGonzalo G. Alvarez, MD; Sunita Mulpuru, MD; and Shawn D. Aaron, MD ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "After adjusting for age, sex, and BMI, dyspnea was \nassociated with a reduced likelihood of current \nemployment (OR, 0.993; P < .001), increased \nabsenteeism (coefficient, 0.066; P < .001), increased \npresenteeism (coefficient, 0.349; P < .001), higher work \n\nDiscussion \nOur study explored dyspnea in community-based adults \nwith undiagnosed respiratory symptoms identified via \ncase finding. Surprisingly, we found that the dyspnea \nexperienced by those with PRISm had a greater impact \non their activities and health status than those with \nnewly diagnosed COPD or asthma. \nTABLE 5 ] Dyspnea Regressed on Spirometry Disease \nGroup \n\nThe prevalence of individuals who were obese and \nmorbidly obese in the PRISm group partially explains \nthe between-group difference in dyspnea. The excess \ndyspnea seen in the PRISm group when compared with \nthe normal spirometry group is partly explained by \npatient-specific risk factors, including BMI, which \nshrink the mean dyspnea differential between the groups \nfrom 11.2 to 5.5 points (Tables 3-6). The remaining 5.5- \npoint difference indicates that PRISm patients have \nexcess dyspnea relative to symptomatic individuals with \nnormal spirometry for additional reasons other than \nobesity. ", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "BACKGROUND: We investigated dyspnea; its associated risk factors; and its impact on health \ncare utilization, quality of life, and work productivity in adults with undiagnosed respiratory \nsymptoms. \n\nRESEARCH QUESTION: What is the impact of dyspnea in adults with undiagnosed respiratory \nsymptoms? ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed6_cc4.pdf" + }, + { + "text": "Our study has limitations. We did not undertake \nreliability/reproducibility testing of our questionnaire. \nThe dyspnea impact assessment score was statistically \nassociated with increased health care utilization, lower \nquality of life, and reduced work productivity; therefore, \nby virtue of this analysis, our questionnaire has \nconstruct validity. However, further attempts at external \nvalidation of the questionnaire using an independent \ndata set would be important. Health care utilization \nduring the preceding 12 months was assessed on entry \ninto the study, and there is potential for impaired recall \nof events. Our study may have missed asthma in some \nparticipants because bronchial challenge testing was not \nconducted on those who tested negative for airflow \nobstruction or BD responsiveness. A previous study \nshowed that an additional diagnostic step incorporating Our study complements the literature by focusing on \nadults with undiagnosed respiratory symptoms who \nwere randomly selected and recruited through active \ncase finding in the community. This increases the \ngeneralizability of our results to a broader population. \nOur dyspnea questions were derived from widely used \n\nTABLE 9 ] Unadjusted and Adjusted Dyspnea Associations With Work Productivity (WPAI) ", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed6_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "CompostGuide.pdf", + "query": "Can I put my plants directly on my compost ?", + "target_page": 2, + "target_passage": "Don’t\tput\tplants\tinto\t100%\tcompost.\t\tMix\t\t\t\t\t\t\t\t\t compost\tthoroughly\tinto\texisting\tsoil\tbefore\t\t\t planting.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Compost Beginnings \nThe yard debris or food scraps*that you \nplace into your home compost bin, take to \na drop-off site, or set out for curbside \ncollection could become the compost that \nyou later use on your garden, lawn, and \nflowerbeds. ", + "page_start": 4, + "page_end": 4, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Compost: A Natural Cycle \nComposting is a natural process in which micro- \norganisms and macro-organisms break down organic \nmaterial (leaves, twigs, grass, etc.) into a dark crum- \nbly soil amendment. Modern compost facilities use \nthe same natural biological composting process. \nTheir controlled-temperature process works faster, \nbreaks down pesticide residues, and also kills weed \nseeds and plant diseases. ", + "page_start": 3, + "page_end": 3, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Ask Your Compost Supplier \n\n**Whether you’re buying direct from the composting facility, or from a local**\n**vendor, here are some good questions to ask:**\n\n**• What ingredients go into your compost?**\n**• What compost products or blends do you sell?**\n**• Are there quality control or testing results available for these**\n**products? (These may be on the manufacturer’s website.)**\n\n**• Which product is best for my intended use?**\n**• What application rate do you recommend?**\n**• How much do I need for my area? (Or see pages 4-6.)**", + "page_start": 3, + "page_end": 3, + "source_file": "CompostGuide.pdf" + }, + { + "text": "*Compost Works! Soil blending trials conducted in 2008 by the Washington Organic Recycling Council, with funding from the Washington Department of Ecology,*\n*demonstrated that compost improves soil structure (lowers bulk density), nutrient availability (increases cation exchange capacity), moisture holding*\n\n*capacity, and supplies both nutrients that plants need and organic matter that supports soil life. See the 2008 Soil Blending Trial report at*\n\n**www.compostwashington.org.**", + "page_start": 7, + "page_end": 7, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Selecting Quality Compost \nCompost is available in many product types and blends that may be \nused for different gardening applications. The type of feedstock, \nthe composting process, and any supplementary additives determine \nthe end product. \n\nMany facilities offer a variety of blends based on compost, such as \ngarden mix, potting soil, planting mix, mulches, turf top-dressing \nand soil blends. \n\n**What to Look for in Compost**\nFor most compost applications you will want a finished product that \nhas matured and stabilized. Look for material \n l with a dark, crumbly texture \n l with a mild odor \n\nFor most compost applications you will not want compost that is \nextremely dry or wet, or extremely hot. (Note that it is okay for \ncompost to be warm and to give off some steam and mild odor.) ", + "page_start": 5, + "page_end": 5, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Compost Questions and Answers \n**What is compost?**\nCompost is a natural humus-like soil amendment that results from \nthe controlled aerobic (with oxygen) decomposition of organic \nmaterials. Compost is not soil – it should be mixed with soil. It is \nnot fertilizer, although it contains many slowly released nutrients. \n\n**What materials (“feedstocks”) are used to make compost?**\nCompost facilities in Washington recycle a variety of organic \nmaterials, including yard debris, food scraps, manure, biosolids, \nforest residuals like sawdust and bark, construction wood, and \nagricultural residues. All of these materials can be used to produce \nhigh quality compost. Your supplier can tell you which materials \nthey compost. \n\n**How do I know I’m getting safe, quality compost?**\nFortunately, in Washington we have strict permitting and production \nstandards for compost facilities, that include both time and \ntemperature requirements and contaminant limits. \n\n**What about weed seeds, plant diseases or pesticide residues?**\nThe controlled time, aeration, and temperature process required in \nWashington has been shown to kill weed seeds and plant diseases. \nThat same process breaks down most pesticide residues. There are \na few agricultural pesticides that are not easily broken down, and \npermitted Washington compost manufacturers carefully watch their \nfeedstocks to keep those materials out of the composting process. ", + "page_start": 4, + "page_end": 4, + "source_file": "CompostGuide.pdf" + }, + { + "text": "**Washington State Encourages the Use of Compost,**\n**to Protect Our Water Quality**\nThe Washington State Department of Ecology recommends that soils \non construction sites be restored with compost before planting, and also \nencourages the use of compost for construction site erosion control, to reduce \nstormwater runoff and help keep our rivers, lakes, and Puget Sound clean. \nLearn more at**www.SoilsforSalmon.org**or**www.BuildingSoil.org.**\n\n**Remember:**\n**Your compost provider can help you pick the best compost mix**\n**for your needs.**", + "page_start": 5, + "page_end": 5, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Applications for Compost \n**Planting New Garden Beds or Lawns**\nSpread a 2-4 inch layer of compost and mix into the upper 6-12 \ninches of existing soil: use more in sandy soils, and less in heavy clay. \nReapply ½-1 inch annually on garden beds. \n\n**Mulch (surface applications on landscape beds)**\nSpread a 1-2 inch layer of coarse, woody compost. To allow proper \nairflow, it is best not to pile mulch around the stems of trees and \nshrubs. Pull mulch 1-2 inches away from stems. \n\n**Top Dressing for Lawns**\nSpread a ¼ to ½ inch layer of fine screened compost, and rake it into \nthe lawn. For best results, plug-aerate the lawn before top-dressing. \nOverseeding at the same time will thicken thin patches in lawns. \n\n**Blended (Manufactured) Topsoils**\nGood quality “topsoil” products usually include 10-40% compost by \nvolume, mixed with a sandy loam soil that allows good drainage. \nThese compost-soil blends help establish healthy lawns and gardens. ", + "page_start": 6, + "page_end": 6, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Building Rich and Healthy Soil \nWith Compost \nTo grow healthy plants you need healthy soil. \n\n**Healthy Soil:**\nl \n\nIs teeming with life! Healthy soil is a miniature ecosystem. \nA teaspoon of healthy soil will have upwards of four billion \ntiny organisms which recycle nutrients, suppress disease, and \ndiscourage pests. \n\nl Retains moisture but allows drainage. Healthy soil has \n\nstructure that allows water to drain through, retains moisture, \nand promotes strong root growth. \n\nl Is full of organic nutrients. Plants depend on the micro- \norganisms found in healthy organic-rich soil to provide \nnutrients to their roots, and help them thrive. \n\nA healthy garden and landscape is naturally resistant to pests, \ndrought, weeds, and diseases. Maintaining healthy soil may allow \nyou to reduce use of chemical fertilizers and pesticides. \n\n**Quality Testing at Composting Facilities**\nFeel free to ask your compost provider if they have a quality control \nprogram, and ask for test results. Compost facilities in Washington \nare permitted by the Department of Ecology and must meet \nstandards for both the composting process and contaminants, \nensuring a quality product. Some facilities also participate in the \n“Seal of Testing Assurance” (STA) testing program. See \n“Resources” on page 11 to learn more. \n\n**Soil is a planting medium. Compost is a soil amendment.**\n**Do not place plants directly into 100% compost.**\n**Ask your supplier or see next page for mixes for different uses.**", + "page_start": 5, + "page_end": 5, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Compost improves soil structure and plant \ngrowth by \n\n• Replenishing soil organic matter, and storing \n nutrients in plant-available forms \n\n• Supporting beneficial soil life \n\n• Reducing erosion and water run-off \n\n• Loosening clay soils for better root \n development (increasing soil pore space) \n\n• Retaining moisture in sandy soils so \n plants need less watering. ", + "page_start": 3, + "page_end": 3, + "source_file": "CompostGuide.pdf" + } + ] + }, + { + "references": { + "source_file": "CompostGuide.pdf", + "query": "What are fertilizers ?", + "target_page": 4, + "target_passage": " Fertilizers are concentrated sources of plant nutrients, used in small amounts to supplement natural soil fertility. ", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "The Beauty of Your Lawn and Garden \nBlossoms from the Soil \n\nThank you for your interest in compost. \n\nCompost is a versatile product with many benefits. It enhances \nsoil quality, helps save water, and supports your community’s \nefforts to recycle organic debris. All this helps to conserve our \nnatural resources and reduces the amount of material sent to the \nlandfill. \n\nCompost-amended soil also helps break down pollutants and \nabsorb stormwater runoff. By making nutrients slowly available \nto plants and enhancing plant health, compost can reduce the \nneed for chemical fertilizers and pesticides. All these benefits \nhelp protect our lakes, rivers, and marine waters from pollution \nand excessive runoff. \n\nCompost is a natural amendment for your lawn or garden, and \ncan be used regularly to enrich your soil. This guide is designed \nto help you get the most from the compost that you buy. ", + "page_start": 2, + "page_end": 2, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Comparing Landscape Products \nA variety of soil and landscape products are sold. Here’s a \ncomparison: \n\n**Compost**is stable, decomposed organic matter, excellent for \nimproving soil structure, fertility, moisture holding capacity, and \nplant growth. \n\n**Mulch**is any material applied to the soil surface. Woody mulches \n(high in carbon, low in nitrogen) like wood chips, bark and woody \ncomposts are great for woody plants. Annual plants should be \nmulched with nutrient-balanced mulches like compost, grass \nclippings, or leaves. \n\n**Peat Moss**is partially decayed sphagnum moss from peat bogs. It \nprovides soil porosity, but not the nutrients or biological diversity for \nhealthy soil that compost provides. \n\n**Fertilizers**are concentrated sources of plant nutrients, used in small \namounts to supplement natural soil fertility. \n\n**Topsoil**that is sold is usually not native topsoil. Quality \nmanufactured topsoils are a blend of native sandy sub-soils with \ncomposted organic matter to support soil life. ", + "page_start": 3, + "page_end": 3, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Selecting Quality Compost \nCompost is available in many product types and blends that may be \nused for different gardening applications. The type of feedstock, \nthe composting process, and any supplementary additives determine \nthe end product. \n\nMany facilities offer a variety of blends based on compost, such as \ngarden mix, potting soil, planting mix, mulches, turf top-dressing \nand soil blends. \n\n**What to Look for in Compost**\nFor most compost applications you will want a finished product that \nhas matured and stabilized. Look for material \n l with a dark, crumbly texture \n l with a mild odor \n\nFor most compost applications you will not want compost that is \nextremely dry or wet, or extremely hot. (Note that it is okay for \ncompost to be warm and to give off some steam and mild odor.) ", + "page_start": 5, + "page_end": 5, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Compost improves soil structure and plant \ngrowth by \n\n• Replenishing soil organic matter, and storing \n nutrients in plant-available forms \n\n• Supporting beneficial soil life \n\n• Reducing erosion and water run-off \n\n• Loosening clay soils for better root \n development (increasing soil pore space) \n\n• Retaining moisture in sandy soils so \n plants need less watering. ", + "page_start": 3, + "page_end": 3, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Compost Questions and Answers \n**What is compost?**\nCompost is a natural humus-like soil amendment that results from \nthe controlled aerobic (with oxygen) decomposition of organic \nmaterials. Compost is not soil – it should be mixed with soil. It is \nnot fertilizer, although it contains many slowly released nutrients. \n\n**What materials (“feedstocks”) are used to make compost?**\nCompost facilities in Washington recycle a variety of organic \nmaterials, including yard debris, food scraps, manure, biosolids, \nforest residuals like sawdust and bark, construction wood, and \nagricultural residues. All of these materials can be used to produce \nhigh quality compost. Your supplier can tell you which materials \nthey compost. \n\n**How do I know I’m getting safe, quality compost?**\nFortunately, in Washington we have strict permitting and production \nstandards for compost facilities, that include both time and \ntemperature requirements and contaminant limits. \n\n**What about weed seeds, plant diseases or pesticide residues?**\nThe controlled time, aeration, and temperature process required in \nWashington has been shown to kill weed seeds and plant diseases. \nThat same process breaks down most pesticide residues. There are \na few agricultural pesticides that are not easily broken down, and \npermitted Washington compost manufacturers carefully watch their \nfeedstocks to keep those materials out of the composting process. ", + "page_start": 4, + "page_end": 4, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Compost: A Natural Cycle \nComposting is a natural process in which micro- \norganisms and macro-organisms break down organic \nmaterial (leaves, twigs, grass, etc.) into a dark crum- \nbly soil amendment. Modern compost facilities use \nthe same natural biological composting process. \nTheir controlled-temperature process works faster, \nbreaks down pesticide residues, and also kills weed \nseeds and plant diseases. ", + "page_start": 3, + "page_end": 3, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Building Rich and Healthy Soil \nWith Compost \nTo grow healthy plants you need healthy soil. \n\n**Healthy Soil:**\nl \n\nIs teeming with life! Healthy soil is a miniature ecosystem. \nA teaspoon of healthy soil will have upwards of four billion \ntiny organisms which recycle nutrients, suppress disease, and \ndiscourage pests. \n\nl Retains moisture but allows drainage. Healthy soil has \n\nstructure that allows water to drain through, retains moisture, \nand promotes strong root growth. \n\nl Is full of organic nutrients. Plants depend on the micro- \norganisms found in healthy organic-rich soil to provide \nnutrients to their roots, and help them thrive. \n\nA healthy garden and landscape is naturally resistant to pests, \ndrought, weeds, and diseases. Maintaining healthy soil may allow \nyou to reduce use of chemical fertilizers and pesticides. \n\n**Quality Testing at Composting Facilities**\nFeel free to ask your compost provider if they have a quality control \nprogram, and ask for test results. Compost facilities in Washington \nare permitted by the Department of Ecology and must meet \nstandards for both the composting process and contaminants, \nensuring a quality product. Some facilities also participate in the \n“Seal of Testing Assurance” (STA) testing program. See \n���Resources” on page 11 to learn more. \n\n**Soil is a planting medium. Compost is a soil amendment.**\n**Do not place plants directly into 100% compost.**\n**Ask your supplier or see next page for mixes for different uses.**", + "page_start": 5, + "page_end": 5, + "source_file": "CompostGuide.pdf" + }, + { + "text": "*Compost Works! Soil blending trials conducted in 2008 by the Washington Organic Recycling Council, with funding from the Washington Department of Ecology,*\n*demonstrated that compost improves soil structure (lowers bulk density), nutrient availability (increases cation exchange capacity), moisture holding*\n\n*capacity, and supplies both nutrients that plants need and organic matter that supports soil life. See the 2008 Soil Blending Trial report at*\n\n**www.compostwashington.org.**", + "page_start": 7, + "page_end": 7, + "source_file": "CompostGuide.pdf" + }, + { + "text": "The inputs for DSSAT simulation include daily weather data, soil parameters, crop calendar data and man- \nagement information. All the inputs are formatted at a 0.5° × 0.5° grid resolution which are computed by high- \nperformance computers. Weather data is from the AgMERRA dataset, including maximum and minimum tem- \nperatures, precipitation, total radiation and humidity. Crop calendar data were from the Center for Sustainability \nand Global Environment (SAGE), in which the existing observations of crop planting and harvesting dates are \ngridded formatted at a resolution of 5 min50. For management information, fertilizer applications, irrigation \nand other management practices are required. A crop-specific gridded dataset of nitrogen fertilizer application \nfor the world was developed by integrating national and subnational fertilizer application data from a variety of \nsources, which is used to set up current fertilizer application rates for maize in each grid cell. Soil parameters \nare from the International Soil Profile Dataset (WISE), including soil texture, bulk density, pH, organic carbon \ncontent and fraction of calcium carbonate for each of five 20 cm thick soil layers51. All the soil data is allocated \nto be in accordance with the request of DSSAT simulation; the missing soil parameters for organic soils were \nadopted from FAO soil dataset. ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed9.pdf" + }, + { + "text": "The Composting Process \nEven though there are a variety of composting methods, most \ncomposting follows a similar process: \n\n**1. Grinding Organic Materials:**\nDepending on the facility, the feedstock (material) available, and \nthe desired compost product, different combinations of materials \nare added together and ground into small pieces: \n\n• Nitrogen-rich materials (such as grass, fresh plant \n cuttings, biosolids, and manures) \n• Carbon-rich materials (such as dried leaves, woody \n materials, and straw). \n\n**2. Heating Up:**\nThe material is placed into piles where it begins to heat up from \nthe biological activity of the compost microbes. Typically, com- \npost temperatures are required to reach at least 131 degrees F in a \nspecified time period in order to destroy weed seeds and patho- \ngens. The compost is turned or aerated, allowing the composting \nmicrobes to breathe. After a period of time, the nitrogen-rich \nmaterial is depleted, the biological process slows, and the hot \ncompost begins to cool. \n\n**3. Finishing:**\nTypically “finished” compost has undergone a series of steps to \nensure maturity and stability. The cooling compost is aged, which \nallows the decomposition process to slow down and the finished \ncompost to stabilize. ", + "page_start": 6, + "page_end": 6, + "source_file": "CompostGuide.pdf" + } + ] + }, + { + "references": { + "source_file": "CompostGuide.pdf", + "query": "Explain to me what is peat moss ?", + "target_page": 4, + "target_passage": "Peat Moss is partially decayed sphagnum moss from peat bogs. It provides soil porosity, but not the nutrients or biological diversity for healthy soil that compost provides.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Comparing Landscape Products \nA variety of soil and landscape products are sold. Here’s a \ncomparison: \n\n**Compost**is stable, decomposed organic matter, excellent for \nimproving soil structure, fertility, moisture holding capacity, and \nplant growth. \n\n**Mulch**is any material applied to the soil surface. Woody mulches \n(high in carbon, low in nitrogen) like wood chips, bark and woody \ncomposts are great for woody plants. Annual plants should be \nmulched with nutrient-balanced mulches like compost, grass \nclippings, or leaves. \n\n**Peat Moss**is partially decayed sphagnum moss from peat bogs. It \nprovides soil porosity, but not the nutrients or biological diversity for \nhealthy soil that compost provides. \n\n**Fertilizers**are concentrated sources of plant nutrients, used in small \namounts to supplement natural soil fertility. \n\n**Topsoil**that is sold is usually not native topsoil. Quality \nmanufactured topsoils are a blend of native sandy sub-soils with \ncomposted organic matter to support soil life. ", + "page_start": 3, + "page_end": 3, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Compost Questions and Answers \n**What is compost?**\nCompost is a natural humus-like soil amendment that results from \nthe controlled aerobic (with oxygen) decomposition of organic \nmaterials. Compost is not soil – it should be mixed with soil. It is \nnot fertilizer, although it contains many slowly released nutrients. \n\n**What materials (“feedstocks”) are used to make compost?**\nCompost facilities in Washington recycle a variety of organic \nmaterials, including yard debris, food scraps, manure, biosolids, \nforest residuals like sawdust and bark, construction wood, and \nagricultural residues. All of these materials can be used to produce \nhigh quality compost. Your supplier can tell you which materials \nthey compost. \n\n**How do I know I’m getting safe, quality compost?**\nFortunately, in Washington we have strict permitting and production \nstandards for compost facilities, that include both time and \ntemperature requirements and contaminant limits. \n\n**What about weed seeds, plant diseases or pesticide residues?**\nThe controlled time, aeration, and temperature process required in \nWashington has been shown to kill weed seeds and plant diseases. \nThat same process breaks down most pesticide residues. There are \na few agricultural pesticides that are not easily broken down, and \npermitted Washington compost manufacturers carefully watch their \nfeedstocks to keep those materials out of the composting process. ", + "page_start": 4, + "page_end": 4, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Compost: A Natural Cycle \nComposting is a natural process in which micro- \norganisms and macro-organisms break down organic \nmaterial (leaves, twigs, grass, etc.) into a dark crum- \nbly soil amendment. Modern compost facilities use \nthe same natural biological composting process. \nTheir controlled-temperature process works faster, \nbreaks down pesticide residues, and also kills weed \nseeds and plant diseases. ", + "page_start": 3, + "page_end": 3, + "source_file": "CompostGuide.pdf" + }, + { + "text": "The Beauty of Your Lawn and Garden \nBlossoms from the Soil \n\nThank you for your interest in compost. \n\nCompost is a versatile product with many benefits. It enhances \nsoil quality, helps save water, and supports your community’s \nefforts to recycle organic debris. All this helps to conserve our \nnatural resources and reduces the amount of material sent to the \nlandfill. \n\nCompost-amended soil also helps break down pollutants and \nabsorb stormwater runoff. By making nutrients slowly available \nto plants and enhancing plant health, compost can reduce the \nneed for chemical fertilizers and pesticides. All these benefits \nhelp protect our lakes, rivers, and marine waters from pollution \nand excessive runoff. \n\nCompost is a natural amendment for your lawn or garden, and \ncan be used regularly to enrich your soil. This guide is designed \nto help you get the most from the compost that you buy. ", + "page_start": 2, + "page_end": 2, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Building Rich and Healthy Soil \nWith Compost \nTo grow healthy plants you need healthy soil. \n\n**Healthy Soil:**\nl \n\nIs teeming with life! Healthy soil is a miniature ecosystem. \nA teaspoon of healthy soil will have upwards of four billion \ntiny organisms which recycle nutrients, suppress disease, and \ndiscourage pests. \n\nl Retains moisture but allows drainage. Healthy soil has \n\nstructure that allows water to drain through, retains moisture, \nand promotes strong root growth. \n\nl Is full of organic nutrients. Plants depend on the micro- \norganisms found in healthy organic-rich soil to provide \nnutrients to their roots, and help them thrive. \n\nA healthy garden and landscape is naturally resistant to pests, \ndrought, weeds, and diseases. Maintaining healthy soil may allow \nyou to reduce use of chemical fertilizers and pesticides. \n\n**Quality Testing at Composting Facilities**\nFeel free to ask your compost provider if they have a quality control \nprogram, and ask for test results. Compost facilities in Washington \nare permitted by the Department of Ecology and must meet \nstandards for both the composting process and contaminants, \nensuring a quality product. Some facilities also participate in the \n“Seal of Testing Assurance” (STA) testing program. See \n“Resources” on page 11 to learn more. \n\n**Soil is a planting medium. Compost is a soil amendment.**\n**Do not place plants directly into 100% compost.**\n**Ask your supplier or see next page for mixes for different uses.**", + "page_start": 5, + "page_end": 5, + "source_file": "CompostGuide.pdf" + }, + { + "text": "A project of the Washington Organic Recycling Council, with \nsupport from the Washington State Department of Ecology’s \nPublic Participation Grant program. \n\nThis product was partly funded through a grant from the \nWashington Department of Ecology. While these materials \nwere reviewed for grant consistency, this does not necessarily \nconstitute endorsement by the department. \n\n**Special thanks:**the original version of this brochure in 2003 \nwas created by the Washington County, Oregon Solid Waste and \nRecycling Program in cooperation with the Washington Organic \nRecycling Council and the Composting Council of Oregon. ", + "page_start": 1, + "page_end": 1, + "source_file": "CompostGuide.pdf" + }, + { + "text": "Ask Your Compost Supplier \n\n**Whether you’re buying direct from the composting facility, or from a local**\n**vendor, here are some good questions to ask:**\n\n**• What ingredients go into your compost?**\n**• What compost products or blends do you sell?**\n**• Are there quality control or testing results available for these**\n**products? (These may be on the manufacturer’s website.)**\n\n**• Which product is best for my intended use?**\n**• What application rate do you recommend?**\n**• How much do I need for my area? (Or see pages 4-6.)**", + "page_start": 3, + "page_end": 3, + "source_file": "CompostGuide.pdf" + }, + { + "text": "\nExplanations as to what things mean are presented like this. ", + "page_start": 5, + "page_end": 5, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "5.1.3. Discourse Structure \n\nIn the discourse surrounding #climatechange, “environment”, “energy”, and “global action” \nrepresented the themes of the three largest clusters in the network. However, three popularly recurring \nhashtags, “#environment”, “#energy”, and “#climateaction”, did not belong to any of the three clusters \nabove, but formed another small tight cluster together, sitting in the most central part of the semantic \nnetwork, as shown in Figure 2b. As each of the three hashtags can almost represent one sub-theme of \nthe climate change topic and these three hashtags were tightly bundled might indicate an attempt by \n#climatechange users to address all three communities together [91], consolidating climate change as \na topic rather than a loosely organized topic. Previous communication studies also confirmed hashtags’ \nfunction of serving as a hybrid forum [68], where heterogeneous individuals coordinate to solve ", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed10.pdf" + }, + { + "text": "Selecting Quality Compost \nCompost is available in many product types and blends that may be \nused for different gardening applications. The type of feedstock, \nthe composting process, and any supplementary additives determine \nthe end product. \n\nMany facilities offer a variety of blends based on compost, such as \ngarden mix, potting soil, planting mix, mulches, turf top-dressing \nand soil blends. \n\n**What to Look for in Compost**\nFor most compost applications you will want a finished product that \nhas matured and stabilized. Look for material \n l with a dark, crumbly texture \n l with a mild odor \n\nFor most compost applications you will not want compost that is \nextremely dry or wet, or extremely hot. (Note that it is okay for \ncompost to be warm and to give off some steam and mild odor.) ", + "page_start": 5, + "page_end": 5, + "source_file": "CompostGuide.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv3.pdf", + "query": "How encourage temporally adjacent representations to be predictive of each other ?", + "target_page": 2, + "target_passage": "One way to encourage temporally adjacent representations to be predictive of each other is to ensure that they vary slowly over time. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Slow Features. One way to encourage temporally \nadjacent representations to be predictive of each other \nis to ensure that they vary slowly over time. Early \nworks targeting predictive features encouraged represen- \ntations of individual video frames to be locally tempo- \nrally invariant, while preventing representation collapse \nby using spectral methods, as in SFA (Wiskott and Se- \njnowski, 2002), SSA (Kayser et al., 2001), and Simulated \nFixations (Zou et al., 2012). More recently, Goroshin \net al. (2015); Wang et al. (2010) train a siamese con- \nvolutional network to map the representations of two \nsubsequent frames to the same point, while encouraging \ndistant frames to have diverse representations via a pair- \nwise margin loss and a triplet loss, respectively. Other \nworks (Oord et al., 2018; Surís et al., 2021; Feichtenhofer \net al., 2021) implement temporal invariance using noise- \ncontrastive estimation (Gutmann and Hyvärinen, 2012). \nOur exploration in this paper goes beyond temporal in- ", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv3.pdf" + }, + { + "text": "1 Introduction \n\n1 \nv \n1 \n7 \n4 \n8 \n0 \n. \n4 \n0 \n4 \n2 \n: \nv \ni \nX \nr \na \nHumans possess the remarkable ability to map low-level \nsignals originating from the retina into a semantic spatio- \ntemporal understanding of the world; synthesizing no- \ntions such as objects and global motion (Spelke et al., \n1995). A long-standing goal of the machine learning \ncommunity is to identify the principles or objectives that \nmay guide such unsupervised learning in humans (Field, \n1994; Berkes and Wiskott, 2005; Hinton, 1989). One \nrelated hypothesis is based on the predictive feature \nprinciple (Rao and Ballard, 1999), which posits that \nrepresentations of temporally adjacent sensory stimuli \nshould be predictive of each other. \n\nIn this work, we revisit feature prediction as a stand- \nalone objective for unsupervised learning of visual repre- \nsentations from video. Numerous advances in the field — \nsuch as the standard use of transformer architectures in \nvision (Dosovitskiy et al., 2020), the maturing of masked \nautoencoding frameworks (Xie et al., 2021; Bao et al., \n2021; He et al., 2021), query-based feature pooling (Chen \net al., 2022), joint-embedding predictive architectures \n(JEPA) (LeCun, 2022; Assran et al., 2023; Baevski et al., \n2022b), and larger datasets — form a unique arsenal of \ntools, which we integrate in a modern and conceptually \nsimple method, the video joint-embedding predictive ar- \nchitecture or V-JEPA, which is based solely on feature \nprediction, without using pretrained image encoders, \ntext, negative examples, human annotations, or pixel- ", + "page_start": 0, + "page_end": 0, + "source_file": "arxiv3.pdf" + }, + { + "text": "46. Xia, R.; Zhang, Y.; Liu, X.; Yang, B. A survey of sum–product networks structural learning. Neural Netw.**2023**, 164, 645–666. \n\n47. \n\n48. \n\n49. \n\n50. \n\n51. \n52. Tu, S. The Dirichlet-Multinomial and Dirichlet-Categorical Models for Bayesian Inference. 2014. Available online: https: \n\n//people.csail.mit.edu/stephentu/writeups/dirichlet-conjugate-prior.pdf (accessed on 21 June 2024). \nSmith, R.; Badcock, P.; Friston, K.J. Recent advances in the application of predictive coding and active inference models within \nclinical neuroscience. Psychiatry Clin. Neurosci.**2021**, 75, 3–13. [CrossRef] \n\n53. \n\n54. Deacon, R.M.J.; Rawlins, J.N.P. T-maze alternation in the rodent. Nat. Protoc.**2006**, 1, 7–12. [CrossRef] \n55. Lin, M.H.; Liran, O.; Bauer, N.; Baker, T.E. Power dynamics of theta oscillations during goal-directed navigation in freely moving \n\nhumans: A mobile EEG-virtual reality T-maze study. bioRxiv**2021**, bioRxiv:2021.10.05.463245. [CrossRef] ", + "page_start": 31, + "page_end": 31, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "Figure 1. A schematic illustration of a hierarchical active inference model. This model links (exteroceptive, interoceptive, and proprioceptive) \nsensations at lower levels with multimodal models of hidden bodily states, such as fatigue and hunger, at intermediate levels, and finally with \ntemporally extended, integrative models of the embodied self at the higher hierarchical level. In this schematic, following predictive coding (Rao and \nBallard 1999, Friston 2005), black and red circles represent neural units that encode predictions and prediction errors, respectively. The levels are \nreciprocally connected, so predictions are propagated from the top-down (black edges) and prediction errors from the bottom-up (red edges). Finally, \nthe pink triangles indicate a mechanism of precision gating (or gain control) of prediction error units, which determines their relative influence on \nunits encoding predictions. At a neurobiological level, prediction and prediction error units could be mapped to deep and superficial pyramidal cells in \ncortical hierarchies, whereas expected precision could be linked to neuromodulatory input. The elements of the generative model shown do not need \nto map one-to-one to specific brain areas or networks but are plausibly distributed across many of them. However, as a first approximation, the lower \nand intermediate layers of the generative model could be linked to brain networks that process unimodal information (e.g. sensory cortices for \nexteroceptive information) and multimodal association areas, respectively. The highest level of the generative model could be linked to brain networks \nthat process information about the self, such as the insular cortex, the anterior cingulate cortex, and the medial prefrontal cortex. See Parr et al. \n(2022) for details about hierarchical generative models supporting adaptive regulation and allostasis and Barrett and Simmons (2015) for their \nputative neuronal underpinnings. See online article for colored version of this figure. ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed1.pdf" + }, + { + "text": "Ashish Vaswani, Noam M. Shazeer, Niki Parmar, Jakob \nUszkoreit, Llion Jones, Aidan N. Gomez, Lukasz \nKaiser, and Illia Polosukhin. 2017. Attention is all \nyou need. In Neural Information Processing Systems. ", + "page_start": 10, + "page_end": 10, + "source_file": "arxiv4.pdf" + }, + { + "text": "Predictive Features. Going beyond local invariance, \na family of works trains a predictor network to map the \nrepresentation of a frame or clip at one time-step to a \ndistinct representation at another time-step. Srivastava \net al. (2015); Vondrick et al. (2016); Wang et al. (2023b) \ntrain such a video feature predictor network on top of \na frozen pretrained image or video encoder. Unfreezing \nthe target feature extractor, several methods train the \nvideo encoder and the predictor network simultaneously, \nwhile preventing collapse by using a supervised action \nforecasting loss (Girdhar and Grauman, 2021), or by \nusing the representations of distant clips as negative \nsamples in a contrastive loss (Han et al., 2019, 2020; \nTan et al., 2023), often focusing on small convolutional \nencoders (Han et al., 2019, 2020). The idea of learning a \nrepresentation by predicting missing information in fea- \nture space is also core to the joint-embedding predictive \narchitecture (JEPA) (LeCun, 2022), which combines a \nsiamese encoder with a predictor network. JEPAs have \nbeen successfully instantiated in several modalities, such \nas with audio data (Baevski et al., 2022b) and image \ndata (Zhou et al., 2021; Oquab et al., 2023; Assran et al., \n2023). In this work, we extend this paradigm to video \ndata by leveraging recent advances in self-supervised \nlearning. ", + "page_start": 1, + "page_end": 1, + "source_file": "arxiv3.pdf" + }, + { + "text": "Laura Sevilla-Lara, Shengxin Zha, Zhicheng Yan, Vedanuj \nGoswami, Matt Feiszli, and Lorenzo Torresani. Only time \ncan tell: Discovering temporal data for temporal modeling. \nIn Proceedings of the IEEE/CVF winter conference on \napplications of computer vision, pages 535–544, 2021. \nFei Wang, Ping Li, and Arnd Christian Konig. Learning \nIn 2010 IEEE \na bi-stochastic data similarity matrix. \nInternational Conference on Data Mining, pages 551–560. \nIEEE, 2010. \n\nElizabeth S Spelke, Peter Vishton, and Claes Von Hofsten. \nObject perception, object-directed action, and physical \nknowledge in infancy. 1995. \n\nLimin Wang, Bingkun Huang, Zhiyu Zhao, Zhan Tong, Yinan \nHe, Yi Wang, Yali Wang, and Yu Qiao. Videomae v2: \nScaling video masked autoencoders with dual masking. In \nProceedings of the IEEE/CVF Conference on Computer \nVision and Pattern Recognition, pages 14549–14560, 2023a. \n\nNitish Srivastava, Elman Mansimov, and Ruslan Salakhudi- \nnov. Unsupervised learning of video representations using \nlstms. In International conference on machine learning, \npages 843–852. PMLR, 2015. ", + "page_start": 12, + "page_end": 12, + "source_file": "arxiv3.pdf" + }, + { + "text": "Alexei Baevski, Wei-Ning Hsu, Qiantong Xu, Arun Babu, \nJiatao Gu, and Michael Auli. Data2vec: A general frame- \nwork for self-supervised learning in speech, vision and \nlanguage. arXiv preprint arXiv:2202.03555, 2022b. \n\nDavid J Field. What is the goal of sensory coding? Neural \ncomputation, 6(4):559–601, 1994. \n\nSpyros Gidaris, Andrei Bursuc, Nikos Komodakis, Patrick \nPérez, and Matthieu Cord. Learning representations by \npredicting bags of visual words. \nIn Proceedings of the \nIEEE/CVF Conference on Computer Vision and Pattern \nRecognition, pages 6928–6938, 2020. \n\nHangbo Bao, Li Dong, and Furu Wei. Beit: Bert pre-training \nof image transformers. arXiv preprint arXiv:2106.08254, \n2021. \n\nPietro Berkes and Laurenz Wiskott. Slow feature analysis \nyields a rich repertoire of complex cell properties. Journal \nof vision, 5(6):9–9, 2005. ", + "page_start": 10, + "page_end": 10, + "source_file": "arxiv3.pdf" + }, + { + "text": "2.2. Network Model for Cognition \n\nDifferent framework choices may create even more differences than have already been noticed. \nPsychologists think that human beings are a collection of learned associations [33], and associative \nresponse rather than simply linear logic form the structural basis of thought [34]. Associative \nlearning [35] is a long-standing assumption underlying cognitive science [14], suggesting that human \ncognition toward the world forms a network pattern, where the world is organized into several groups \nof related items and stored in a network model in the mind. When messages are processed by humans, \nthey are first encoded into a temporary memory network and then linked to an existing associative \nmemory network for long-term storage [36]. In the network, a node represents a certain concept, \nand edges refers to particular relationships, such as time sequences [37], similarity [38], semantic \nconnections [37], or cause and effect [33] between two nodes. \n\nWhen individuals search their memory for a particular piece of a message in their mind, \nthe targeted node becomes salient and activated in the temporary memory [39]. If two messages \nare always activated simultaneously, their connection tends to be more robust and the messages are \nregarded as associated [36]. If a link is recorded between two concepts, activations are likely to spread \nthrough the link from one concept to another with or without conscious awareness [40]. Whereas \nassociations of nodes in the mind may not necessarily reflect the actual relationships of objects, in reality, \nseveral factors, including media usage, personal experience, and political stance [34,41,42], may help \nbundle different sets of concepts. ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed10.pdf" + }, + { + "text": "[CrossRef] [PubMed] \nFriston, K.J.; Da Costa, L.; Tschantz, A.; Kiefer, A.; Salvatori, T.; Neacsu, V.; Koudahl, M.; Heins, C.; Sajid, N.; Markovic, D.; et al. \nSupervised structure learning. arXiv**2023**, arXiv:2311.10300. [CrossRef] [PubMed] \nSerrano, S.A.; Santiago, E.; Martinez-Carranza, J.; Morales, E.F.; Sucar, L.E. Knowledge-Based Hierarchical POMDPs for Task \nPlanning. J. Intell. Robot. Syst.**2021**, 101, 82. [CrossRef] \nFriston, K.J.; Rosch, R.; Parr, T.; Price, C.; Bowman, H. Deep temporal models and active inference. Neurosci. Biobehav. Rev.**2017**, \n77, 388–402. [CrossRef] [PubMed] \nFriston, K.; Mattout, J.; Trujillo-Barreto, N.; Ashburner, J.; Penny, W. Variational free energy and the Laplace approximation. \nNeuroImage**2007**, 34, 220–234. [CrossRef] [PubMed] \nFriston, K.J. Variational filtering. NeuroImage**2008**, 41, 747–766. [CrossRef] ", + "page_start": 31, + "page_end": 31, + "source_file": "pubmed7_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv3.pdf", + "query": "What does mean the JEPA acronym ?", + "target_page": 3, + "target_passage": " joint-embedding predictive architecture (JEPA)", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Table 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation \nwith an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models \nare evaluated at resolution 224, except I-JEPA512 and V-JEPA384 which are evaluated respectively at resolution 512 and \n384. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views \nfrom the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. \nCompared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on \ntasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks \nrequiring static appearance-based features. ", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "Comparison with video models. Compared to \nlarge-scale video baselines, the V-JEPA models outper- \nform all previous models on every downstream video \nThe V-JEPA models narrow the gap with image models \non image classification tasks. \nIn particular, V-JEPA \nachieves a score of 77.4% on ImageNet using a one- \n\n8 ", + "page_start": 7, + "page_end": 7, + "source_file": "arxiv3.pdf" + }, + { + "text": "Information about IAM policies may come at you fast. If it gets to be too much, put it in**PARC**: \n\n•**P**rincipal: entity that is allowed or denied access \n\n•**A**ction: type of access that is allowed or denied \n\n•**R**esource: AWS resources the action will act upon \n\n•**C**ondition: conditions for which the access is valid ", + "page_start": 40, + "page_end": 40, + "source_file": "serverless-core.pdf" + }, + { + "text": "(b) Visualizations. First Row: Masked videos used as input to the V-JEPA models (a pretrained ViT-H/16 encoder and its \ncorresponding predictor network). Other rows: Bounding boxes contain various samples from the decoder overlayed on the \noriginal video. V-JEPA is not a generative model and the decoder does not have access to the context (first row), so we do \nnot expect samples to exactly match the input. This experiment qualitatively illustrates what information is encoded and \npredicted by V-JEPA. In particular, characteristics that are common across samples represent information that is encoded in \nthe V-JEPA predictions. V-JEPA generates predictions that are spatially and temporally coherent with unmask region of the \nvideo. The predictions also capture consistent motion through time. \n\nFigure 6 Qualitative Analysis. Offline visualizations of the V-JEPA feature-space predictions. ", + "page_start": 9, + "page_end": 9, + "source_file": "arxiv3.pdf" + }, + { + "text": "C Pretraining details \n\nIn section, we report V-JEPA pretraining details. Table 8 summarizes the main hyperparameters used during \npretraining. \n\nArchitectures. We use Vision Transformer (Dosovitskiy et al., 2020) (ViT) architectures for the x-encoder and \ny-encoder. We train three V-JEPA encoders: a ViT-L/16224, a ViT-H/16224 and a ViT-H/16384. All three encoders \ntake as input a short video clip of 16 frames with a temporal stride of 4 between consecutive frames. The subscripts, \n224 and 384, indicate the spatial resolution of the video clip. V-JEPA flattens the video clip into a sequence of \n2 (see Figure 7). For all three models, the predictor is \nnon-overlapping spatio-temporal patches of size 16 \n× \ndesigned as a narrow ViT architecture, consisting of 12 transformer blocks with an embedding dimension of 384. For \nsimplicity, we keep the number of self-attention heads in the predictor equal to that of the backbone used for the \ncontext-encoder/target-encoder. V-JEPA is pretrained without using a [cls] token. \n\n16 \n× ", + "page_start": 16, + "page_end": 16, + "source_file": "arxiv3.pdf" + }, + { + "text": "Table 7 Low-Shot Frozen Evaluation. Comparing V-JEPA to other video models in frozen evaluation on Kinetics-400 and \nSomething-Something-v2 as we vary the percentage of labeled examples from each dataset available for training the attentive \nprobe. We train the probes in several low-shot settings: using either 5% of the train set, 10%, or 50%, and take 3 random \nsplits in each setting to obtain more robust metrics, resulting in 9 different evaluation experiments for each model. We report \nthe mean performances and standard deviation using the K400 and SSv2 validation sets. V-JEPA is more label-efficient than \nother models; specifically, decreasing the available number of labeled examples from each class increases the performance gap \nbetween V-JEPA and the baselines. ", + "page_start": 8, + "page_end": 8, + "source_file": "arxiv3.pdf" + }, + { + "text": "a nd look as f ine as Japa nese women. \na nd look as f ine as Japa nese women. \n\nf a m i l y m e m b e r s , f r o m c h i l d r e n t o \nf a m i l y m e m b e r s , f r o m c h i l d r e n t o Therefore, we need to encourage the \nTherefore, we need to encourage the \n\nelders, remain in place. The children \nelders, remain in place. The children participation of more women in society; \nparticipation of more women in society; \n\nwho wil l be the next generation must \nwho wil l be the next generation must we need to get more women i nto t he \nwe need to get more women i nto t he \n\n— A s h r i n k i n g , a g i n g p o p u l a t i o n : \n— A s h r i n k i n g , a g i n g p o p u l a t i o n : be raised to have hope in their hearts. \nbe raised to have hope in their hearts. ", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**Principals**\n\nIAM implements*authentication*, proving who an entity claims to be, with*principals,*which are \n\nentities such as IAM users, federated users from Google, Facebook, etc, IAM roles, AWS accounts, \nand AWS services. ", + "page_start": 42, + "page_end": 42, + "source_file": "serverless-core.pdf" + }, + { + "text": "Table 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), Video- \nMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using \na ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, \niNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. \nAll models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from \nseveral spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream \ntasks, except ImageNet, where the model achieves 74.8% compared to 75.1% of an OmniMAE model trained directly on \nImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on \nSSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining. ", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "t understand. We \nso the other side doesn’t understand. We \nso the other side doesn A problem not on ly for Japa n but the \nA problem not on ly for Japa n but the \n\n**Initiatives as**\n**a global player and**\n**part of the Asian family**\n**of nations**\n\nmust listen carefully to each other and \nmust listen carefully to each other and whole world — — \nwhole world \n\n**M i y a t a**: A s I s a i d , b e f o r e t h e \n: A s I s a i d , b e f o r e t h e express ourselves clearly. This is true for \nexpress ourselves clearly. This is true for \n\nboth individuals and companies. \nboth individuals and companies. ea r t hqua ke a nd t su na m i, a sense of \nea r t hqua ke a nd t su na m i, a sense of \n\nJapan enjoys a high degree of trust, not \nJapan enjoys a high degree of trust, not stagnation was spreading throughout \nstagnation was spreading throughout \n\nonly in Asia but also in the world. It has an \nonly in Asia but also in the world. It has an Japa nese societ y. Young people were \nJapa nese societ y. Young people were ", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_SMFG_2011.pdf" + } + ] + }, + { + "references": { + "source_file": "arxiv3.pdf", + "query": "What is the average performance of the ViT-L/16 architecture on the K710 dataset with 700k samples ?", + "target_page": 5, + "target_passage": "70.9", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "In Table 15, we evaluate V-JEPA using finetuning (separately) on K400 and SSv2. We compare V-JEPA with \nVideoMAEv2 (Wang et al., 2023a), VideoMAE (Tong et al., 2022) and MVD (Wang et al., 2023b) using a ViT-L/16 \nor a ViT-H/16 architecture. V-JEPA obtains competitive performance using a finetuning protocol. With a ViTiH/16 \narchitecture, V-JEPA outperforms by 1.2% VideoMAE and +0.3% VideoMAEv2 on the SSv2 dataset, while obtaining \ncomparable performance on K400. V-JEPA also obtains performance similar to MVD on the SSv2 dataset. The \nMVD model achieves the best performance across models on the K400 dataset, and is trained using the image \ndataset ImageNet1K, in contrast to the other methods in the table, which only use video data. Additionally MVD \nrequires the processing of significantly more samples during pretraining due to the cost of training the teacher \nencoder networks in a pre-pre-training step. ", + "page_start": 20, + "page_end": 20, + "source_file": "arxiv3.pdf" + }, + { + "text": "Figure 4 SSv2 fine-tuning performance vs. Samples Seen. We \nreport SSv2 fine-tuning for V-JEPA and pixel-reconstruction \nbaselines using a ViT-L/16 or Hiera-L architecture. V-JEPA \noutperforms all pixel-reconstruction methods using a ViT- \nL/16 and matches the Hiera-L performance while seeing \nsignificantly less samples during pretraining. \n\nFigure 5 SSv2 frozen-evaluation performance vs. Pretraining \nTime. Wallclock times for all methods are measured on a \nsingle GPU with a batch size of 10 clips, using the official \ncodebases for VideoMAE and VideoMAEv2, and linearly \nextrapolated assuming a global batch size of 2400 samples. \nHowever, note that the SSv2 accuracies of video pixel pre- \ndiction methods are actually obtained with small batch sizes \nand significantly longer training schedules. V-JEPA out- \nperforms pixel-reconstruction methods while training signifi- \ncantly faster. ageNet; hence, V-JEPA achieves comparable ImageNet \nperformance despite only pretraining on video. ", + "page_start": 7, + "page_end": 7, + "source_file": "arxiv3.pdf" + }, + { + "text": "Table 5 Comparison with Pixel Prediction Methods. We compare V-JEPA with OmniMAE (Girdhar et al., 2023), Video- \nMAE (Tong et al., 2022), and Hiera (Ryali et al., 2023), which leverage a pixel-reconstruction loss. All models are trained using \na ViT-L architecture or a comparable Hiera-L. We evaluate the approaches on downstream image tasks (IN1K, Places205, \niNat201) and video tasks (K400, SSv2, AVA) in both frozen evaluation (with a frozen backbone), and end-to-end fine-tuning. \nAll models are evaluated at resolution 224. On K400 and SSv2 we follow the standard practice of reporting accuracy from \nseveral spatial and temporal views from the video. In frozen evaluation, V-JEPA outperforms the baselines on all downstream \ntasks, except ImageNet, where the model achieves 74.8% compared to 75.1% of an OmniMAE model trained directly on \nImageNet. V-JEPA also achieves the best fine-tuning performance amongs all ViT-L models and matches the Hiera-L on \nSSv2. The V-JEPA results are achieved while processing significantly fewer examples during pretraining. ", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "Optimization. We use AdamW (Loshchilov and Hutter, 2017) to optimize the x-encoder and predictor weights. \nThe ViT-L/16224 and ViT-H/16224 models use a batch size of 3072 while the ViT-H/16384 uses a batch size of \n2400. Models are trained for a total of 90,000 iterations. The learning rate is linearly increased from 2 \n10−4 \n10−4 during the first 12, 000 iterations of pretraining, and decayed to 10−6 following a cosine schedule. \nto 6.25 \n× \n× \n\n17 ", + "page_start": 16, + "page_end": 16, + "source_file": "arxiv3.pdf" + }, + { + "text": "Table 14 Temporal Coverage on Kinetics-400. We evaluate the effect of temporal coverage on K400. We train an attentive \nprobe on K400 using either 1 clip (≈ 2 seconds of a video) or 8 clips (≈ 16 seconds of a video). To sample N clips, we first \ndivide a video in N equal-length temporal segments and sample one clip at random per segment. The video encoder processes \neach clip in parallel and all the encoder output tokens are concatenated at the input of the attentive probe. Increasing the \ntemporal coverage from 1 clip per video to 8 clips significantly improves the performance for both our VideoMAE baseline \nand V-JEPA. \n\nMethod \nVideoMAE ViT-L/16 \nViT-L/16 \nV-JEPA \n\nArch. 1 Clip 8 Clips \n\n69.4 \n73.7 77.8 \n80.9 \n\nTable 15 Finetuning results. We evaluate a V-JEPA model with the finetuning protocol on the K400 and SSv2 datasets \nusing 16 frames per clip and multi-view fusion (5×3 or 2×3) for inference. The #Samples Seen entry corresponds to the \nnumber of video clips processed during pretraining, which is larger than the size of the pretraining dataset for multi-epoch \ntraining. We compare V-JEPA with different video self-supervised learning approaches. We report the VideoMAEv2 results \nwithout instruction-turning for consistency with the other approaches. V-JEPA obtains competitive performance using the \nfinetuning protocol. ", + "page_start": 21, + "page_end": 21, + "source_file": "arxiv3.pdf" + }, + { + "text": "Pretraining. We combine several public datasets to \nconstruct an unsupervised video pretraining dataset, \nwhich we refer to as VideoMix2M. Specifically, we com- \nbine the videos from HowTo100M (HT) (Miech et al., \n2019), Kinetics-400/600/700 (K710) (Kay et al., 2017), \nand Something-Something-v2 (SSv2) (Goyal et al., 2017), \nand remove any overlap with the validation sets of \nKinetics-400/600/700 and Something-Something-v2, re- \nsulting in approximately 2 million videos. We train a \nViT-L/16, a ViT-H/16, and a ViT-H/16384 transformer \nmodel on VideoMix2M. We use a batch size of 3072 for \nthe ViT-L/16 and ViT-H/16 models, and a batch size \nof 2400 for the ViT-H/16384 model. Each model takes \nas input a video clip of 16 frames sampled with a frame- \nskip of 4, corresponding to roughly 3 second clips on \naverage. The ViT-L/16 and ViT-H/16 process the video \nat a spatial resolution of 224, while the ViT-H/16384 \nuses an input resolution of 384; cf. Appendix C. ", + "page_start": 3, + "page_end": 3, + "source_file": "arxiv3.pdf" + }, + { + "text": "Table 6 Comparison with State-of-the-Art Models. We compare V-JEPA with state-of-the-art baselines in frozen evaluation \nwith an attentive probe on downstream image tasks (IN1K, Place205, iNat21) and video tasks (K400, SSv2, AVA). All models \nare evaluated at resolution 224, except I-JEPA512 and V-JEPA384 which are evaluated respectively at resolution 512 and \n384. On K400 and SSv2 we follow the standard practice of reporting accuracy from several spatial and temporal views \nfrom the video. Compared to other video baselines, V-JEPA exhibits a consistent improvement across all downstream tasks. \nCompared to image-models that excel under the frozen evaluation, V-JEPA shows a significant performance improvement on \ntasks requiring motion understanding (+21 points on SSv2), and reduces the gap between video and image models on tasks \nrequiring static appearance-based features. ", + "page_start": 6, + "page_end": 6, + "source_file": "arxiv3.pdf" + }, + { + "text": "**Limitations**\nThere were several limitations to the study that were primarily driven from constraints of \n\ninfrastructure, as well as regulations, legal governance, and labor requirements. At the study location, \n\nthe data were required to remain on premise at all times and the infrastructure that was provided \n\nhad a GPU limitation of 24 GB. Given these infrastructure restrictions, the best open-source model \n\navailable during the study was LLM 2. Furthermore, we were not able to demonstrate the comparable \ndifference between our fine-tuned LLM 2 model and third party LLMs32,55 because of the study \nlocation’s restrictions and concerns with the data retention policies. Nevertheless, our study \n\ndemonstrates the potential capability of integrating state-of-the-art open source LLMs at \n\norganizations that are less open to integrating third-party LLMs. \n\nWhile the dataset was smaller, we made significant efforts to reduce model variance and \n\nprevent overfitting by allocating more data to the training cohort and using k-fold cross validation. \n\nAnd while our ratio split choice implies the testing results will have slightly greater variance than \n\nexpected, this is mitigated through the extensive manual clinical assessment that was performed. \n\nThe study’s multidimensional clinical evaluation was labor intensive, requiring more than 200 hours ", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed8.pdf" + }, + { + "text": "C Pretraining details \n\nIn section, we report V-JEPA pretraining details. Table 8 summarizes the main hyperparameters used during \npretraining. \n\nArchitectures. We use Vision Transformer (Dosovitskiy et al., 2020) (ViT) architectures for the x-encoder and \ny-encoder. We train three V-JEPA encoders: a ViT-L/16224, a ViT-H/16224 and a ViT-H/16384. All three encoders \ntake as input a short video clip of 16 frames with a temporal stride of 4 between consecutive frames. The subscripts, \n224 and 384, indicate the spatial resolution of the video clip. V-JEPA flattens the video clip into a sequence of \n2 (see Figure 7). For all three models, the predictor is \nnon-overlapping spatio-temporal patches of size 16 \n× \ndesigned as a narrow ViT architecture, consisting of 12 transformer blocks with an embedding dimension of 384. For \nsimplicity, we keep the number of self-attention heads in the predictor equal to that of the backbone used for the \ncontext-encoder/target-encoder. V-JEPA is pretrained without using a [cls] token. \n\n16 \n× ", + "page_start": 16, + "page_end": 16, + "source_file": "arxiv3.pdf" + }, + { + "text": "(a) (b) \n\nFigure 8 Masking Strategy Ablation. Evaluating a linear probe on a ViT-B/16 pretrained with V-JEPA on K400 under \nvarious 3D Multi-Block masking settings. We examine the impact of (a) sampling several masks per video, (b) varying the \nnumber of blocks in a mask, and (c) varying the average spatial and temporal masking ratio. A temporal masking ratio of \n100% extends the spatial mask across all the frames in the clip. We find it important to maintain a high spatial and temporal \nmasking ratio during pretraining. ", + "page_start": 22, + "page_end": 22, + "source_file": "arxiv3.pdf" + } + ] + }, + { + "references": { + "source_file": "PLAW-116publ30.pdf", + "query": "What is appropriate authority ?", + "target_page": 1, + "target_passage": "APPROPRIATE AUTHORITY.—The term ‘appropriate authority’ means the head of a Federal agency, the Architect of the Capitol, or other official authority responsible for the operation of a public building. ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "In a system design with decentralized control, different users are granted different levels of \nadministrative authority. For example, you might have users that have the authority to create \nusers and groups. Other users might have the authority to create application groups and \nfolders, and others might be given full system administration authority. ", + "page_start": 89, + "page_end": 89, + "source_file": "sg246915.pdf" + }, + { + "text": "**3.2 User and group administration**\n\nWhen you design a Content Manager OnDemand system, you must determine the best way \nto implement the many authority structures that are available for users and administrators of \nyour system. The span of control for the administration of the system must be considered with \nthe level of user access to the data that is stored in the system. How many different \nadministrators are required? Will all administrators have system administrator authority or will \ndifferent administrators have different levels of authority? What is the most effective way to \nrestrict a user’s access to only the data that is necessary to do that user’s job? \n\nThe answers to these questions depend on the size of the system, the degree of \ncentralization to be exercised over system administration, and the nature of the data and the \nbusiness needs of the users. \n\n**Centralized or decentralized**\nIn a system design that exercises centralized control, one or a few administrators are granted \nsystem administrator authority. A centralized system typically is used when the number of \nreports and users to be added to the system is small. Centralized administration is also \nappropriate where resources are limited and only one person might have the skills and \nknowledge to perform the system administration tasks, or where one user group performs all \nof the administration tasks. ", + "page_start": 89, + "page_end": 89, + "source_file": "sg246915.pdf" + }, + { + "text": "\n \n \n \n \n [html]communication be to the public generally or to any person or class of persons ) and freedom from interference with his or her correspondence.( 2 ) Nothing contained in or done under the authority of any law shall be heldbe inconsistent with or in contravention of this section to the extent that the law in question makes provision -be inconsistent with or in contravention of this section to the extent that the law in question makes provision( c ) that imposes restrictions upon public officers, employees of local government bodies, or teachers ; orqualified for registration, or of members necessary to consiltute an association of trade unions qualified for registration ) and conditions whereby registration may be refused on the grounds that any other trade union stready registr\n
( a ) that is reasonably required in the interests of defence, public safety, public order, public morality or public health ; or( b ) that is reasonably required for the purpose of protecting the reputations, rights and freedoms of cither persons or the private lives of persons concerned in legal proceedings, preventing the disclosure of information received inc
or regulating the technical administration or the technical operation of telephony, telegraphy, posts, wireless, broadcasting or television ; or( c ) that imposes restrictions upon public officers, employees of local government bodies, or teachers,
and except so far as that provision or, as the case may be, the thing done under the authority thereof is shown not to be reasonably justifiable in a democratic aociety.13. Protection of freedom of assembly and association
( 1 ) Except with his or her own consent, no person shall be hindered in the enjoyment of his or her freedom of assembly and association, that is to say, his or her right to assemble freely and associate with other persons and in particular to foubeing to trade unions or other associations for the prototion of his or her interests. G2 : Nothing contained in or done under the authority of any law shall be held to
( a ) that is reasonably required in the interests of defence, public satety, public order, public morality or public health ;( d ) that is reasonably required for the purpose of protecting the rights or freedoms of other persons ;
( d ) for the registration of trade unions and associations of trade unions in a register established by or under any law, and for imposing reasonable conditionsrelating to the requirements for entry on such a register ( including conditions as to the minimum number of persons necessary to constitute a trade union
association of trade unions already registered, as the case may be, is sufficiently representative of the whole or of a substantial proportion of the interests in respect of which registration of a trade union or association of tradeunions is sought,
and except so far as that provision or, as the case may be, the thing done under the authority thereof is shown not to be ressonably justifiable in a democratic society. 14. Protection of freedom of movement( 1 ) No person shall be deprived of his or her freedom of movement, and for the
purposes of this section the said freedom means the right to move freely throughout Botowana, the right to reside in any part of Botowana, the right to enter Botowana arimmunity from expulsion from Botowana.( 2 ) Any restriction on a person ’ s freedom of movement that is involved in his or
", + "page_start": 11, + "page_end": 11, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "(4) In this regulation— \n\n“authorised person” means— \n(a) a constable, \n(b) the Civil Aviation Authority, \n(c) the Secretary of State, or \n(d) a person authorised by the Civil Aviation Authority or the Secretary of State under the \nAir Navigation Order 2016(**a**); ", + "page_start": 22, + "page_end": 22, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "Information about IAM policies may come at you fast. If it gets to be too much, put it in**PARC**: \n\n•**P**rincipal: entity that is allowed or denied access \n\n•**A**ction: type of access that is allowed or denied \n\n•**R**esource: AWS resources the action will act upon \n\n•**C**ondition: conditions for which the access is valid ", + "page_start": 40, + "page_end": 40, + "source_file": "serverless-core.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Patients
a person designated by the Secretary of State for the purposes of this regulation.
Power of entry
I2 —( 1 ) A constable may enter premises in order —
( a )
to search for a person who is suspected of conniting an offence of contravening the requirement in paragraph 10 ( dury to self - isolate ) of Schedule 11 ;
( b )
to remove a person of the description in sub - paragraph ( a ) to accommodation designated by the Secretary of State for the purposes of Schedule 11.
( 2 ) T
epower in paragraph ( 1 ) is exercisable if the constable —
( a )
has reasonable grounds to believe that a person of the description in paragraph ( 1 )( a ) is in or on the premises ; and
( b )
has a reasonable belief that it is necessary and proportionate to enter the premises for the purposes specified in paragraph ( 1 )( b ).
( 3 ) A
constable exercising the power in paragraph ( 1 )—
( a )
", + "page_start": 18, + "page_end": 18, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "(g) other adaptations which the parties may later agree; in such case, the following rules \napply: the contracting authority must consult the contractor. If necessary, the contractor \nmust in turn seek the agreement of any*creator*or other right holder and must reply to the \ncontracting authority within one month by providing its agreement, including any \nsuggestions of modifications, free of charge. The contractor may refuse the intended \nmodification only if a*creator*can demonstrate that the intended modification may harm \nhis/her honour or reputation, thereby violating his/her moral rights. \n\nThe modes of exploitation may be defined in more details in the specific contract. \n\nThe list above is in addition to whatever rights already accrue to the contracting authority \non the basis of existing exceptions in the applicable legislation, such as the copyright \nexception to ensure the proper performance or reporting of administrative proceedings, in \ncases where such exceptions apply. \n\n**I.10.2. Licence or transfer of pre-existing rights**\n\nAll*pre-existing rights*incorporated in the*results*, if any, are licensed to the Agency as set \nout in Article II.13.2. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTableTableTableTable
", + "page_start": 9, + "page_end": 9, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "(c) for a purpose connected with, or otherwise incidental to, a purpose described in sub- \nparagraph (a) or (b). \n\n(5) A constable or a person responsible for arranging or providing services (including security \nservices) in respect of accommodation as part of a managed self-isolation package may, where \nnecessary for the purpose of carrying out a function under these Regulations, request from B the \nfollowing information— \n\n(a) confirmation that P possesses a testing package for the purposes of regulation 6 and the \n\ndetails of that testing package (including the time and date of the tests); \n\n(b) confirmation that P has undertaken any test in accordance with a testing package and, if \nnot, an account of the reasons; \n\n(c) the result of any test P has undertaken in accordance with a testing package. \n\n(6) Subject to paragraph (8), disclosure which is authorised by this regulation does not breach— \n\n(a) an obligation of confidence owed by the person making the disclosure; or \n(b) any other restriction on the disclosure of information (however imposed). \n\n(7) This regulation does not limit the circumstances in which information may otherwise \n\nlawfully be disclosed under any other enactment or rule of law. \n\n(8) Nothing in this regulation authorises the use or disclosure of personal data where doing so ", + "page_start": 29, + "page_end": 29, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**Granting administrative access to a user**\n\nAs you might guess, granting administrative access to a user is still rather far reaching. An \n\naccount with administrative level privileges will make getting started easier. For systems \n\nin production, follow the principle of least-privilege — granting only the minimum access \n\nnecessary to accomplish tasks. ", + "page_start": 13, + "page_end": 13, + "source_file": "serverless-core.pdf" + }, + { + "text": "approved on Behalf of the Board \n\n", + "page_start": 65, + "page_end": 65, + "source_file": "TSX_KMP_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "PLAW-116publ30.pdf", + "query": "What criteria must a lactation room meet?", + "target_page": 1, + "target_passage": "LACTATION ROOM.—The term ‘lactation room’ means a hygienic place, other than a bathroom, that— ‘‘(A) is shielded from view; ‘‘(B) is free from intrusion; and ‘‘(C) contains a chair, a working surface, and, if the public building is otherwise supplied with electricity, an electrical outlet. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "‘‘(3) LACTATION ROOM.—The term ‘lactation room’ means \na hygienic place, other than a bathroom, that— \n\n‘‘(A) is shielded from view; \n‘‘(B) is free from intrusion; and \n‘‘(C) contains a chair, a working surface, and, if the \npublic building is otherwise supplied with electricity, an \nelectrical outlet. \n\n‘‘(b) LACTATION ROOM REQUIRED.—Except as provided in sub- \nsection (c), the appropriate authority of a covered public building \nshall ensure that the building contains a lactation room that is \nmade available for use by members of the public to express breast \nmilk. \n\n‘‘(c) EXCEPTIONS.—A covered public building may be excluded \nfrom the requirement in subsection (b) at the discretion of the \nappropriate authority if— \n‘‘(1) the public building— \n‘‘(A) does not contain a lactation room for employees \nwho work in the building; and \n\n‘‘(B) does not have a room that could be repurposed \nas a lactation room or a space that could be made private \nusing portable materials, at a reasonable cost; or ", + "page_start": 0, + "page_end": 0, + "source_file": "PLAW-116publ30.pdf" + }, + { + "text": "*Be it enacted by the Senate and House of Representatives of*\n*the United States of America in Congress assembled,*\n\nFairness For \nBreastfeeding \nMothers Act \nof 2019. \n40 USC 101 note. \n\n**SECTION 1. SHORT TITLE.**\n\nThis Act may be cited as the ‘‘Fairness For Breastfeeding \nMothers Act of 2019’’. \n\n**SEC. 2. LACTATION ROOM IN PUBLIC BUILDINGS.**\n\n(a) LACTATION ROOM IN PUBLIC BUILDINGS.—Chapter 33 of \ntitle 40, United States Code, is amended by adding at the end \nthe following new section: \n\n**‘‘§ 3318. Lactation room in public buildings** 40 USC 3318. \n\n‘‘(a) DEFINITIONS.—In this section: \n\n‘appropriate \nauthority’ means the head of a Federal agency, the Architect \nof the Capitol, or other official authority responsible for the \noperation of a public building. \n\n‘‘(1) APPROPRIATE AUTHORITY.—The term \n\n‘‘(2) COVERED PUBLIC BUILDING.—The term ‘covered public \nbuilding’ means a public building (as defined in section 3301) \nthat is open to the public and contains a public restroom, \nand includes a building listed in section 6301 or 5101. ", + "page_start": 0, + "page_end": 0, + "source_file": "PLAW-116publ30.pdf" + }, + { + "text": "PUBLIC LAW 116–30—JULY 25, 2019 133 STAT. 1033 \n\n‘‘(2) new construction would be required to create a lacta- \ntion room in the public building and the cost of such construc- \ntion is unfeasible. \n‘‘(d) NO UNAUTHORIZED ENTRY.—Nothing in this section shall \nbe construed to authorize an individual to enter a public building \nor portion thereof that the individual is not otherwise authorized \nto enter.’’. \n\n(b) CLERICAL AMENDMENT.—The table of sections at the begin- \nning of chapter 33 of title 40, United States Code, is amended \nby inserting after the item related to section 3316 the following \nnew item: \n\n‘‘3318. Lactation room in public buildings.’’. \n\n(c) EFFECTIVE DATE.—The amendments made by this section \nshall take effect 1 year after the date of the enactment of this \nAct. \n\n40 USC 3318 \nnote. \n\nApproved July 25, 2019. ", + "page_start": 1, + "page_end": 1, + "source_file": "PLAW-116publ30.pdf" + }, + { + "text": "\n\nrequirements for ", + "page_start": 209, + "page_end": 209, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\nfactors requiring con- ", + "page_start": 21, + "page_end": 21, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n \n \n \n \n [html]dotabasets results resultion nurses to include horiginal care flip senior transition to the care senior transition to the care to the care transient trainee to takin workers to the workers workers workers workers workers workers worke wbfloat16 A10.80G\n
Hyper - parameterViT - L / 16224ViT - H / 16224ViT - H / 16384
VideoMix2M4564554 ( 0.3, 1.0 )( 0.75.1. 35 )( 0.75.1. 5 )VideoMix2M444 ( 0.31.1. 0 )( 0.75.1. 35 )( 0.75.1. 5 )VideoMix2M1616416344444444.03 ( 0.75.1. 35 )( 0.75.1. 5 )shortrange_mask_num_blocks shortrange_mask_spatial_scale longrange_mask_num_blocks longrange_mask_spatial_scale
80.1520.780.1520.780.1520.7optimization batch_size total_number_ol_iterations warmup_iterations
30729000012000307290000120002400900012000lr start_lr
6.25e - 42 × 10 − 46.25 × 10 − 42 × 10 − 46.25 × 10 − 42 × 10 − 4final_lr start − momentum final_momentums
1 × 10 − 60.9981.001 × 10 − 60.9981.001 × 10 − 60.9981.00start_weight_decay final_weight_decay scheduler_scale_factor
0.040.41.250.040.41.250.040.41.25architecture patch size tubelet. size pred_depth pred_dembed_dim
162123841621238416212384hardware : dtypeaccelerator
bfloat16 A10.80Gbfloat16A10.80G
", + "page_start": 16, + "page_end": 16, + "source_file": "arxiv3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
>is employed, or has previously been employed in an executive capacity by the Company, and there has not been a period of at least three years between ceasing such employment and serving on the Board ;Performance Review
Board and Senior EEach year the Board receives management detailing intera outlining the expressed views>
has within the last three years been a prin - cipal of a material professional adviser or a material consultant to the Company, or an employee materially associated with the above mentioned adviser / consultant ;shareholders. The Nomination responsible for evaluation of committees and its leey execu>
is a material supplier or customer of the Company, or an officer of or otherwise associated directly or indirectly with a material supplier or customer ; andPerformance evaluations of ti committees, the individual Di executives were undertalien in cial year in accordance with the processes.λ
has a material contractual relationship with the Company other than as a Director.The Managing Director under review of the performance of Executive against individual t objectives.‘ The concept of ‘ maternality ’ is conseleved from the patients ’ the patients ’ the patients ’ the determinants ’ the patients ’ the determinants ’ or the better of fatilities in midwister go the patients ’ the patients ’ the patients ’ the der
Independent ProfesDirectors are able to access n management team at any tim vant information.It is also Board policy that Dir independent advice at the Co
Board CommitteesTo assist the Board in fulfilling ties, the Board has establishe tees to consider certain issueAppointment of Directors
These committees are as follow - upNominations of new Directors, recommended by the Nomination Committee, are considered by≥ 3 Audit Committee ;
≥ Remuneration Committee≥ Nomination Committee.The Nomination Committee employs external consultants to access a wide base of potential Directors, considering their range of slells and experience required in light of the :
Each committee operates un>current composition of the Board ;
The members of the Audit Co date of this Report are :λneed for independence ;
date of this Report are :3the Company ' s Diversity Policy ; strategic direction and progressCompany ; and
3 Mr Craig Carracher ( Chair Committee );≥ 3 Mr Ross Smyth - Kirk ; and3
nature of the Company ' s business.≥ 3 Mr Peter McAleer.The Board assesses nominated Directors against a range of criteria including experience, professional expertise, personal qualities, potential conflicts of interest and their capacity to commit themselves to the Board ’ s activitie
The Committee has appropriatise. All members of the Come literate and have an appropriathe industry in which the Communitie. CommunityThe Audit Committee ' s role is to fulfill its responsibilities ass Company ' s accounts, its exte reporting, its internal control
", + "page_start": 36, + "page_end": 36, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "(3) For the purposes of sub-paragraph (1)(d) and (e), a person or laboratory (as the case may be) \nmeets the relevant requirements for accreditation to a standard where the person who is the \noperator of the laboratory complies with the requirements of regulation 6 of the Health Protection \n(Coronavirus, Testing Requirements and Standards) (England) Regulations 2020 as if— \n\n(a) a reference to an applicable test were a reference to a day 2 test; \n(b) a reference to a test provider were a reference to a private provider. ", + "page_start": 62, + "page_end": 62, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Data collectionAll data collection was done on a beners 37 Proma with strainve sersion NRICL. All oraquanose were dandard. Semen protocols, with the energinism the T. Professional non A T. Transplerid Change sinches princhy703 or we was exposited witha
Data analysisThe following software packagos erro used : The following services ( services ) Previous for maternals ( Segmentation of Hippocampal Subfields ( 63 / 65 ), version 7 / 2038 Ability, were including services ( 52 / 6 ). Upring were in chain ( 52.
\n\nA \np \nr \ni \nl ", + "page_start": 13, + "page_end": 13, + "source_file": "pubmed4.pdf" + }, + { + "text": "undertaken by the test provider, and responsibility for reporting medical issues; \n\n(f) \n\nthey have an effective system of clinical governance in place which includes appropriate \nstandard operating procedures in relation to the carrying out of appropriate tests; \n\n(g) a registered clinical scientist has oversight of clinical practices undertaken by the test \nprovider, and responsibility for reporting clinical issues; \n\n(h) they have systems in place to identify any adverse incidents or quality control issues in \nrelation to appropriate tests and be able to report them as soon as reasonably practicable \nto the Secretary of State; \n\n(i) \n\nthey administer or provide an appropriate test to P, on or after the fifth day after the day \non which P arrived in England having received the information required by paragraph \n4(b) and (c) (as appropriate); and \n\n(j) \n\nif they arrange with another person (“X”) for X to carry out any element of the single \nend-to-end testing service on their behalf, the test provider ensures that X complies with \nany of paragraphs (c) to (i) and 5(2), (3) and (5) as is relevant to the carrying out of that \nelement. \n\n(2) For the purposes of sub-paragraph (1)— \n\n(a) “point of care test” means a test processed outside a laboratory environment; \n(b) “registered clinical scientist” means a person registered as a clinical scientist with the \nHealth and Care Professions Council pursuant to article 5 of the Health Professions Order \n2001(**b**); \n\n(c) “single end-to-end testing service” means a service which comprises accepting the \nbooking from the person to be tested, collecting and processing the sample to be tested, \ncarrying out genomic sequencing and providing the test result to P. \n\n(3) For the purposes of sub-paragraph (1)(c) and (d), a person or laboratory (as the case may be) \nmeets the relevant requirements for accreditation to a standard where that person, or in the case of \na laboratory where the person who is the operator of the laboratory— \n\n(a) has made a valid application for accreditation to UKAS (“stage one”); and \n\n(b) complies with the requirements of sub-paragraph (4) where relevant. \n\n(4) The requirements of this sub-paragraph are that— \n\n(a) in the case of a person who completed stage one— \n\n(i) before 15th December 2020 and who is carrying out a test after 18th January 2021, \n(ii) on or after 15th December 2020 and who is carrying out a test after whichever is the \n\nlater of— \n(aa) 18th January 2021, and \n(bb) the date four weeks after the date on which they completed stage one, \n\nthey have complied with the requirements published by UKAS in relation to accreditation \nto that standard at http://www.ukas.com/C19-Stage2-UKAS-Appraisal (“stage two”), \n\n(b) in the case of a person who completed stage two— \n\n(i) on or before 18th January 2021 and who is carrying out a test on or after 1st July \n\n2021, \n\n(ii) after 18th January 2021 and who is carrying out a test on or after whichever is the \n\nlater of— \n(aa) 1st July 2021, and \n(bb) the date four months after the date on which they completed stage two, \n\nthey are accredited by UKAS to that standard. ", + "page_start": 69, + "page_end": 69, + "source_file": "uksi_20210582_en.pdf" + } + ] + }, + { + "references": { + "source_file": "PLAW-116publ30.pdf", + "query": "When take effect the Fairness For Breastfeeding Mothers Act ?", + "target_page": 2, + "target_passage": "The amendments made by this section shall take effect 1 year after the date of the enactment of this Act. ", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "*Be it enacted by the Senate and House of Representatives of*\n*the United States of America in Congress assembled,*\n\nFairness For \nBreastfeeding \nMothers Act \nof 2019. \n40 USC 101 note. \n\n**SECTION 1. SHORT TITLE.**\n\nThis Act may be cited as the ‘‘Fairness For Breastfeeding \nMothers Act of 2019’’. \n\n**SEC. 2. LACTATION ROOM IN PUBLIC BUILDINGS.**\n\n(a) LACTATION ROOM IN PUBLIC BUILDINGS.—Chapter 33 of \ntitle 40, United States Code, is amended by adding at the end \nthe following new section: \n\n**‘‘§ 3318. Lactation room in public buildings** 40 USC 3318. \n\n‘‘(a) DEFINITIONS.—In this section: \n\n‘appropriate \nauthority’ means the head of a Federal agency, the Architect \nof the Capitol, or other official authority responsible for the \noperation of a public building. \n\n‘‘(1) APPROPRIATE AUTHORITY.—The term \n\n‘‘(2) COVERED PUBLIC BUILDING.—The term ‘covered public \nbuilding’ means a public building (as defined in section 3301) \nthat is open to the public and contains a public restroom, \nand includes a building listed in section 6301 or 5101. ", + "page_start": 0, + "page_end": 0, + "source_file": "PLAW-116publ30.pdf" + }, + { + "text": "PUBLIC LAW 116–30—JULY 25, 2019 133 STAT. 1033 \n\n‘‘(2) new construction would be required to create a lacta- \ntion room in the public building and the cost of such construc- \ntion is unfeasible. \n‘‘(d) NO UNAUTHORIZED ENTRY.—Nothing in this section shall \nbe construed to authorize an individual to enter a public building \nor portion thereof that the individual is not otherwise authorized \nto enter.’’. \n\n(b) CLERICAL AMENDMENT.—The table of sections at the begin- \nning of chapter 33 of title 40, United States Code, is amended \nby inserting after the item related to section 3316 the following \nnew item: \n\n‘‘3318. Lactation room in public buildings.’’. \n\n(c) EFFECTIVE DATE.—The amendments made by this section \nshall take effect 1 year after the date of the enactment of this \nAct. \n\n40 USC 3318 \nnote. \n\nApproved July 25, 2019. ", + "page_start": 1, + "page_end": 1, + "source_file": "PLAW-116publ30.pdf" + }, + { + "text": "‘‘(3) LACTATION ROOM.—The term ‘lactation room’ means \na hygienic place, other than a bathroom, that— \n\n‘‘(A) is shielded from view; \n‘‘(B) is free from intrusion; and \n‘‘(C) contains a chair, a working surface, and, if the \npublic building is otherwise supplied with electricity, an \nelectrical outlet. \n\n‘‘(b) LACTATION ROOM REQUIRED.—Except as provided in sub- \nsection (c), the appropriate authority of a covered public building \nshall ensure that the building contains a lactation room that is \nmade available for use by members of the public to express breast \nmilk. \n\n‘‘(c) EXCEPTIONS.—A covered public building may be excluded \nfrom the requirement in subsection (b) at the discretion of the \nappropriate authority if— \n‘‘(1) the public building— \n‘‘(A) does not contain a lactation room for employees \nwho work in the building; and \n\n‘‘(B) does not have a room that could be repurposed \nas a lactation room or a space that could be made private \nusing portable materials, at a reasonable cost; or ", + "page_start": 0, + "page_end": 0, + "source_file": "PLAW-116publ30.pdf" + }, + { + "text": "Some of these groups are**directly addressed by European and national legislation**, for example, \nworkers with disabilities, young workers or pregnant women. For other groups of workers, for example, \nfor women or migrant workers, the legislative protection is formulated as a general ‘equal treatment’ \nprescription, like to provide preventive measures for all groups in an enterprise (Framework Directive, \nArticle 15 ‘Risk groups’), or to provide solutions that fit to the individual (Framework Directive, Art. 6.2.d.). \nThere are some prescriptions that refer to specific preventive activities, for example, to provide written \ninstructions in different languages for safe work with chemicals. ", + "page_start": 58, + "page_end": 58, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**Contents ............................................................................................................................................... 2**\n\n\n \n \n \n \n [html]\n
Summary, summary, summary, summary, summary, summary, summary, summary, and antenatal, antenatal, antenatal, antenatal, antenatal, antenatal, antenatal, antenatal, antenatal, antenatal, anticoantal, anticoantaminantal, an1. Drug Interventions Programme Data........................................................................................................................................................................
2. Estimating an incidence trend from treatment data...........................................................................................................................................................Conclusion..............................................................................................................................................................................................
\n\n\n \n \n \n \n [html]\n
1. Drug Interventions Programme Data........................................................................................................................................................................2. Estimating an incidence trend from treatment data...........................................................................................................................................................
Conclusion. 30Appetics. S1
", + "page_start": 1, + "page_end": 1, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
( d )2008 c. 25
( e )1996 c. 56 ; section 337A was substituted by section 1421 ) of the Education and Skills Act 2008 ( c. 25 ).
( f )Section ( 952B ) was amonded or far arelevant by sections 47 of and Schedule 9 to the Education Act ( 997 ), occition 3 of and paragraph 1 of Schedule 3 and Schedule 4 to the Children, Schools and Families Act 2010, section 101 of the Education an a
( g )1992 ; 13. section 90 was amended in so fat as referent by paragraph 42 of Schedule 9 and Schedule 11 to the Learning and Skills Act 2000 ( c. 21 ), paragraph 43 of Schedule 3 to the appromizeships. Skills. Children and Learning Act 2009 ( c. 22 ) an
( h )Section 1B was inserted by section 53 ( 7 ) of the Education Act 2011.
", + "page_start": 79, + "page_end": 79, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**116. Power of Commissions in relation to pensions, etc.**\n\n\n \n \n \n \n [html]\n
decide whether or not any persistens benefits shall be granted or withfrold, reduce in amcunt or suspend any such benefits that have been anded, filts shall be granted and may not be withheild, reduced in amount or unless the appropriate Co
, as the case may be, in the decision to withhold them, reduce them in amountI them.
Where the amount of any persions benefits that may be granted to any fived by lare, the amount of the benefits to be granted to him or her shall be amount for which he or she is eligible unless the appropriate Commission his or her being granted b
The appropriate Commission shall not concur under subsection ( 1 ) or ( 2 ) of this section in action taken on the ground that any person who holds or effice of a judge of the Cout of Appeal or of the High Court or the Auditor - Director of Prosecuti
In this section “ the appropriate Commission ” means the cases of benefits for which any person may be eligible in respect of the environment in the public service of a person who, immediately better he or she assed to be a public stiffican, wa
any sther case, the Public Service Commission. In this section “ persons benefit ” means ary persons, compensation, a child ” was alwances to persons in respect of their service as public officers, and appending to personal interviews. As
Solidated Fund
Prevenues or cher monitys ratioed or received for the purposes of their distaxeans ( not being reversues or other moneys that are payuble by or law into some other fund established for a specific purpose or that may by or law be retained by the
abnoredish from Gonsolidation # under other public hundships within the public human providers and expertised more assigned / use that is charged upon the Fund by the Constitution or term the supportise that is changed spon the Fund by tha
\n\n(a) \n(b) \n\n(3) If in any financial year it is found- \n\n(a) \n\nthat the amount appropriated by the Appropriation Act for the purposes included \nin any organisation of expenditure is insufficient or that a need has arisen for \nexpenditure for a purpose for which no amount has been appropriated by the \nAppropriation Act; or \nthat any moneys have been expended on any organisation of expenditure in \nexcess of the amount appropriated for the purposes included in that \norganisation by the Appropriation Act or for a purpose for which no amount has \nbeen appropriated by the Appropriation Act, \n\n(b) \n\na supplementary estimate showing the sums required or spent shall be laid before the \nNational Assembly and the organisations of expenditure shall be included in a \nsupplementary Appropriation Bill, or in a motion or motions approving such expenditure, \nwhich shall be introduced or moved in the Assembly. \n\n(4) Where any supplementary expenditure has been approved in a financial year \nby a resolution of the National Assembly in accordance with the provisions of subsection \n(3) of this section, a supplementary Appropriation Bill shall be introduced in the National \nAssembly, not later than the end of the financial year next following, providing for the \nappropriation of the sums so approved. \n**120. Authorization of expenditure in advance of appropriation**", + "page_start": 50, + "page_end": 50, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "balance between work and care needs. \nbalance between work and care needs. \n\n**Better support for carers:**\n**Workplace measures to**\n**deal with the rising old-age**\n**dependency ratio**\n\nThe improvements have three aspects: \nThe improvements have three aspects: \n\n(1) Care-leave time has been extended to \n(1) Care-leave time has been extended to \n\none year; (2) the time frame during which \none year; (2) the time frame during which \n\nstaggered and shortened working hours \nstaggered and shortened working hours \n\nfor care-giving are allowed has been \nfor care-giving are allowed has been \n\nIn November 2010, the bank expanded its \nIn November 2010, the bank expanded its extended to three years; and (3) greater \nextended to three years; and (3) greater \n\nemployee carer support program. \nemployee carer support program. flexibility has been introduced in reduction \nflexibility has been introduced in reduction \n\nEven now, much remains to be done to \nEven now, much remains to be done to of working hours for care purposes. \nof working hours for care purposes. \n\ndevelop public suppor t mechanisms, \ndevelop public suppor t mechanisms, ", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**References**\n1. World Health Organization. Maternal, newborn, child and \nadolescent health and ageing. platform.who.int/data/ \nmaternal-newborn-child-adolescent-ageing (2022). \n\n2. Thornburg, K. L., Bagby, S. P. & Giraud, G. D.*Knobil and Neill’s*\n*Physiology of Reproduction*pp. 1927–1955 (Elsevier, 2015). \n3. Brunton, P. J. & Russell, J. A. The expectant brain: adapting for \nmotherhood.*Nat. Rev. Neurosci.***9**, 11–25 (2008). \n4. Gregg, C. Pregnancy, prolactin and white matter regeneration. \n*J. Neurol. Sci.***285**, 22–27 (2009). \n5. Haim, A. et al. A survey of neuroimmune changes in pregnant \n\nand postpartum female rats.*Brain Behav. Immun.***59**, \n67–78 (2017). \n6. Barrière, D. A. et al. Brain orchestration of pregnancy and \n\nmaternal behavior in mice: a longitudinal morphometric study. \n*NeuroImage***230**, 117776 (2021). ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed4.pdf" + }, + { + "text": "(**a**) 2014 c.6. Section 30(8) was amended by Schedule 2, Part 1, paragraph 4 to the Children and Social Work Act 2017 (c.16). \n(**b**) 1996 c.56. Section 29(3) was amended by Schedule 30, paragraph 67 and Schedule 31 to the School Standards and \nFramework Act 1998 (c.31) and S.I. 2010/1158 and section 569(4) was amended by section 8(1) and (5) of the Education \n(Wales) Measure 2009. \n(**c**) S.I. 2014/1530, relevant amending instruments are S.I. 2014/2096, S.I. 2015/359 and S.I. 2017/1306. ", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200471_en.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20200471_en.pdf", + "query": "When is it not necessary to review an EHC plan ?", + "target_page": 3, + "target_passage": " It is not necessary for a local authority to review an EHC plan in accordance with section 44(1) of the Act if it is impractical to do so because of a reason relating to the incidence or transmission of coronavirus. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**10.**In regulation 13(3) (timescales for EHC plans), for “(d)” substitute “(e)”. \n\n**11.**After regulation 18 (circumstances in which a local authority must review an EHC plan) \n\ninsert— \n\n“**Circumstances in which it is not necessary to review an EHC plan**\n\n**18A.**—(1) It is not necessary for a local authority to review an EHC plan in accordance \nwith section 44(1) of the Act if it is impractical to do so because of a reason relating to the \nincidence or transmission of coronavirus. \n\n(2) Where paragraph (1) applies, a local authority must instead conduct such reviews as \n\nsoon as reasonably practicable.”. \n\n**12.**In regulation 22 (amending an EHC plan following a review), after paragraph (5) insert— \n\n“(6) The local authority need not comply with the time limit referred to in paragraphs (3) \nand (4) if it is impractical to do so because of a reason relating to the incidence or \ntransmission of coronavirus.”. ", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "**6.**In regulation 4 (determination whether or not special educational provision may be \n\nnecessary), after paragraph (2) insert— \n\n“(3) The local authority need not comply with the time limit referred to in paragraph (1) if \nit is impractical to do so because of a reason relating to the incidence or transmission of \ncoronavirus.”. \n\n**7.**In regulation 5(4) (decision whether or not to conduct an EHC needs assessment)— \n\n(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**8.**In regulation 8(2) (duty to co-operate in EHC needs assessments)— \n\n(a) at the end of sub-paragraph (b) omit “or”; and \n(b) at the end of sub-paragraph (c) insert— \n\n“; or \n\n(d) of a reason relating to the incidence or transmission of coronavirus”. \n\n**9.**In regulation 10(4) (decision not to secure an EHC plan)— \n\n2 ", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "**13.**In regulation 27(3) (amending or replacing an EHC plan following a re-assessment)— \n\n(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**14.**In regulation 45 (unopposed appeals), after paragraph (7) insert— \n\n“(8) The local authority need not comply with the time limits specified in paragraph (3A) \nif it is impractical to do so because the circumstances referred to in regulation 10(4)(e) \napply.”. \n\n**Amendment of the Special Educational Needs (Personal Budgets) Regulations 2014**\n\n**15.**The Special Educational Needs (Personal Budgets) Regulations 2014(**a**) are amended as \n\nfollows. \n\n**16.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**17.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time period due to coronavirus exception**", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "**23.**In regulation 8(2) (duty to co-operate in a detained person’s EHC needs assessment), at the \n\nend of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**24.**In regulation 10(4) (decision not to secure an EHC plan)— \n\n(a) at the end of sub-paragraph (b) omit “or”; and \n(b) at the end of sub-paragraph (c) insert— \n\n“; or \n\n(d) of a reason relating to the incidence or transmission of coronavirus”. \n\n**25.**In regulation 13(3) (timescales for EHC plans), for “(c)” substitute “(d)”. \n\n**26.**In regulation 29 (compliance with the orders of the First-tier Tribunal)— \n\n(a) after paragraph (6) insert— \n\n“(6A) The home authority need not comply with the time limits specified in paragraph (3) \nif it is impractical to do so because the circumstances referred to in regulation 10(4)(d) \napply.”. \n\n(b) in paragraph (7)(c) after “10(4)(a)” insert “or (d)”. ", + "page_start": 4, + "page_end": 4, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "**Statistical Analysis**\nBased on prior work, 3 board certified EM physician leaders (M.M., A.F., and P.S.) with experience in \n\nformal quality and patient safety review processes performed retrospective reviews of ED-based \nEHR records of 50 individual ED patient encounters, randomly selected from the test dataset.49 \nBased on prior published clinical evaluations of LLM, as well as the study feasibility of using EM \nphysician quality and patient safety leaders, 50 ED patient encounters were evaluated.50 Reviewers ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed8.pdf" + }, + { + "text": "educational, health care and social care provision); \n\n(f) regulation 27(4) (amending or replacing an EHC plan following a re-assessment); \n\n(g) regulation 33 (requirement to consider mediation); \n\n(h) regulation 34(1) and (2) (where a parent or young person does not wish to or fails \n\nto pursue mediation); \n\n(i) regulation 35(2), (3) and (4) (mediation – health care issues); \n\n(j) regulation 36(2) (mediation - no health care issues); \n\n(k) regulation 39(1) and (3) (mediation certificate under section 55(5)); \n\n(l) regulation 42(3) and (4) (steps to be taken by a local authority); \n\n(m) regulation 44(2)(d), (e), (f) and (h) (compliance with the orders of the First-tier \n\nTribunal); \n\n(n) regulation 45(4), (5) and (6A) (unopposed appeals); \n\n(o) regulation 47 (disclosure of EHC plans in relation to higher education); and \n\n(p) regulation 56(3) (publication of comments on the local offer).”. ", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "time or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 15(2) (transfer of EHC plans) (in relation to the second reference to 15 \nworking days), (4), (5), (7) (in relation to the second reference to 15 working days) \nand (8); \n\n(b) regulation 16(2) and (3) (change of responsible commissioning body); \n\n(c) regulation 20(9) and (10) (review where the child or young person attends a school \n\nor other institution); \n\n(d) regulation 21(7), (8) and (9) (review of EHC plan where the child or young person \n\ndoes not attend a school or other institution); \n\n(e) regulation 25(1) (notification of decision whether it is necessary to re-assess ", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "EHR-based handoff workflow via a standardized EM-to-IP handoff note template, designed for real- \n\ntime completion by the EM care team at time of admission. At 3 and 6 months postlaunch, informal \n\nevaluation of new EM-to-IP handoff notes through random medical record review and unstructured \n\nclinician feedback sessions revealed variable completeness, quality, and subsequent usefulness of \n\nthe handoff notes. ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed8.pdf" + }, + { + "text": "350 Regarding other sources: The authors of the DG EMPL Evaluation did not consider the National \nImplementation Reports (due every five years by each Member State on each directive) as relevant for their \nstudy:*‘In this context, one relevant conclusion is that the attempt to map the findings of the National*\n*Implementation Reports has yielded no result. The reporting requirements of the National Implementation Reports*\n*have proven to be formulated too broadly to facilitate quantifications of the replies across MSs or to allow for*\n*comparability*.’ \nFor this Status Report, SLIC evaluations of the labour inspection systems in Member States were not taken into \naccount, because most of them are confidential. \n\n351 DG Employment, Social Affairs and Inclusion, 2015: Evaluation of the Practical Implementation of the EU \nOccupational Safety and Health (OSH) Directives in EU Member States (p. 89). \n\n352 Ibid., p. 105. See also p. 89:*‘The Directives represent a mix of a goal-oriented approach – strongly expressed*\n*in the Framework Directive, but also mirrored in the individual Directives – and a prescriptive approach – which is,*\n*for instance, seen in the very detailed and specific requirements included in the annexes of some Directives.*", + "page_start": 153, + "page_end": 153, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**JAMA Network Open | Emergency Medicine**\n\n**21**. Singleton JM, Sanchez LD, Masser BA, Reich B. Efficiency of electronic signout for ED-to-inpatient admission \nat a non-teaching hospital. Intern Emerg Med. 2018;13(7):1105-1110. doi:10.1007/s11739-018-1816-z \n\n**22**. Downing NL, Bates DW, Longhurst CA. Physician burnout in the electronic health record era: are we ignoring \nthe real cause? Ann Intern Med. 2018;169(1):50-51. doi:10.7326/M18-0139 \n\n**23**. Pivovarov R, Elhadad N. Automated methods for the summarization of electronic health records. J Am Med \nInform Assoc. 2015;22(5):938-947. doi:10.1093/jamia/ocv032 \n\n**24**. Hartman VC, Bapat SS, Weiner MG, Navi BB, Sholle ET, Campion TR Jr. A method to automate the discharge \nsummary hospital course for neurology patients. J Am Med Inform Assoc. 2023;30(12):1995-2003. doi:10.1093/ \njamia/ocad177 ", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed8.pdf" + } + ] + }, + { + "references": { + "source_file": "Excel Training Manual 1.pdf", + "query": "Give me some info about the scroll bars in excel", + "target_page": 6, + "target_passage": "Appear at the right and on the bottom of the screen. You may click the scroll arrows, drag the scroll box or click the scroll bar to move through the document. ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "*Continue using the previous*\n*file with this exercise, or open*\n*the file E1324 Worksheet*\n*Techniques_2.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Point to the vertical dots \n\nbetween the sheet names and \nthe horizontal scroll bar, as \nshown \n\n*The pointer will change to a*\n*double-headed arrow...*\n\n Click and drag the bar across \n\nto the right, to the end of \ncolumn***L***, then release the \nmouse button \n\n Double-click on***Sheet1 (5)***to \nselect the worksheet tab name \n\n*This will also place it into edit*\n*mode…*\n\n Type**Comms**, then press \n Repeat steps***3***and***4***to \n\n***Sheet1 (4)*Admin**\n***Sheet1 (3)***\n***Sheet1 (2)***\n***Sheet1*** **Shop**\n**IT**\n**Maintenance**", + "page_start": 11, + "page_end": 11, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "\n\n***Chart***worksheet tab ", + "page_start": 56, + "page_end": 56, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "*Continue using the*\n***e***\n\n*previous file with this*\n*exercise, or open the*\n*file E1317*\n*Charting_9.xlsx...*\n Click on the***Revenue***\n\n***l***\n***i***\n\n***F***\n***e***\n***m***\n***a***\n***S***\n\n***Chart***worksheet tab to \nsee the chart, then click \nanywhere on the chart \nto select it \n\n Click on the***Chart***\n\n***Styles***tool to the right \nof the chart to see a \ngallery of style options, \nas shown \n\n Scroll through the \n\ngallery and point to \neach style to see how \nyour chart will look in \nLive Preview \n\n Scroll to and click on \n Click on the***Chart***\n\n***Styles***tool to the right \nof the chart to close the \ngallery \n\n Click on the***Chart Data***\nworksheet tab ", + "page_start": 54, + "page_end": 54, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Continue using the previous*\n***e***\n\n***e***\n***m***\n***a***\n***S***\n*file with this exercise, or open*\n*the file E705 Ranges_1.xlsx...*\n\n***l***\n***i***\n***F***\n\n Press \n Move the mouse pointer to the \n\n + \n to make \ncell***A1***the active cell \n\ncolumn heading for column***B***\n\n*Notice that the mouse pointer*\n*changes to a black arrow*\n*pointing down the column…*\n\n Click once to select the column \n\n*This time the row headers*\n*change to orange to indicate*\n*that at least one cell (but not*\n*all) in each row is selected…*\n\n Click in cell***D6***and press \n+ \n\n*This key combination also*\n*selects an entire column…*\n\n Click on the column header for \n Hold down column header for column***D***\n\n*This time, columns B, C, and D*\n*are all selected…*\n\n Click in the column header for \n\ncolumn***A***, then hold down the \nleft mouse button and drag the \nmouse pointer across the \ncolumn headings to column***E***", + "page_start": 18, + "page_end": 18, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Continue using the*\n*previous file with this*\n*exercise, or open the file*\n*E1317 Charting_2.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Point to the border of the \n\nchart and click once to \nselect the chart as an \nobject \n\n*The border of the chart will*\n*thicken to indicate that the*\n*chart is selected, the*\n*range of data used for the*\n*chart will be coloured, the*\n*ribbon will show*\n*chart-specific tabs and*\n*commands, and additional*\n*tools will appear to the*\n*right of the chart…*\n\n Click on the chart***legend***\nto make it the active object \nin the chart \n\n Click on the**vertical axis**\n Click on the**horizontal**\n**axis**to make it the active \nobject \n\n Click on the border of the \n\nchart to make the overall \nchart the active object \nagain – notice that the \nrange of data has been \ncoloured again \n\n Click in cell***A1***to deselect \nthe chart \n**3**", + "page_start": 47, + "page_end": 47, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "\n\nworksheet tab ", + "page_start": 55, + "page_end": 55, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Before starting this exercise*\n***e***\n\n***n***\n***e***\n***p***\n***O***\n*you MUST open the file E723*\n*Cell Alignment_9.xlsx...*\n\n***l***\n***i***\n***F***\n\n Click in cell***A5***\n\n*This cell contains a long text*\n*entry that spills across several*\n*columns…*\n\n Click on the***Expand Formula***\n\n***Bar***tool \nformula bar to see all of the \ntext \n\n to the right of the \n\n Click on the***Wrap Text***\n\ncommand \n***Alignment***group on the \n***Home***tab to wrap the text in \ncell***A5***\n\n in the \n\n**5**\n\n*Notice how the row height has*\n*now increased…*\n\n Hold down the \n\n key and \nclick in cell***E5***to select the \nrange***A5:E5***\n\n Click on the drop arrow \n\nfor***Merge & Centre***\n in the \n***Alignment***group and select \n**Merge Cells**to merge the cells \nin the range \n\n Move the mouse pointer to the \n\nbottom of the row***5***heading \nborder and drag the row height \nup until you reach***30***points ", + "page_start": 25, + "page_end": 25, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Before starting this*\n*exercise you MUST open*\n*the file E1317*\n*Charting_1.xlsx…*\n***n***\n***e***\n***p***\n***O***\n\n***e***\n***l***\n***i***\n***F***\n\n Click in cell***A3***, hold down \n\n, then click in cell***G7***\nto select the range***A3:G7***\n\n*Note that we have*\n*selected the data*\n*including headings but*\n*excluding the totalling…*\n\n Click on the***INSERT***tab, \n\nthen click on***Insert***\n***Column Chart***in the \n***Charts***group to see a \ngallery of***Column***chart \ntypes \n\n Under***2-D Column***, click \non***Clustered Column***\n\n*The chart will be*\n*embedded in the*\n*worksheet. The chart will*\n*be active (selected) and*\n*you’ll see additional tabs*\n*on the ribbon for working*\n*with the chart…*\n\n Point to the chart, then \n\nclick to select it and drag \nthe chart so that it is \nunderneath the data, as \nshown \n\n Click in cell***A1***to deselect ", + "page_start": 46, + "page_end": 46, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Before starting this*\n***e***\n*exercise you MUST*\n*open the file E1355*\n*Quick*\n*Analysis_5.xlsx…*\n Click in any cell \n Hold down \n\n***l***\n***i***\n\n***F***\n***n***\n***e***\n***p***\n***O***\n\ncontaining data \n\n + \n, \n to select \n\nthen press \nall of the non-empty \ncells around the current \ncell \n\n Using the scroll bars, \n\nscroll to the bottom \nright corner of the \nselection, click on the \n***Quick Analysis***button, \nthen click on the \n***TABLES***tab \n\n Click on***Table***to turn \nthe selected range into \na table \n\n Scroll across and on \n\nthe drop arrow for \n***Position***to see sorting \nand filtering options \n**6**\n\n Click on***Select All***to \n\nremove the tick, then \nclick on***Effective***\n***People Leader***so it \nappears ticked \n\n Click on**[OK]**to see \nonly those people with \nthis position title \n**7**", + "page_start": 40, + "page_end": 40, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Continue using the*\n*previous file with this*\n*exercise, or open the file*\n*E1317 Charting_8.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Click on the***Revenue***\n\n***Chart***worksheet tab to \nsee the chart, then click \nanywhere on the chart to \nselect it and see the \n***CHART TOOLS:***\n***DESIGN***and***CHART***\n***TOOLS: FORMAT***tabs \n\n Click on the***CHART***\n\n***TOOLS: DESIGN***tab, \nthen click on***Quick***\n***Layout***in the***Chart***\n***Layouts***group to display \na gallery of layout \noptions \n\n Click on***Layout 3***to \napply this chart layout to \nthe chart \n\n Repeat steps***2***and***3***to \n\nselect other***chart***\n***layouts***and see how \nthey appear when \napplied to the chart \n\n**5**\n\n Click on***Quick Layout***in \nthe***Chart Layouts***group \nand click on***Layout 5***\n\n Click on the***Chart Data***\nworksheet tab to display \nthis worksheet ", + "page_start": 53, + "page_end": 53, + "source_file": "Excel Training Manual 1.pdf" + } + ] + }, + { + "references": { + "source_file": "Excel Training Manual 1.pdf", + "query": "How to rename a worksheet in Excel ?", + "target_page": 12, + "target_passage": "To rename a worksheet: 1. Double click on the current name on the worksheet tab 2. Type the new name and press ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**For Your Reference…**\nTo***rename***a***worksheet***: \n\n1. Double click on the current name on the \nworksheet tab \n\n 2. Type the new name and press ", + "page_start": 11, + "page_end": 11, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "\n\nrename the other worksheets: ", + "page_start": 11, + "page_end": 11, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Handy to Know…**\n You can rename a worksheet by \n\nright-clicking on the worksheet tab to display \nthe shortcut menu and clicking on***Rename***. \n\n A worksheet tab name can contain up to 31 \n\ncharacters including spaces, but it is better to \nkeep it short and succinct. ", + "page_start": 11, + "page_end": 11, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "*Continue using the previous*\n*file with this exercise, or open*\n*the file E1324 Worksheet*\n*Techniques_2.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Point to the vertical dots \n\nbetween the sheet names and \nthe horizontal scroll bar, as \nshown \n\n*The pointer will change to a*\n*double-headed arrow...*\n\n Click and drag the bar across \n\nto the right, to the end of \ncolumn***L***, then release the \nmouse button \n\n Double-click on***Sheet1 (5)***to \nselect the worksheet tab name \n\n*This will also place it into edit*\n*mode…*\n\n Type**Comms**, then press \n Repeat steps***3***and***4***to \n\n***Sheet1 (4)*Admin**\n***Sheet1 (3)***\n***Sheet1 (2)***\n***Sheet1*** **Shop**\n**IT**\n**Maintenance**", + "page_start": 11, + "page_end": 11, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "*Before starting this exercise*\n*you MUST open the file*\n*E1324 Worksheet*\n*Techniques_1.xlsx…*\n***n***\n***e***\n***p***\n***O***\n\n***e***\n***l***\n***i***\n***F***\n\n Examine the workbook – it \ncurrently contains one \nworksheet named***Sheet1***\n\n Click on the***New Sheet***icon \nat the end of the worksheet \ntabs \n\n*A new worksheet named*\n*Sheet2 will be inserted. You*\n*can also use the keyboard*\n*shortcut...*\n\n Press + \nanother new worksheet \n\n to insert \n\n*This sheet is named Sheet3*\n*and is inserted before the*\n*currently selected sheet.*\n*Now let’s delete a sheet...*\n\n Right-click on the***Sheet3***\nworksheet tab to display the \nshortcut menu \n\n Select**Delete**to remove the \nworksheet \n\n*As the worksheet contains no*\n*data, the sheet will be*\n*deleted immediately. If a*\n*worksheet contains data,*\n*Excel will ask you to confirm*\n*your actions...*\n\n Repeat steps***4***and***5***to ", + "page_start": 9, + "page_end": 9, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Continue using the previous*\n*file with this exercise, or open*\n*the file E1324 Worksheet*\n*Techniques_1.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Right-click on***Sheet1***to \ndisplay the worksheet shortcut \nmenu \n\n Select**Move or Copy**to \ndisplay the***Move or Copy***\ndialog box \n\n Click on***Create a copy***so it \nappears ticked, then click on \n**[OK]**\n\n*The new worksheet is named*\n*Sheet1 (2). Let’s create a*\n*“template” from this worksheet*\n*by deleting unwanted data...*\n\n Select the range***B7:E9***, then \n Repeat step***4***to clear the \nranges***B14:E23***,***G7:J9***and \n***G14:J23***, then press + \n\n to return to cell***A1***\n\n*Now we can copy this*\n*“template” to create additional*\n*worksheets...*\n\n Repeat steps***1***to***3***three \n\ntimes to create three copies of \nthe*template*worksheet – this \ntime without data \n\n*The final worksheet should be*\n*named Sheet1 (5)*", + "page_start": 10, + "page_end": 10, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**For Your Reference…**\nTo***insert***a***new worksheet***into a***workbook***: \n\n Click on the***New Sheet***icon to the right of \nthe worksheet tabs \n\nTo***delete***a***worksheet***from a***workbook***: \n\n Right click on the worksheet tab, then select \n**Delete**", + "page_start": 9, + "page_end": 9, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "*Continue using the previous*\n***e***\n*file with this exercise, or*\n*open the file E1324*\n*Worksheet*\n*Techniques_8.xlsx...*\n Click on the***Admin***\n\n***l***\n***i***\n\n***F***\n***e***\n***m***\n***a***\n***S***\n\nworksheet tab, hold down \n, then click on the***Shop***\n\nworksheet tab to select the \nfirst three worksheets \n\n Click in cell***A1***to select the \n Click on the***HOME***tab, then \nclick on***Italics***in the***Font***\ngroup \n\n*This will italicise the text in*\n*cell A1 on this and all other*\n*worksheets in the group…*\n\n Click on the***Maintenance***\n\nworksheet tab, then the \n***Shop***worksheet tab to see \nthat the changes have been \napplied here \n\n Click on the***IT***worksheet \n\ntab to see that the changes \nhave*not*been applied to \nthis worksheet \n\n*Since this was not part of*\n*the grouped sheets the*\n*changes have not been*\n*applied here. Notice too that*\n*clicking on a tab deselects*\n*the previous grouping*", + "page_start": 14, + "page_end": 14, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "*Continue using the*\n***e***\n\n*previous file with this*\n*exercise, or open the file*\n*E1324 Worksheet*\n*Techniques_6.xlsx...*\n Click on the***Maintenance***\n\n***l***\n***i***\n\n***F***\n***e***\n***m***\n***a***\n***S***\n\nworksheet tab \n\n*We’ll copy this completed*\n*data to another workbook...*\n\n Right-click on the \n\nworksheet tab to display \nthe shortcut menu, then \nclick on***Move or Copy***to \ndisplay the***Move or Copy***\ndialog box \n\n Click on the drop arrow for \n***To book***, then select**(new**\n**book)**\n\n Click on***Create a copy***so \nit appears ticked \n\n*This will create a new*\n*workbook as well as*\n*making a copy of the*\n*worksheet...*\n\n Click on**[OK]**\n\n*A new workbook will be*\n*created and Maintenance*\n*will be the only worksheet*\n*in the workbook…*\n\n Save the new workbook as \n***Maintenance.xlsx***, then \nclose it ", + "page_start": 12, + "page_end": 12, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Handy to Know…**\n You can copy the current worksheet using \nthe***HOME***tab by clicking on***Format***in the \n***Cells***group, then clicking on***Move or Copy***\n***Sheet***. \n\n The***Before sheet***options in the***Move or***\n***Copy***dialog box allow you to position the \ncopied worksheet where you want. ", + "page_start": 10, + "page_end": 10, + "source_file": "Excel Training Manual 1.pdf" + } + ] + }, + { + "references": { + "source_file": "Excel Training Manual 1.pdf", + "query": "I want to freeze a pane in my Excel worksheet ", + "target_page": 16, + "target_passage": "To freeze panes in a worksheet: 1. Click in the cell below and to the right of the area you want to freeze/unfreeze 2. Click on the VIEW tab 3. Click on Freeze Panes in the Window group, then select Freeze Panes ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**For Your Reference…**\nTo***freeze panes***in a***worksheet***: \n\n1. Click in the cell below and to the right of the \narea you want to freeze/unfreeze \n\n2. Click on the***VIEW***tab \n3. Click on***Freeze Panes***in the***Window***\ngroup, then select**Freeze Panes**", + "page_start": 15, + "page_end": 15, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": " Click on the***Maintenance***\nworksheet tab, then spend a few \nmoments examining the worksheet \n\n*Depending on your screen, it is*\n*possible that you won’t be able to*\n*see all of the figures on the screen*\n*at once...*\n\n Click in cell***B6***to select the cell \n Click on the***VIEW***tab, click on \n***Freeze Panes***in the***Window***\ngroup, then select**Freeze Panes**\n\n*Thin black lines appear above and*\n*to the left of the selected cell. This*\n*indicates that the areas above and*\n*to the left are frozen...*\n\n Scroll to the right until***Yearly***\n***Average***in column***L***appears next \nto column***A***\n\n Scroll down until***Overheads***in row \n Press \n\n to move to cell \n***B6***– this is our temporary home \ncell, as the cells above and to the \nleft are frozen \n\n On the***VIEW***tab, click on***Freeze***\n\n***Panes***in the***Freeze Panes***group, \nthen click on***Unfreeze Panes***to \nunfreeze the rows and columns ", + "page_start": 15, + "page_end": 15, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Handy to Know…**\n \n\nIf you want to freeze only the rows above the \nselected cell (leaving all columns unfrozen), \nselect the cell in column***A***of that row – e.g. \nto freeze rows***1***to***6***, click in cell***A7***. The \nsame applies to freezing only columns and \nleaving the rows unfrozen: select the cell in \nrow***1***. ", + "page_start": 15, + "page_end": 15, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "\n\nworksheet tab ", + "page_start": 55, + "page_end": 55, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Continue using the previous*\n*file with this exercise, or open*\n*the file E1324 Worksheet*\n*Techniques_7.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Click on the***Admin***\nworksheet tab to select the \nworksheet \n\n Right-click on the worksheet \n\ntab to display the shortcut \nmenu, then point to***Tab***\n***colour***\n\n*This will display a palette of*\n*colour options…*\n\n Click on***Red***under \n***Standard colours***to apply \nthe colour to the tab \n\n Right-click on the \n\n***Maintenance***worksheet tab \nto display the shortcut menu, \nclick on***Tab colour***, then \nclick on***Blue***under \n***Standard colours***\n\n*Notice how the Admin*\n*worksheet tab colour is now*\n*a solid rather than a*\n*gradient…*\n\n Repeat either technique to \napply the following colours: \n\n***Shop***\n***IT*** ***Yellow***\n***Green***\n\n Click on the***Admin***\nworksheet tab to view the \nresults ", + "page_start": 13, + "page_end": 13, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Continue using the previous*\n*file with this exercise, or open*\n*the file E1324 Worksheet*\n*Techniques_1.xlsx...*\n***e***\n***m***\n***a***\n***S***\n\n***e***\n***l***\n***i***\n***F***\n\n Right-click on***Sheet1***to \ndisplay the worksheet shortcut \nmenu \n\n Select**Move or Copy**to \ndisplay the***Move or Copy***\ndialog box \n\n Click on***Create a copy***so it \nappears ticked, then click on \n**[OK]**\n\n*The new worksheet is named*\n*Sheet1 (2). Let’s create a*\n*“template” from this worksheet*\n*by deleting unwanted data...*\n\n Select the range***B7:E9***, then \n Repeat step***4***to clear the \nranges***B14:E23***,***G7:J9***and \n***G14:J23***, then press + \n\n to return to cell***A1***\n\n*Now we can copy this*\n*“template” to create additional*\n*worksheets...*\n\n Repeat steps***1***to***3***three \n\ntimes to create three copies of \nthe*template*worksheet – this \ntime without data \n\n*The final worksheet should be*\n*named Sheet1 (5)*", + "page_start": 10, + "page_end": 10, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Before you begin ensure*\n*that there is a blank*\n*workbook on the screen…*\n\n Click in cell***A3***to make \n\nthis the active cell, type \n**Garden Settings**and \npress \n\n*When you press*\n*next cell down*\n*automatically becomes*\n*the active cell. By the*\n*way, even though the text*\n*looks like it is in cells A3*\n*and B3 it really only is in*\n*cell A3 – since there is*\n*nothing in B3, Excel*\n*allows the spill over to be*\n*displayed giving the*\n*illusion it is in 2 cells…*\n\n*the*\n\n Type**Pool Covers**and \n Repeat the above steps \nand enter the remaining \ntext in column***A***as shown \n\n Click in cell***B2***to make \nthis the active cell, type \n**UK**and press \n**5**\n\n*When you press*\n*the*\n*cell to the right becomes*\n*the active cell…*\n\n Enter the remaining text in \nrow***2***as shown ", + "page_start": 6, + "page_end": 6, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Before starting this*\n*exercise you MUST open*\n*the file E1317*\n*Charting_1.xlsx…*\n***n***\n***e***\n***p***\n***O***\n\n***e***\n***l***\n***i***\n***F***\n\n Click in cell***A3***, hold down \n\n, then click in cell***G7***\nto select the range***A3:G7***\n\n*Note that we have*\n*selected the data*\n*including headings but*\n*excluding the totalling…*\n\n Click on the***INSERT***tab, \n\nthen click on***Insert***\n***Column Chart***in the \n***Charts***group to see a \ngallery of***Column***chart \ntypes \n\n Under***2-D Column***, click \non***Clustered Column***\n\n*The chart will be*\n*embedded in the*\n*worksheet. The chart will*\n*be active (selected) and*\n*you’ll see additional tabs*\n*on the ribbon for working*\n*with the chart…*\n\n Point to the chart, then \n\nclick to select it and drag \nthe chart so that it is \nunderneath the data, as \nshown \n\n Click in cell***A1***to deselect ", + "page_start": 46, + "page_end": 46, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Before starting this exercise you*\n***e***\n\n***n***\n***e***\n***p***\n***O***\n*MUST open the file E705*\n*Ranges_1.xlsx...*\n\n***l***\n***i***\n***F***\n\n Click on cell***B7***to select it \n\n*Because it is the only cell*\n*selected it is the active cell…*\n\n Hold down the \n\n key and \n\nclick in cell***E10***\n\n*Even though a range has been*\n*selected, the active cell is B7 – it*\n*appears in a different colour and*\n*its contents appear in the*\n*formula bar. You can keep the*\n*range selected and change the*\n*active cell within the range using*\n*the keyboard…*\n\n Press \n several times and \n\nwatch the various cells become \nactive through the selection \n\n Click in cell***B7***, hold down the \n\nmouse button, and drag down to \ncell***C10***before releasing the \nmouse \n\n*The previous selection has*\n*disappeared and the range B7*\n*to C10 is now selected…*\n\n Press \n\ndeselect the selected cells and \nreturn the cell pointer to cell***A1***", + "page_start": 16, + "page_end": 16, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**Try This Yourself:**\n\n*Before starting this exercise*\n***e***\n\n***n***\n***e***\n***p***\n***O***\n*you MUST open the file E707*\n*Filling_1.xlsx...*\n\n***l***\n***i***\n***F***\n\n Click on cell***A4***\n Move the mouse pointer to the \n\nsmall square (the***fill handle***) \nat the bottom right corner of \nthe cell until the mouse pointer \nappears as a thin, black cross \n\n Drag the mouse pointer to \ncolumn***F***\n\n*Excel will fill the range with the*\n*first six months of the year…*\n\n Click on cell***A5***and repeat \n\nsteps***2***and***3***to create the \nseries of months with their full \nnames \n\n*You can also fill more than one*\n*row at a time…*\n**6**\n\n Select the range***A6:A12***\n Repeat steps***2***and***3***to fill \n Examine each of the series ", + "page_start": 8, + "page_end": 8, + "source_file": "Excel Training Manual 1.pdf" + } + ] + }, + { + "references": { + "source_file": "office-pdf.pdf", + "query": "What is the msodocexStructTypeArticle type value ?", + "target_page": 21, + "target_passage": "A group of nodes forming a single flow of text that should be read or searched as a contiguous block of content. Some documents have a single article and others have multiple articles.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "typedef struct_MsoDocexStructNode \n{ \n int idNode; \n MSODOCEXSTRUCTTYPE nodetype; \n WCHAR*pwchAltText; \n union \n { \n int iHeadingLevel; \n ULONG idPara; \n ULONG idDropCap; \n int iPage; \n WCHAR*pwchActualText; \n MSODOCEXLINEBREAKTYPE bt; \n int iListLevel; \n MSODOCEXLISTTYPE listType; \n ULONG idAtn; \n long cpLim; \n int shapeProperty; \n MsoDocexTableAttr tableAttr; \n WCHAR*idTableHeader; \n int iTargetParentId; \n }; \n} MSODOCEXSTRUCTNODE; ", + "page_start": 8, + "page_end": 8, + "source_file": "office-pdf.pdf" + }, + { + "text": "**shapeProperty**is for a msodocexStructTypeFigure where the content is a shape, \n\ntext box, or table cell and contains bit fields from the MSODOCEXSHAPEPROPERTY \n\nenumeration. \n\n**tableAttr**is the table cell attributes for a msodocexStructTypeTH or \n\nmsodocexStructTypeTD. \n\n**idTableHeader**is the unique id for an msodocexStructTypeTH or \n\nmsodocexStructTypeTD. \n\n**iTargetParentId**is the id of the node to reparent an msodocexStructTypeDiagram \n\nto. \n\nTable 3. Enumerated values of MSODOCEXLINEBREAKTYPE ", + "page_start": 9, + "page_end": 9, + "source_file": "office-pdf.pdf" + }, + { + "text": "struct MsoDocexTableAttr \n{ \n static constexpr unsigned int MaxSpanBits = sizeof(unsigned int)*8 / 2 \n- 1; \n static constexpr unsigned int MaxSpanValue = (1u << MaxSpanBits) - 1; \n\n unsigned int rowSpan : MaxSpanBits; \n unsigned int fRowScope : 1; \n unsigned int colSpan : MaxSpanBits; \n unsigned int fColScope : 1; \n}; ", + "page_start": 10, + "page_end": 10, + "source_file": "office-pdf.pdf" + }, + { + "text": "The**idNode**member specifies the ID of the node being passed in the call to \n\n**HrBeginStructNode**. This member may not have a value of**0**. A value of**-1**indicates that \n\nchild nodes do not use the*idNodeParent*parameter to specify this node as their parent. \n\nInstead, this node can be a parent only by enclosing child nodes in the EMF. Multiple \n\nnodes can have an ID of**-1**. If the ID is not**-1**, the value is unique across the document. \n\nThe embedded union at the end of the MSODOCEXSTRUCTNODE is interpreted \n\ndifferently depending on the type of node: \n\n**iHeadingLevel**is the heading level for an msodocexStructTypeHeading. \n\n**idPara**is the paragraph id for a P, TOCI, or ListBody. \n\n**idDropCap**is the id of an msodocexStructTypeDropCap. \n\n**iPage**is the page number for an msodocexStructTypePage. \n\n**bt**is the line break type for an msodocexStructTypeTextLine. \n\n**iListLevel**is the list level for an msodocexStructTypeList or \n\nmsodocexStructTypeListItem. \n\n**listType**is the list type for an msodocexStructTypeListItem. \n\n**idAtn**is the id of an msodocexStructTypeAnnotationBegin or \n\nmsodocexStructTypeAnnotationEnd. \n\n**cpLim**is used to determine the nesting order of tables within tables for an \n\nmsodocexStructTypeTable, msodocexStructTypeTOC, or \n\nmsodocexStructTypeListBody. ", + "page_start": 8, + "page_end": 8, + "source_file": "office-pdf.pdf" + }, + { + "text": "struct DocExComment_BeginStructNode \n{ \n DWORD ident {}; \n DWORD iComment {}; \n int idNodeParent {}; \n int iSortOrder {}; \n MSODOCEXSTRUCTNODE desn; \n BOOL fContentNode {}; \n int cwchAltText {}; \n}; ", + "page_start": 19, + "page_end": 19, + "source_file": "office-pdf.pdf" + }, + { + "text": "The members of**MsoDocexTableAttr**structure are as follows: \n\n**MaxSpanBits**Specifies the number of bits available for the rowSpan and colSpan \n\nvalues, which is 15. \n\n**MaxSpanValue**Specifies the maximum value that can be specified for the \n\nrowSpan and colSpan. \n\n**rowSpan**Specifies the number of rows that a table cell spans. \n\n**fRowScope**Specifies whether the header is Row/Both or Column. \n\n**colSpan**Specifies the number of columns that a table cell spans. ", + "page_start": 10, + "page_end": 10, + "source_file": "office-pdf.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Type ValueDescription
msodocexStructTypeParaRTLAttrA block of text within an article with right - to - left layout.
msodocexStructTypeTableRTLAttrA block of text forming a table with right - to - left layout.
msodocexStructTypeHeadingRTLAttrA heading in the text with right - to - left layout.
msodocexStructTypeListItemRTLAttrA block of text forming a list item with right - to - left layout.
msodocexStructTypeParaUnannotatableAttrA block of text within an article that is not annotable.
msodocexStructTypeTHeadThe header row area in a table.
msodocexStructTypeTBodyThe body area in a table, i. e. the portion between the THead and TFoot.
msodocexStructTypeLabelA label.
msodocexStructTypeEquationAn equation.
msodocexStructTypeIntLinkNoteRefA footnote or endnote reference mark link.
msodocexStructTypeTFootThe footer row area in a table.
", + "page_start": 22, + "page_end": 22, + "source_file": "office-pdf.pdf" + }, + { + "text": "The members of the**DocExComment_EndStructNode**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentEndStructNode. ", + "page_start": 23, + "page_end": 23, + "source_file": "office-pdf.pdf" + }, + { + "text": "The following table shows the semantic records types supported by the Microsoft Office \n\nfixed-format export feature. These types are enumerated by the \n\n**MSODOCEXSTRUCTTYPE**enumeration. Each type corresponds to a structure type that \n\ndescribes the format for the record. ", + "page_start": 13, + "page_end": 13, + "source_file": "office-pdf.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Type ValueDescription
msodocexStructTypeTOCA table of contents.
msodocexStructTypeTOCIAn item in a table of contents.
msodocexStructTypeExtLinkA link to an external resource.
msodocexStructTypeIntLinkA link to an internal resource.
msodocexStructTypeFootnoteA footnote.
msodocexStructTypeEndnoteAn endnote.
msodocexStructTypeTextboxA text box.
msodocexStructTypeHeaderA block of text forming a header.
msodocexStructTypeFooterA footer.
msodocexStructInlineShapeAn inline shape.
msodocexStructAnnotationAn annotation.
msodocexStructTypeSpanBlockA block of text.
msodocexStructTypeWorkbookA workbook.
msodocexStructTypeWorksheetA worksheet.
msodocexStructTypeMacrosheetA macrosheet.
msodocexStructTypeChartsheetA chartsheet.
msodocexStructTypeDialogsheetA dialogsheet.
msodocexStructTypeSlideA slide.
msodocexStructTypeChartA chart.
msodocexStructTypeDiagramA SmartArt diagram.
msodocexStructTypeBulletTextBuller text.
msodocexStructTypeTextLineA line of text.
msodocexStructTypeDropCapA drop cap.
msodocexStructTypeSectionA section.
msodocexStructTypeAnnotationBeginThe beginning of an annotation.
msodocexStructTypeAnnotationEndThe end of an annotation.
", + "page_start": 21, + "page_end": 21, + "source_file": "office-pdf.pdf" + } + ] + }, + { + "references": { + "source_file": "office-pdf.pdf", + "query": "What are vector colors ?", + "target_page": 29, + "target_passage": "Vector colors are any COLORREF values that the add-in receives from Publisher.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Extended Color Support**\n\nTo support extended color spaces in Publisher, additional EMF semantic records and \n\ninterfaces are needed because EMF only supports RGB (red-green-black) colors. \n\nExtended color spaces include CMYK (cyan-magenta-yellow-black) and spot color space, \n\nwhich are commonly used in commercial printing. \n\nPublisher uses color mapping to represent extended colors in the document EMF. \n\nPublisher builds a color table for all colors used in the document and replaces actual \n\ncolors with color IDs in the EMF. The type for the color ID is**COLORREF**, which is the ", + "page_start": 27, + "page_end": 27, + "source_file": "office-pdf.pdf" + }, + { + "text": "30 \n\n25 \n\n) \n. \ng \ne \nd \n( \n\n20 \n\n15 \n*x*\n*a*\n*m*\n*,*\n*z*\n10 \n*Q*\n\n5 \n\n0 \n0 40 \n*T*(K) \n\nFIG. 8: (color online) Qz, position of the maximum of S(~q), \nvs. temperature for thickness n = 8. Inset: magnetic vector \n(mx \nl ) profile for some temperatures for L = 64. Colors \nand symbols as in Fig. 2. FIG. 7: (color online) ∆ϕl(T ) vs. temperature for the surface \nplanes, l = 1 (triangles), l = 2 (squares), l = 3 (diamonds), \nl = 4 (circles). Straight lines and full symbols: n = 8. Dashed \nlines and open symbols: n = 16. \nl , my ", + "page_start": 5, + "page_end": 5, + "source_file": "1001.0510.pdf" + }, + { + "text": "**Non-Recolored Images**\n\nEMF supports CMYK*images*using GDI+. Therefore, images in the EMF may be either \n\nRGB or CMYK. If the image is a CMYK image, the add-in needs to convert the image to \n\nthe target color space. \n\nPublisher maintains a target color space for the document. The add-in can use this \n\ntarget color space by calling the**IMsoDocExporterSite::HrConvertImageColorSpace**\n\nmethod with the image's color space. ", + "page_start": 29, + "page_end": 29, + "source_file": "office-pdf.pdf" + }, + { + "text": "**Color from EPS Files**\n\nEncapsulated Postscript (EPS) is a metafile type that supports extended color spaces. \n\nUser who embed EPS images in a Publisher document expect the color information to \n\nbe used in the fixed-format output. Inside Publisher, the EPS is converted to an EMF with \n\nEPS-related semantic records. This EMF is then embedded in the page EMF file that the \n\napplication passes to the add-in. \n\nTo support color in EPS files, the add-in needs to do the following: \n\nCall the**IMsoDocExporterSite::SetEPSInfo**method for**DocExComment_EPSColor**\n\nrecords encountered in the EMF. \n\nExtract the CMYK image from the**DocExComment_EPSColorCMYKJPEG**record in \n\nthe EMF. This record contains a binary object that is the actual CMYK JPEG file \n\nstream. Use it to replace the RGB image specified in the subsequent call to the \n\n**StretchDIBits**function. \n\nThe**DocExComment_EPSColorSpotImage**record provides spot color information \n\nfor the subsequent RGB image, which is always an index image. The add-in needs \n\nto convert the spot image to the target color space. \n\nThe add-in can optionally call the**IMsoDocExporterSite:: HrGetSpotRecolorInfo**\n\nmethod to obtain the document's target color from Publisher. Then the add-in can \n\nrecolor the subsequent RGB image by mapping colors from the palette of the RGB \n\nimage to**flTintMin**and**flTintMax**tints specified in the \n\n**DoxExComment_EPSColorSpotImage**record. The luminosity for each color of the \n\npalette is used for the mapping. ", + "page_start": 29, + "page_end": 29, + "source_file": "office-pdf.pdf" + }, + { + "text": "The members of the**DocExComment_EPSColorSpotImage**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentEPSSpotImage. \n\n**cmykAlt**Specifies a CMYK color ID. \n\n**rgbAlt**Specifies an RGB color ID. \n\n**flTintMin**Specifies the minimum tint. \n\n**flTintMax**Specifies the maximum tint. \n\n**szSpotName[1]**Specifies a variable length, zero-terminated string that contains \n\nthe spot name. ", + "page_start": 27, + "page_end": 27, + "source_file": "office-pdf.pdf" + }, + { + "text": "**DocExComment_EPSColorCMYKJPEG**\n\nThe**DocExComment_EPSColorCMYKJPEG**structure specifies the start, in the EMF, of a \n\nbinary object that is a CMYKJPEG file stream. For more information about this structure, \n\nsee the section Extended Color Support. ", + "page_start": 26, + "page_end": 26, + "source_file": "office-pdf.pdf" + }, + { + "text": "The members of the**DocExComment_ColorInfo**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentColorInfo. \n\n**clr**Specifies a color ID that represents a current color state in the EMF. \n\n**fForeColor**Specifies whether the color ID in the**clr**member represents a \n\nforeground color or a background color. If this member has a value of**true**, the ", + "page_start": 17, + "page_end": 17, + "source_file": "office-pdf.pdf" + }, + { + "text": "typedef struct \n{ \n DWORD ident {}; \n DWORD iComment {}; \n COLORREF cmykAlt { 0 }; \n COLORREF rgbAlt { 0 }; \n float flTintMin {}; \n float flTintMax {}; \n char szSpotName[1]; \n} DocExComment_EPSColorSpotImage; ", + "page_start": 27, + "page_end": 27, + "source_file": "office-pdf.pdf" + }, + { + "text": "Christoph Kayser, Wolfgang Einhäuser, Olaf Dümmer, Peter \nKönig, and Konrad Körding. Extracting slow subspaces \nfrom natural videos leads to complex cells. In Artificial \nNeural Networks—ICANN 2001: International Conference \nVienna, Austria, August 21–25, 2001 Proceedings 11, pages \n1075–1080. Springer, 2001. \n\nRajesh PN Rao and Dana H Ballard. Predictive coding \nin the visual cortex: a functional interpretation of some \nextra-classical receptive-field effects. Nature neuroscience, \n2(1):79–87, 1999. \n\nGustav Larsson, Michael Maire, and Gregory Shakhnarovich. \nLearning representations for automatic colorization. 2016. \n\nGustav Larsson, Michael Maire, and Gregory Shakhnarovich. \nColorization as a proxy task for visual understanding. 2017. \n\nOlga Russakovsky, Jia Deng, Hao Su, Jonathan Krause, San- \njeev Satheesh, Sean Ma, Zhiheng Huang, Andrej Karpathy, \nAditya Khosla, Michael Bernstein, Alexander C. Berg, and ", + "page_start": 11, + "page_end": 11, + "source_file": "arxiv3.pdf" + }, + { + "text": "**Figure 6.**Chain traces. Each color signifies an individual chain. \n\n**Figure 7.**Posterior estimates of the*α*parameter plotted against the prior for two synthetic subjects, \none from each group. \n(cid:7) (cid:4) \n\n# Sample from the model prior \nprior_chains = sample ( model , Prior (), 1000 ) \n# Rename parameters from the prior chains to match the posterior chains \nrenamed_prior_chains = rename_chains ( prior_chains , model ) \n\n# Plot the posterior and prior for the first subject \nplot_parameters ( renamed_prior_chains [: ,1 :1 ,: ], renamed_posterior_chains [:,1:1,:]) \n# Visualize the true alpha value \nvline !([ data [1,: Alpha ]] , line =: dash , color = : darkorange2 , label = \" Generative Alpha \" ) \n\n# Plot the posterior and prior for the last subject \nplot_parameters ( renamed_prior_chains [: , 10 : 10 ,: ], renamed_posterior_chains [:, 10 : 10 ,: ]) \n# Visualize the true alpha value \nvline !([ data [ 3000 ,: Alpha ]], line = : dash , color = : darkorange2 , label = \" Generative Alpha \") \n(cid:6) (cid:5) ", + "page_start": 26, + "page_end": 26, + "source_file": "pubmed7_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "office-pdf.pdf", + "query": "What are msodocexMetadataComments ?", + "target_page": 35, + "target_passage": "Miscellaneous comments relevant to the document.", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "The members of the**DocExComment_EPSColorCMYKJPEG**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentEPSCMYKJPEG; ", + "page_start": 26, + "page_end": 26, + "source_file": "office-pdf.pdf" + }, + { + "text": "The members of the**DocExComment_EndStructNode**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentEndStructNode. ", + "page_start": 23, + "page_end": 23, + "source_file": "office-pdf.pdf" + }, + { + "text": "The members of the**DocExComment_EPSColor**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentEPSColor. \n\n**colorInfo[]**Specifies the color information for the EPS file. The add-in should pass \n\nthis information to Publisher using the**IMsoDocExporterSite::SetEPSInfo**method. ", + "page_start": 26, + "page_end": 26, + "source_file": "office-pdf.pdf" + }, + { + "text": "The members of the**DocExComment_ColorEnable**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentColorMapEnable. \n\n**fEnable**Specifies whether color mapping is enabled for subsequent content. A \n\nvalue of**true**indicates that color mapping is enabled. A value of**false**indicates \n\nthat color mapping is disabled. ", + "page_start": 18, + "page_end": 18, + "source_file": "office-pdf.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
ValueDescription
msodocexMetadataTitleThe title of the document.
msodocexMetadataAuthorThe author of the document
msodocexMetadataSubjectString that describes the subject matter of the document ( for example, business or science ).
msodocexMetadataKeywordsKeyword relevant to the document content.
msodocexMetadataCreatorThe creator of the document, possibly distinct from the author.
msodocexMetadataProducerThe producer of the document, possibly distinct from the author or creator.
msodocexMetadataCategoryString that describes the type of document ( for example, memo, article, or book ).
msodocexMetadataStatusStatus of the document. This field can reflect where the document is in the publication process ( for example, draft or final ).
msodocexMetadataCommentsMiscellaneous comments relevant to the document.
", + "page_start": 34, + "page_end": 34, + "source_file": "office-pdf.pdf" + }, + { + "text": "The*metadatatype*parameter specifies the type of metadata represented by the string. \n\nThe*metadatatype*parameter must be one of the following values from the \n\nMSODOCEXMETADATA enumeration type. \n\nTable 8. Enumerated values of MSODOCEXMETADATA ", + "page_start": 34, + "page_end": 34, + "source_file": "office-pdf.pdf" + }, + { + "text": "The*metadatatype*parameter specifies the type of metadata represented by the \n\n**FILETIME**structure. The*metadatatype*parameter must be one of the following values \n\nfrom the MSODOCEXMETADATA enumeration type. \n\nTable 9. Enumerated values of MSODOCEXMETADATA ", + "page_start": 35, + "page_end": 35, + "source_file": "office-pdf.pdf" + }, + { + "text": "The members of the**DocExComment_EPSColorSpotImage**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentEPSSpotImage. \n\n**cmykAlt**Specifies a CMYK color ID. \n\n**rgbAlt**Specifies an RGB color ID. \n\n**flTintMin**Specifies the minimum tint. \n\n**flTintMax**Specifies the maximum tint. \n\n**szSpotName[1]**Specifies a variable length, zero-terminated string that contains \n\nthe spot name. ", + "page_start": 27, + "page_end": 27, + "source_file": "office-pdf.pdf" + }, + { + "text": "The members of**DocExComment_ExternalHyperlink(Rctfv)**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentExternalHyperlink or msodocexcommentExternalHyperlinkRctfv. \n\n**rcdvRegion**and**rctfvRegion**A union that specifies the region of the page that is \n\nthe source location of the hyperlink. The region can be represented as a RECT type \n\n(rcdvRegion) that uses device pixels as the unit of measure, or as a structure that \n\ncontains floating-point coordinates (rctfvRegion), in which case the unit of \n\nmeasure is points. \n\nIf the**iComment**member is equal to msodocexcommentExternalHyperlink, the \n\nadd-in should use**rcdvRegion**. In this case, the add-in needs to apply the current \n\nEMF transformation matrix to**rcdvRegion**to convert it to the page space. \n\nIf the**iComment**member is equal to msodocexcommentExternalHyperlinkRctfv, \n\nthe add-in should use**rctfvRegion**. In this case,**rctfvRegion**is already in the page \n\nspace, so no transformation is needed. ", + "page_start": 15, + "page_end": 15, + "source_file": "office-pdf.pdf" + }, + { + "text": "The members of the**DocExComment_ColorInfo**structure are as follows: \n\n**ident**Specifies the constant value, msodocexsignature, which identifies this EMF \n\ncomment as containing semantic information. \n\n**iComment**Specifies the MSODOCEXCOMMENT value, \n\nmsodocexcommentColorInfo. \n\n**clr**Specifies a color ID that represents a current color state in the EMF. \n\n**fForeColor**Specifies whether the color ID in the**clr**member represents a \n\nforeground color or a background color. If this member has a value of**true**, the ", + "page_start": 17, + "page_end": 17, + "source_file": "office-pdf.pdf" + } + ] + }, + { + "references": { + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf", + "query": "What are the total operating expenses of Wikimedia foundation in 2024 ?", + "target_page": 6, + "target_passage": "178,471,109", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**(6) Functional Allocation of Expenses**\n\nCosts of providing the Foundation’s activities have been summarized below on a functional basis. \nPrograms comprise various initiatives that focus on (1) building the technological and operating platform \nthat enables the Foundation to function sustainably as a top global internet organization, (2) strengthening, \ngrowing, and increasing diversity of the Wikimedia communities, and (3) accelerating impact by investing in \nkey geographic areas, mobile application development, and bottom-up innovation, all of which support \nWikipedia and other wiki-based projects. This also includes costs related to the Wikimedia Endowment for \nwhich the Foundation is reimbursed. The allocation between programs, general and administrative, and \nfundraising expenses is based on personnel and related costs and other operating expenses such as rent \nand office expenses using estimates of time spent or percentage of utilization by headcounts, as well as ", + "page_start": 15, + "page_end": 15, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "and free to everyone in the world, the Foundation's cost related to this collaborative arrangement is \nincluded within awards and grants in the statement of activities. The amount included within awards \nand grants was $6.1 million and $4.1 million for the years ended June 30, 2024 and 2023, respectively. \n\n***(p) Use of Estimates***\n\nThe preparation of financial statements in conformity with U.S. generally accepted accounting \nprinciples requires management to make estimates and assumptions that affect the amounts reported \nin the consolidated financial statements and accompanying notes. Items subject to such estimates and \nassumptions include the investment valuations, useful lives of fixed assets, and the valuation of \ncontributed services. Accordingly, actual results could differ from those estimates. \n\n***(q) Reclassifications***\n\nCertain reclassifications have been made in the financial statements to conform 2023 information to the \n2024 presentation. The Foundation had a change in accounting policy to present unrealized gains and \nlosses on investments separately from investment income, net. This resulted in a reclassification of \n$3,547,510 from investment income, net to unrealized gains on investments within the statement of \nactivities. The Foundation also had a change in accounting policy to no longer present the Wikimania \nevent as special event expense, net in the statement of activities. Revenue from registration sales is \nnow reported within other income, net, and expenses are reported within travel and conference \nexpenses. This resulted in a reclassification of $698,141 from special event expenses to travel and \nconference expenses in the statement of activities. ", + "page_start": 12, + "page_end": 12, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "The Foundation’s liquidity management includes a policy of structuring its financial assets to be available to \nmeet its general expenditures, liabilities, grant-making, and other obligations as they come due. Cash and \ncash equivalents as reported on the consolidated balance sheet at June 30, 2024 and 2023, are the \nprimary liquid resources used by the Foundation to meet these obligations. Financial assets invested in the \nshort-term and long-term investments can be liquidated at any time as needed. \n\n**(10) Related Party Transactions**\n\nThe Wikimedia Endowment began operations as a standalone tax-exempt 501(c)(3) organization on \nSeptember 30, 2023, with the mission to act as a permanent fund that can support in perpetuity the \noperations and activities of current and future Wikimedia projects, which are projects that are approved by \nand advance the purposes of the Foundation or its successor if the Foundation ceases to exist. The \nFoundation does not have control or controlling financial interest in the Wikimedia Endowment and the \nWikimedia Endowment has a separate Board of Directors, but the Wikimedia Endowment is considered a \nrelated party to the Foundation because Wikimedia Endowment management is also management at the \nFoundation. \n\nDuring the fiscal year ended June 30, 2024, the Foundation recognized revenue of $2,063,195 related to \nservices provided to the Wikimedia Endowment, primarily for fundraising and general and administrative \nsupport under the terms of a cost sharing agreement. These costs are included within the Foundation's \nexpenses based on the nature of the cost. The revenue from the Wikimedia Endowment reimbursing the \ncosts is recorded within other income, net. ", + "page_start": 18, + "page_end": 18, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "The Foundation also receives donations on behalf of the Wikimedia Endowment as well as transfers \nadditional Foundation donations to the Endowment monthly. Donations that are donor-specified for the \nWikimedia Endowment are not recognized as revenue to the Foundation, whereas donations that are not \ndonor-specified for the Wikimedia Endowment are recognized both as contributions revenue and awards \nand grants expense to the Foundation. The Foundation transferred $10,706,812 donor-designated gifts and \n$624,137 Foundation gifts to the Wikimedia Endowment during the year ended June 30, 2024. As of \nJune 30, 2024, the Foundation owed the Wikimedia Endowment $525,607 for donations to be transferred \nto the Wikimedia Endowment for the month of June 2024. \n\nDuring the fiscal year ended June 30, 2024, the Wikimedia Endowment also provided the Foundation with \ngrants of $1,500,000 for MediaWiki improvements, $600,000 for the Abstract Wikipedia project, and \n$500,000 for exploring strategies for expanding beyond the Foundation’s existing audiences of consumers \nand contributors. The grants are recorded as contributions with donor restrictions and within net assets with \ndonor restrictions as of June 30, 2024. ", + "page_start": 19, + "page_end": 19, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**(1) Organization and Summary of Significant Accounting Policies**\n\n***(a) Organization and Purpose***\n\nThe accompanying consolidated financial statements present the financial position, change in net \nassets and cash flows of the Wikimedia Foundation, Inc. (the Foundation) and Wikimedia, LLC. \n\nThe Foundation is the nonprofit organization that operates Wikipedia, a free online encyclopedia. \nBased in San Francisco, California, the Foundation is a 501(c)(3) charity that is funded primarily \nthrough donations and contributions. \n\nThe Foundation also operates Wikimedia, LLC, a Delaware Limited Liability Company, with the \nFoundation as its Sole Member. The Wikimedia, LLC is organized and operated exclusively for \ncharitable and educational purposes within the meaning of section 501(c)(3) of the Internal Revenue \nCode and is a disregarded entity for tax purposes. \n\n***(b) Risks and Uncertainties***\n\nThe Foundation’s operations are funded primarily by public donations from individuals as well as gifts \nfrom foundations and corporations. External factors such as global geopolitics, recession, and currency \nmarkets may impact our ability to raise funds. As of the date of this report, the Foundation has not \nexperienced an adverse impact on its business operations. \n\n***(c) Income Taxes***\n\nThe Foundation is exempt from federal income tax under Section 501(c)(3) of the Internal Revenue \nCode and from state income tax under Chapter 220.13 of the Florida Statutes and Sections 23701d of \nRevenue and Taxation Code of the State of California. The Internal Revenue Service has determined \nthat the Foundation is not a private foundation and contributions to it qualify as charitable contributions. ", + "page_start": 7, + "page_end": 7, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**WIKIMEDIA FOUNDATION, INC.**\n\n\n \n \n \n \n [html]\n
June 30.2024 and 2023Assets2024
2023
Current assets :Cash and cash equivalents$82.845.159
75.808.401Contributions receivable856.657
Short - term investments116.074.763
132.216.667Prepaid expenses and other current assets5.722.457
5.569.485Total current assets205.499.036
213.594.553Restricted cash1.428.542
1.396.717Long - term investments67.291.224
43.265.786Right of use asset - operating lease, net
1.821.174Property and equipment, net11.826.136
14.045.139Contributions receivable715.000
Total assets$
286.759.938274.123.369Liabilities and Net AssetsCurrent liabilities :
Accounts payable
$
4.009.5822.783.904Accrued expenses7.959.558
6.922.259Lease liability417.756
1.640.735Donations payable to Wikimedia Endowment525.607
5.274.448Other liabilities2.292.045
2.124.939Total current liabilities15.204.548
18.746.285Lease liability
405.748Total liabilities$
15.204.54819.152.033Net assets :Net assets without donor restrictions
265.859.067
249.088.663Net assets with donor restrictions5.696.323
5.882.673Total net assets271.555.390
254.971.336Total liabilities and net assets$
86.759.938274.123.369
", + "page_start": 4, + "page_end": 4, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**2024** **2023**\n\nNet assets without donor restrictions: \n\nSupport and revenue: \n\nContributions of cash and other financial assets \nContributions of nonfinancial assets and services \nForeign currency losses \nOther income, net \nInvestment income, net \nRelease of net assets with donor restrictions \n\n$ \n\n168,212,977 \n263,476 \n(300,907) \n5,629,773 \n5,096,842 \n6,481,350 164,121,185 \n1,040,453 \n(94,868) \n3,824,240 \n3,002,929 \n4,732,654 \n\nTotal support and revenue 185,383,511 176,626,593 \n\nOperating expenses: \n\nSalaries and benefits \nAwards and grants \nInternet hosting \nIn-kind service expenses \nDonation processing expenses \nProfessional service expenses \nOther operating expenses \nTravel and conferences \nDepreciation and amortization 106,793,960 \n26,820,080 \n3,116,445 \n263,476 \n7,547,718 \n13,090,040 \n10,798,140 \n5,824,979 \n4,216,271 101,305,706 \n24,433,682 \n3,120,819 \n1,040,453 \n6,855,680 \n15,464,635 \n7,393,982 \n4,878,359 \n4,602,064 ", + "page_start": 5, + "page_end": 5, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**Independent Auditors’ Report**\n\nThe Board of Trustees \nWikimedia Foundation, Inc: \n\n*Opinion*\n\nWe have audited the consolidated financial statements of Wikimedia Foundation, Inc and its subsidiary (the \nFoundation), which comprise the consolidated statements of financial position as of June 30, 2024 and 2023, \nand the related consolidated statements of activities, and cash flows for the years then ended, and the related \nnotes to the consolidated financial statements. \n\nIn our opinion, the accompanying consolidated financial statements present fairly, in all material respects, the \nfinancial position of the Foundation as of June 30, 2024 and 2023, and the results of its operations and its cash \nflows for the years then ended in accordance with U.S. generally accepted accounting principles. \n\n*Basis for Opinion*\n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States of \nAmerica (GAAS). Our responsibilities under those standards are further described in the Auditors’ \nResponsibilities for the Audit of the Consolidated Financial Statements section of our report. We are required to \nbe independent of the Foundation and to meet our other ethical responsibilities, in accordance with the relevant \nethical requirements relating to our audits. We believe that the audit evidence we have obtained is sufficient \nand appropriate to provide a basis for our audit opinion. ", + "page_start": 2, + "page_end": 2, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "For example (unaudited): \n\n• Wikipedia and the other projects operated by the Foundation receive more than 19.4 billion pageviews \n\nper month, making them one of the most popular Web properties worldwide. Wikipedia is available in \nmore than 332 languages and contains more than 63 million articles contributed by a global volunteer \ncommunity. \n\n• For the year ended June 30, 2024, the educational content of the Foundation’s largest project, \nWikipedia, grew by approximately 1.9 million articles to approximately 63.4 million articles. \n\n• For the year ended June 30, 2024, volunteers added approximately 12.2 million images, movies, and \nsound files to the Foundation’s multimedia repository, making the total 106.7 million files. \n\n• Volunteers also contribute in several ways to the Foundation’s wiki software: volunteer software \n\ndevelopers add new functionality to the code base, and volunteer language specialists add to the code \nbase by translating the wiki interface into different languages. During the year ended June 30, 2024, \nthere were 47,773 commits merged, through the efforts of approximately 511 authors/contributors, of \nwhich 8,161 commits were through the efforts of approximately 244 volunteers. ", + "page_start": 17, + "page_end": 17, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**WIKIMEDIA FOUNDATION, INC.**\n\n\n \n \n \n \n [html]\n
Table of Contents
Page ( s )
Independent Auditors ’ Report1
Consolidated Financial Statements :
Balance Sheets3
Statements of Activities4
Statements of Cash Flows5
Notes to Consolidated Financial Statements6 – 18
\n\n\n \n \n \n \n [html]\n
Page ( s )
Independent Auditors ’ Report1
Consolidated Financial Statements :
Balance Sheets3
Statements of Activities4
Statements of Cash Flows5
Notes to Consolidated Financial Statements6 – 18
", + "page_start": 1, + "page_end": 1, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + } + ] + }, + { + "references": { + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf", + "query": "What external events can affect Wikimedia Fundation in raising funds ?", + "target_page": 8, + "target_passage": "External factors such as global geopolitics, recession, and currency markets may impact our ability to raise funds.", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "The Foundation also receives donations on behalf of the Wikimedia Endowment as well as transfers \nadditional Foundation donations to the Endowment monthly. Donations that are donor-specified for the \nWikimedia Endowment are not recognized as revenue to the Foundation, whereas donations that are not \ndonor-specified for the Wikimedia Endowment are recognized both as contributions revenue and awards \nand grants expense to the Foundation. The Foundation transferred $10,706,812 donor-designated gifts and \n$624,137 Foundation gifts to the Wikimedia Endowment during the year ended June 30, 2024. As of \nJune 30, 2024, the Foundation owed the Wikimedia Endowment $525,607 for donations to be transferred \nto the Wikimedia Endowment for the month of June 2024. \n\nDuring the fiscal year ended June 30, 2024, the Wikimedia Endowment also provided the Foundation with \ngrants of $1,500,000 for MediaWiki improvements, $600,000 for the Abstract Wikipedia project, and \n$500,000 for exploring strategies for expanding beyond the Foundation’s existing audiences of consumers \nand contributors. The grants are recorded as contributions with donor restrictions and within net assets with \ndonor restrictions as of June 30, 2024. ", + "page_start": 19, + "page_end": 19, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**(6) Functional Allocation of Expenses**\n\nCosts of providing the Foundation’s activities have been summarized below on a functional basis. \nPrograms comprise various initiatives that focus on (1) building the technological and operating platform \nthat enables the Foundation to function sustainably as a top global internet organization, (2) strengthening, \ngrowing, and increasing diversity of the Wikimedia communities, and (3) accelerating impact by investing in \nkey geographic areas, mobile application development, and bottom-up innovation, all of which support \nWikipedia and other wiki-based projects. This also includes costs related to the Wikimedia Endowment for \nwhich the Foundation is reimbursed. The allocation between programs, general and administrative, and \nfundraising expenses is based on personnel and related costs and other operating expenses such as rent \nand office expenses using estimates of time spent or percentage of utilization by headcounts, as well as ", + "page_start": 15, + "page_end": 15, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "For example (unaudited): \n\n• Wikipedia and the other projects operated by the Foundation receive more than 19.4 billion pageviews \n\nper month, making them one of the most popular Web properties worldwide. Wikipedia is available in \nmore than 332 languages and contains more than 63 million articles contributed by a global volunteer \ncommunity. \n\n• For the year ended June 30, 2024, the educational content of the Foundation’s largest project, \nWikipedia, grew by approximately 1.9 million articles to approximately 63.4 million articles. \n\n• For the year ended June 30, 2024, volunteers added approximately 12.2 million images, movies, and \nsound files to the Foundation’s multimedia repository, making the total 106.7 million files. \n\n• Volunteers also contribute in several ways to the Foundation’s wiki software: volunteer software \n\ndevelopers add new functionality to the code base, and volunteer language specialists add to the code \nbase by translating the wiki interface into different languages. During the year ended June 30, 2024, \nthere were 47,773 commits merged, through the efforts of approximately 511 authors/contributors, of \nwhich 8,161 commits were through the efforts of approximately 244 volunteers. ", + "page_start": 17, + "page_end": 17, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**(1) Organization and Summary of Significant Accounting Policies**\n\n***(a) Organization and Purpose***\n\nThe accompanying consolidated financial statements present the financial position, change in net \nassets and cash flows of the Wikimedia Foundation, Inc. (the Foundation) and Wikimedia, LLC. \n\nThe Foundation is the nonprofit organization that operates Wikipedia, a free online encyclopedia. \nBased in San Francisco, California, the Foundation is a 501(c)(3) charity that is funded primarily \nthrough donations and contributions. \n\nThe Foundation also operates Wikimedia, LLC, a Delaware Limited Liability Company, with the \nFoundation as its Sole Member. The Wikimedia, LLC is organized and operated exclusively for \ncharitable and educational purposes within the meaning of section 501(c)(3) of the Internal Revenue \nCode and is a disregarded entity for tax purposes. \n\n***(b) Risks and Uncertainties***\n\nThe Foundation’s operations are funded primarily by public donations from individuals as well as gifts \nfrom foundations and corporations. External factors such as global geopolitics, recession, and currency \nmarkets may impact our ability to raise funds. As of the date of this report, the Foundation has not \nexperienced an adverse impact on its business operations. \n\n***(c) Income Taxes***\n\nThe Foundation is exempt from federal income tax under Section 501(c)(3) of the Internal Revenue \nCode and from state income tax under Chapter 220.13 of the Florida Statutes and Sections 23701d of \nRevenue and Taxation Code of the State of California. The Internal Revenue Service has determined \nthat the Foundation is not a private foundation and contributions to it qualify as charitable contributions. ", + "page_start": 7, + "page_end": 7, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**WIKIMEDIA FOUNDATION, INC.**\n\n\n \n \n \n \n [html]\n
June 30.2024 and 2023Assets2024
2023
Current assets :Cash and cash equivalents$82.845.159
75.808.401Contributions receivable856.657
Short - term investments116.074.763
132.216.667Prepaid expenses and other current assets5.722.457
5.569.485Total current assets205.499.036
213.594.553Restricted cash1.428.542
1.396.717Long - term investments67.291.224
43.265.786Right of use asset - operating lease, net
1.821.174Property and equipment, net11.826.136
14.045.139Contributions receivable715.000
Total assets$
286.759.938274.123.369Liabilities and Net AssetsCurrent liabilities :
Accounts payable
$
4.009.5822.783.904Accrued expenses7.959.558
6.922.259Lease liability417.756
1.640.735Donations payable to Wikimedia Endowment525.607
5.274.448Other liabilities2.292.045
2.124.939Total current liabilities15.204.548
18.746.285Lease liability
405.748Total liabilities$
15.204.54819.152.033Net assets :Net assets without donor restrictions
265.859.067
249.088.663Net assets with donor restrictions5.696.323
5.882.673Total net assets271.555.390
254.971.336Total liabilities and net assets$
86.759.938274.123.369
", + "page_start": 4, + "page_end": 4, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**WIKIMEDIA FOUNDATION, INC.**\n\n\n \n \n \n \n [html]\n
Table of Contents
Page ( s )
Independent Auditors ’ Report1
Consolidated Financial Statements :
Balance Sheets3
Statements of Activities4
Statements of Cash Flows5
Notes to Consolidated Financial Statements6 – 18
\n\n\n \n \n \n \n [html]\n
Page ( s )
Independent Auditors ’ Report1
Consolidated Financial Statements :
Balance Sheets3
Statements of Activities4
Statements of Cash Flows5
Notes to Consolidated Financial Statements6 – 18
", + "page_start": 1, + "page_end": 1, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**4.7. Involve NGOs, charities and business associations**\nAs a final note and recommendation of this report, we'll note that, in comparison with hackers and \n\npublic officers, there are other parties that could and should play a role in Open Data adoption much \n\nbigger than what they have had so far. \n\nNGOs and charities, as well as professionals or business associations, all have lots to gain from \n\nOpen Data but don't seem, in many cases, to have realized this yet. Members of the first category \n\nshould routinely ask for support directly to Open Data civic hackers to gather (either from \n\ngovernment or citizens) more up to date information that is specifically relevant for their \n\ncampaigns. \n\nThe other associations, instead, should be much more active both in publishing Open Data about ", + "page_start": 31, + "page_end": 31, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "The Foundation’s liquidity management includes a policy of structuring its financial assets to be available to \nmeet its general expenditures, liabilities, grant-making, and other obligations as they come due. Cash and \ncash equivalents as reported on the consolidated balance sheet at June 30, 2024 and 2023, are the \nprimary liquid resources used by the Foundation to meet these obligations. Financial assets invested in the \nshort-term and long-term investments can be liquidated at any time as needed. \n\n**(10) Related Party Transactions**\n\nThe Wikimedia Endowment began operations as a standalone tax-exempt 501(c)(3) organization on \nSeptember 30, 2023, with the mission to act as a permanent fund that can support in perpetuity the \noperations and activities of current and future Wikimedia projects, which are projects that are approved by \nand advance the purposes of the Foundation or its successor if the Foundation ceases to exist. The \nFoundation does not have control or controlling financial interest in the Wikimedia Endowment and the \nWikimedia Endowment has a separate Board of Directors, but the Wikimedia Endowment is considered a \nrelated party to the Foundation because Wikimedia Endowment management is also management at the \nFoundation. \n\nDuring the fiscal year ended June 30, 2024, the Foundation recognized revenue of $2,063,195 related to \nservices provided to the Wikimedia Endowment, primarily for fundraising and general and administrative \nsupport under the terms of a cost sharing agreement. These costs are included within the Foundation's \nexpenses based on the nature of the cost. The revenue from the Wikimedia Endowment reimbursing the \ncosts is recorded within other income, net. ", + "page_start": 18, + "page_end": 18, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**Independent Auditors’ Report**\n\nThe Board of Trustees \nWikimedia Foundation, Inc: \n\n*Opinion*\n\nWe have audited the consolidated financial statements of Wikimedia Foundation, Inc and its subsidiary (the \nFoundation), which comprise the consolidated statements of financial position as of June 30, 2024 and 2023, \nand the related consolidated statements of activities, and cash flows for the years then ended, and the related \nnotes to the consolidated financial statements. \n\nIn our opinion, the accompanying consolidated financial statements present fairly, in all material respects, the \nfinancial position of the Foundation as of June 30, 2024 and 2023, and the results of its operations and its cash \nflows for the years then ended in accordance with U.S. generally accepted accounting principles. \n\n*Basis for Opinion*\n\nWe conducted our audits in accordance with auditing standards generally accepted in the United States of \nAmerica (GAAS). Our responsibilities under those standards are further described in the Auditors’ \nResponsibilities for the Audit of the Consolidated Financial Statements section of our report. We are required to \nbe independent of the Foundation and to meet our other ethical responsibilities, in accordance with the relevant \nethical requirements relating to our audits. We believe that the audit evidence we have obtained is sufficient \nand appropriate to provide a basis for our audit opinion. ", + "page_start": 2, + "page_end": 2, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "and free to everyone in the world, the Foundation's cost related to this collaborative arrangement is \nincluded within awards and grants in the statement of activities. The amount included within awards \nand grants was $6.1 million and $4.1 million for the years ended June 30, 2024 and 2023, respectively. \n\n***(p) Use of Estimates***\n\nThe preparation of financial statements in conformity with U.S. generally accepted accounting \nprinciples requires management to make estimates and assumptions that affect the amounts reported \nin the consolidated financial statements and accompanying notes. Items subject to such estimates and \nassumptions include the investment valuations, useful lives of fixed assets, and the valuation of \ncontributed services. Accordingly, actual results could differ from those estimates. \n\n***(q) Reclassifications***\n\nCertain reclassifications have been made in the financial statements to conform 2023 information to the \n2024 presentation. The Foundation had a change in accounting policy to present unrealized gains and \nlosses on investments separately from investment income, net. This resulted in a reclassification of \n$3,547,510 from investment income, net to unrealized gains on investments within the statement of \nactivities. The Foundation also had a change in accounting policy to no longer present the Wikimania \nevent as special event expense, net in the statement of activities. Revenue from registration sales is \nnow reported within other income, net, and expenses are reported within travel and conference \nexpenses. This resulted in a reclassification of $698,141 from special event expenses to travel and \nconference expenses in the statement of activities. ", + "page_start": 12, + "page_end": 12, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + } + ] + }, + { + "references": { + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf", + "query": "What include Wikimedia Fundation restricted cash ?", + "target_page": 9, + "target_passage": "Restricted cash includes standby letters of credit for (1) the Foundation’s headquarters office lease and (2) one of the Foundation’s Employer of Record responsible for administering compensation and benefits for non-US personnel.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "The Foundation also receives donations on behalf of the Wikimedia Endowment as well as transfers \nadditional Foundation donations to the Endowment monthly. Donations that are donor-specified for the \nWikimedia Endowment are not recognized as revenue to the Foundation, whereas donations that are not \ndonor-specified for the Wikimedia Endowment are recognized both as contributions revenue and awards \nand grants expense to the Foundation. The Foundation transferred $10,706,812 donor-designated gifts and \n$624,137 Foundation gifts to the Wikimedia Endowment during the year ended June 30, 2024. As of \nJune 30, 2024, the Foundation owed the Wikimedia Endowment $525,607 for donations to be transferred \nto the Wikimedia Endowment for the month of June 2024. \n\nDuring the fiscal year ended June 30, 2024, the Wikimedia Endowment also provided the Foundation with \ngrants of $1,500,000 for MediaWiki improvements, $600,000 for the Abstract Wikipedia project, and \n$500,000 for exploring strategies for expanding beyond the Foundation’s existing audiences of consumers \nand contributors. The grants are recorded as contributions with donor restrictions and within net assets with \ndonor restrictions as of June 30, 2024. ", + "page_start": 19, + "page_end": 19, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "The Foundation’s liquidity management includes a policy of structuring its financial assets to be available to \nmeet its general expenditures, liabilities, grant-making, and other obligations as they come due. Cash and \ncash equivalents as reported on the consolidated balance sheet at June 30, 2024 and 2023, are the \nprimary liquid resources used by the Foundation to meet these obligations. Financial assets invested in the \nshort-term and long-term investments can be liquidated at any time as needed. \n\n**(10) Related Party Transactions**\n\nThe Wikimedia Endowment began operations as a standalone tax-exempt 501(c)(3) organization on \nSeptember 30, 2023, with the mission to act as a permanent fund that can support in perpetuity the \noperations and activities of current and future Wikimedia projects, which are projects that are approved by \nand advance the purposes of the Foundation or its successor if the Foundation ceases to exist. The \nFoundation does not have control or controlling financial interest in the Wikimedia Endowment and the \nWikimedia Endowment has a separate Board of Directors, but the Wikimedia Endowment is considered a \nrelated party to the Foundation because Wikimedia Endowment management is also management at the \nFoundation. \n\nDuring the fiscal year ended June 30, 2024, the Foundation recognized revenue of $2,063,195 related to \nservices provided to the Wikimedia Endowment, primarily for fundraising and general and administrative \nsupport under the terms of a cost sharing agreement. These costs are included within the Foundation's \nexpenses based on the nature of the cost. The revenue from the Wikimedia Endowment reimbursing the \ncosts is recorded within other income, net. ", + "page_start": 18, + "page_end": 18, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "**WIKIMEDIA FOUNDATION, INC.**\n\n\n \n \n \n \n [html]\n
June 30.2024 and 2023Assets2024
2023
Current assets :Cash and cash equivalents$82.845.159
75.808.401Contributions receivable856.657
Short - term investments116.074.763
132.216.667Prepaid expenses and other current assets5.722.457
5.569.485Total current assets205.499.036
213.594.553Restricted cash1.428.542
1.396.717Long - term investments67.291.224
43.265.786Right of use asset - operating lease, net
1.821.174Property and equipment, net11.826.136
14.045.139Contributions receivable715.000
Total assets$
286.759.938274.123.369Liabilities and Net AssetsCurrent liabilities :
Accounts payable
$
4.009.5822.783.904Accrued expenses7.959.558
6.922.259Lease liability417.756
1.640.735Donations payable to Wikimedia Endowment525.607
5.274.448Other liabilities2.292.045
2.124.939Total current liabilities15.204.548
18.746.285Lease liability
405.748Total liabilities$
15.204.54819.152.033Net assets :Net assets without donor restrictions
265.859.067
249.088.663Net assets with donor restrictions5.696.323
5.882.673Total net assets271.555.390
254.971.336Total liabilities and net assets$
86.759.938274.123.369
", + "page_start": 4, + "page_end": 4, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "\n\nis restricted ", + "page_start": 332, + "page_end": 332, + "source_file": "00-80T-80.pdf" + }, + { + "text": "**(1) Organization and Summary of Significant Accounting Policies**\n\n***(a) Organization and Purpose***\n\nThe accompanying consolidated financial statements present the financial position, change in net \nassets and cash flows of the Wikimedia Foundation, Inc. (the Foundation) and Wikimedia, LLC. \n\nThe Foundation is the nonprofit organization that operates Wikipedia, a free online encyclopedia. \nBased in San Francisco, California, the Foundation is a 501(c)(3) charity that is funded primarily \nthrough donations and contributions. \n\nThe Foundation also operates Wikimedia, LLC, a Delaware Limited Liability Company, with the \nFoundation as its Sole Member. The Wikimedia, LLC is organized and operated exclusively for \ncharitable and educational purposes within the meaning of section 501(c)(3) of the Internal Revenue \nCode and is a disregarded entity for tax purposes. \n\n***(b) Risks and Uncertainties***\n\nThe Foundation’s operations are funded primarily by public donations from individuals as well as gifts \nfrom foundations and corporations. External factors such as global geopolitics, recession, and currency \nmarkets may impact our ability to raise funds. As of the date of this report, the Foundation has not \nexperienced an adverse impact on its business operations. \n\n***(c) Income Taxes***\n\nThe Foundation is exempt from federal income tax under Section 501(c)(3) of the Internal Revenue \nCode and from state income tax under Chapter 220.13 of the Florida Statutes and Sections 23701d of \nRevenue and Taxation Code of the State of California. The Internal Revenue Service has determined \nthat the Foundation is not a private foundation and contributions to it qualify as charitable contributions. ", + "page_start": 7, + "page_end": 7, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "Restricted Cash \n\nOur total cash and cash equivalents and restricted cash, as presented in the consolidated statements of cash flows, was as \nfollows (in millions): \n\nSeptember 30, \n2024 December 31, \n2023 September 30, \n2023 December 31, \n2022 \n\nCash and cash equivalents $ 18,111 $ 16,398 $ 15,932 $ 16,253 \n\nRestricted cash included in prepaid expenses and \nother current assets 483 543 453 294 \n\n380 248 205 377 Restricted cash included in other non-current assets \n\nTotal as presented in the consolidated statements of \ncash flows \n$ 18,974 $ 17,189 $ 16,590 $ 16,924 ", + "page_start": 16, + "page_end": 16, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "**WIKIMEDIA FOUNDATION, INC.**\n\n\n \n \n \n \n [html]\n
Table of Contents
Page ( s )
Independent Auditors ’ Report1
Consolidated Financial Statements :
Balance Sheets3
Statements of Activities4
Statements of Cash Flows5
Notes to Consolidated Financial Statements6 – 18
\n\n\n \n \n \n \n [html]\n
Page ( s )
Independent Auditors ’ Report1
Consolidated Financial Statements :
Balance Sheets3
Statements of Activities4
Statements of Cash Flows5
Notes to Consolidated Financial Statements6 – 18
", + "page_start": 1, + "page_end": 1, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
donor sigulations that limit the use of the donated assets or are restricted as to time. When a restriction expires. that is, when a sigulated time restriction ends or purpose restriction is explored, inel assets with donor restrictionssTherebutions of Nonfinancial Assets and Services
Items of nonfinancial assets and services include contributed services, as described below.Industed services are reported at lais value in the consolidated francial statements for voluntary forms of services when those services ( 1 ) create or enhance roofinancial assols, ( 2 ) require lacks provided by individuals possessinc
stantial number of volunteers make significant contributions of their time in the furtherance of the dation ’ s projects. The value of this contributed time is not reflected in the accompanying( fluid persistencia research and experimental not the consistablest sidements of advice consistents of advision of advision of advised intervisition of advision of advision of advised intervision of advisors and advisors and advict
Recognition – Contracts With CustomersFoundation recognizes reversue from contracts with customers related b Wkimedia, LLC under unting Standards Codification Topic B9, Revenue from Contracts with Customers, which illishes a principle that reversue is recognized uponz
", + "page_start": 10, + "page_end": 10, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "The fair value of assets that are legally restricted for purposes of settling Ñnal capping, closure and post- \nclosure obligations was approximately $7.5 million at December 31, 2004 and are included as restricted cash in \nthe Company's Consolidated Balance Sheets. ", + "page_start": 79, + "page_end": 79, + "source_file": "NYSE_RSG_2004.pdf" + }, + { + "text": "***(n) Leases***\n\nLeases consist of a lease liability for the Foundation’s headquarters in San Francisco. The liability is \nequal to the present value of lease payments, which are fixed. The present value is calculated using a \nrisk-free discount rate, determined using a period comparable with that of the lease term. The lease \nterm in accordance with ASC 842 does not include options to extend as it is not reasonably certain that \nthe option will be exercised. The Foundation determined during the year ended June 30, 2024 not to \nrenew the lease. \n\n***(o) Collaborative Arrangement***\n\nThe Foundation has a collaborative arrangement with Wikimedia Deutschland to mutually develop the \nWikibase software to support the Wikidata project, which acts as central storage for the structured data \nof its Wikimedia sister projects including Wikipedia, Wikivoyage, Wiktionary, Wikisource, and others. \nBoth the Foundation and Wikimedia Deutschland do work for the Wikidata project, and the Foundation \nalso grants Wikimedia Deutschland funding to support Wikimedia Deutschland's work in developing the \nWikibase software. Since the project is part of the Foundation's mission to make knowledge accessible \n\n10 (Continued) ", + "page_start": 11, + "page_end": 11, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20200471_en.pdf", + "query": "What is the price of the The Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020 ?", + "target_page": 8, + "target_passage": "£6.90", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Citation and commencement**\n\n**1.**These Regulations may be cited as the Special Educational Needs and Disability \n\n(Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020. \n\n**Review and expiry**\n\n**2.**—(1) The Secretary of State must review the effectiveness of these Regulations during the \nperiod for which they have effect. \n\n(2) These Regulations cease to have effect on 25th September 2020. \n\n**Amendment of the Special Educational Needs and Disability Regulations 2014**\n\n**3.**The Special Educational Needs and Disability Regulations 2014(**c**) are amended as follows. \n\n**4.**In regulation 2(1) (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**5.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of ", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "(2) The coronavirus exception applies where it is not reasonably practicable for the local \nauthority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the \nincidence or transmission of coronavirus.”. \n\n**Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations**\n**2015**\n\n**18.**The Special Educational Needs and Disability (Detained Persons) Regulations 2015(**a**) are \n\namended as follows. ", + "page_start": 3, + "page_end": 3, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations make amendments to secondary legislation relating to special educational \nneeds and disability in order to provide exceptions to time limits set out in that legislation where \nthey cannot be met because of a reason relating to the incidence or transmission of coronavirus. \n\nRegulation 2 contains review and expiry provisions. The Secretary of State is required to review \nthe effectiveness of the Regulations during the period in which they have effect. The Regulations \ncease to have effect on 25th September 2020. \n\nRegulations 3 to 14 amend the Special Educational Needs and Disability Regulations 2014 (‘the \nSEND Regulations 2014’). \n\nRegulation 5 inserts a glossing provision into the SEND Regulations 2014 which relaxes certain \nrequirements in those Regulations for actions to be taken within specified time limits where it is \nnot reasonably practicable for a person to meet those requirements for a reason relating to the \nincidence or transmission of coronavirus. Instead, any such requirement is to be read as a \nrequirement for such action to be taken as soon as reasonably practicable. \n\nRegulations 6 to 14 make textual amendments to the SEND Regulations 2014 to relax time limits. ", + "page_start": 5, + "page_end": 5, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
TheSpecial Educational Needs and Disability ( Coronavirus ) ( Amendment ) Regulations 2020
Made--
--28th April 2020
Laid before Parliament30th April 2020Coming into force
--1st May 2020
\n\nThe Secretary of State makes the following Regulations in exercise of the powers conferred by \nsections 30(8), 31(4), 36(11), 37(4), 44(7)(b) and (c), 47, 49(3), 51(4), 56(1), 71(11), 73(4), 74(3) \nand 135(2) and (3) of the Children and Families Act 2014(**a**) and sections 29(3) and 569(4) of the \nEducation Act 1996(**b**). ", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "**27.**In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”. \n\n**Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n**Recommendations Power) Regulations 2017**\n\n**28.**The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) \n\nRegulations 2017(**a**) are amended as follows. \n\n**29.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**30.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \ntime or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and \n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”. ", + "page_start": 4, + "page_end": 4, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "**13.**In regulation 27(3) (amending or replacing an EHC plan following a re-assessment)— \n\n(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**14.**In regulation 45 (unopposed appeals), after paragraph (7) insert— \n\n“(8) The local authority need not comply with the time limits specified in paragraph (3A) \nif it is impractical to do so because the circumstances referred to in regulation 10(4)(e) \napply.”. \n\n**Amendment of the Special Educational Needs (Personal Budgets) Regulations 2014**\n\n**15.**The Special Educational Needs (Personal Budgets) Regulations 2014(**a**) are amended as \n\nfollows. \n\n**16.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**17.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time period due to coronavirus exception**", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus, \nPublic Health Information for International Passengers) (England) Regulations 2020 and the \nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) \n(Amendment) Regulations 2021. \n\nThey impose requirements on certain categories of person to provide information upon arrival in \nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the \nspread of infection or contamination from coronavirus or coronavirus disease. They also impose \nobligations on operators to ensure that passengers receive information and comply with the \nrequirements. \n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum \nhas been published alongside this instrument at www.legislation.gov.uk. ", + "page_start": 90, + "page_end": 90, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**25.**These Regulations expire at the end of 16th May 2022. \n\n\n \n \n \n \n [html]Revocations, transitional provision consequential amendments and savings\n
26.—( 1 ) The following Regulations are revoked —
( a )
Passengers ) ( England ) Regulations 2020 ( a );
Health
Information
for International
( b )
the Health Protection ( Coronavirus, International (“ the International Travel Regulations ”)( b ); and
Travel )
( England )
Regulations 2020
", + "page_start": 30, + "page_end": 30, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "time or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 15(2) (transfer of EHC plans) (in relation to the second reference to 15 \nworking days), (4), (5), (7) (in relation to the second reference to 15 working days) \nand (8); \n\n(b) regulation 16(2) and (3) (change of responsible commissioning body); \n\n(c) regulation 20(9) and (10) (review where the child or young person attends a school \n\nor other institution); \n\n(d) regulation 21(7), (8) and (9) (review of EHC plan where the child or young person \n\ndoes not attend a school or other institution); \n\n(e) regulation 25(1) (notification of decision whether it is necessary to re-assess ", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "PART 1 \n\nIntroductory \n\n**Citation, commencement, extent and application**\n\n**1.**—(1) These Regulations may be cited as the Health Protection (Coronavirus, International \n\nTravel and Operator Liability) (England) Regulations 2021. \n\n(2) These Regulations come into force at 4.00 a.m. on 17th May 2021. \n(3) These Regulations extend to England and Wales and apply in relation to England only. ", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20210582_en.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20200471_en.pdf", + "query": "When come into force the Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020 ?", + "target_page": 1, + "target_passage": "These Regulations may be cited as the Special Educational Needs and Disability (Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Citation and commencement**\n\n**1.**These Regulations may be cited as the Special Educational Needs and Disability \n\n(Coronavirus) (Amendment) Regulations 2020 and come into force on 1st May 2020. \n\n**Review and expiry**\n\n**2.**—(1) The Secretary of State must review the effectiveness of these Regulations during the \nperiod for which they have effect. \n\n(2) These Regulations cease to have effect on 25th September 2020. \n\n**Amendment of the Special Educational Needs and Disability Regulations 2014**\n\n**3.**The Special Educational Needs and Disability Regulations 2014(**c**) are amended as follows. \n\n**4.**In regulation 2(1) (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**5.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of ", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
TheSpecial Educational Needs and Disability ( Coronavirus ) ( Amendment ) Regulations 2020
Made--
--28th April 2020
Laid before Parliament30th April 2020Coming into force
--1st May 2020
\n\nThe Secretary of State makes the following Regulations in exercise of the powers conferred by \nsections 30(8), 31(4), 36(11), 37(4), 44(7)(b) and (c), 47, 49(3), 51(4), 56(1), 71(11), 73(4), 74(3) \nand 135(2) and (3) of the Children and Families Act 2014(**a**) and sections 29(3) and 569(4) of the \nEducation Act 1996(**b**). ", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "(2) The coronavirus exception applies where it is not reasonably practicable for the local \nauthority to meet the requirement specified in regulation 11(2)(a) for a reason relating to the \nincidence or transmission of coronavirus.”. \n\n**Amendment of the Special Educational Needs and Disability (Detained Persons) Regulations**\n**2015**\n\n**18.**The Special Educational Needs and Disability (Detained Persons) Regulations 2015(**a**) are \n\namended as follows. ", + "page_start": 3, + "page_end": 3, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "**27.**In regulation 30(7)(c) (unopposed appeals), after “10(4)(a)” insert “or (d)”. \n\n**Amendment of the Special Educational Needs and Disability (First-tier Tribunal**\n**Recommendations Power) Regulations 2017**\n\n**28.**The Special Educational Needs and Disability (First-tier Tribunal Recommendations Power) \n\nRegulations 2017(**a**) are amended as follows. \n\n**29.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**30.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time periods due to coronavirus exception**\n\n**2A.**—(1) Where the coronavirus exception applies, any requirement in any of the \nregulations specified in paragraph (3) for action to be taken within a specified period of \ntime or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 6(3) and (6) (responding to health care recommendations); and \n\n(b) regulation 7(1) and (4) (responding to social care recommendations).”. ", + "page_start": 4, + "page_end": 4, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations make amendments to secondary legislation relating to special educational \nneeds and disability in order to provide exceptions to time limits set out in that legislation where \nthey cannot be met because of a reason relating to the incidence or transmission of coronavirus. \n\nRegulation 2 contains review and expiry provisions. The Secretary of State is required to review \nthe effectiveness of the Regulations during the period in which they have effect. The Regulations \ncease to have effect on 25th September 2020. \n\nRegulations 3 to 14 amend the Special Educational Needs and Disability Regulations 2014 (‘the \nSEND Regulations 2014’). \n\nRegulation 5 inserts a glossing provision into the SEND Regulations 2014 which relaxes certain \nrequirements in those Regulations for actions to be taken within specified time limits where it is \nnot reasonably practicable for a person to meet those requirements for a reason relating to the \nincidence or transmission of coronavirus. Instead, any such requirement is to be read as a \nrequirement for such action to be taken as soon as reasonably practicable. \n\nRegulations 6 to 14 make textual amendments to the SEND Regulations 2014 to relax time limits. ", + "page_start": 5, + "page_end": 5, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "PART 1 \n\nIntroductory \n\n**Citation, commencement, extent and application**\n\n**1.**—(1) These Regulations may be cited as the Health Protection (Coronavirus, International \n\nTravel and Operator Liability) (England) Regulations 2021. \n\n(2) These Regulations come into force at 4.00 a.m. on 17th May 2021. \n(3) These Regulations extend to England and Wales and apply in relation to England only. ", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**13.**In regulation 27(3) (amending or replacing an EHC plan following a re-assessment)— \n\n(a) at the end of sub-paragraph (c) omit “or”; and \n(b) at the end of sub-paragraph (d) insert— \n\n“; or \n\n(e) of a reason relating to the incidence or transmission of coronavirus”. \n\n**14.**In regulation 45 (unopposed appeals), after paragraph (7) insert— \n\n“(8) The local authority need not comply with the time limits specified in paragraph (3A) \nif it is impractical to do so because the circumstances referred to in regulation 10(4)(e) \napply.”. \n\n**Amendment of the Special Educational Needs (Personal Budgets) Regulations 2014**\n\n**15.**The Special Educational Needs (Personal Budgets) Regulations 2014(**a**) are amended as \n\nfollows. \n\n**16.**In regulation 2 (interpretation), at the appropriate place insert— \n\n““coronavirus” means severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2); \n”. \n\n**17.**After regulation 2 (interpretation) insert— \n\n“**Relaxation of time period due to coronavirus exception**", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20200471_en.pdf" + }, + { + "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations replace the Health Protection (Coronavirus, International Travel) (England) \nRegulations 2020 (“the International Travel Regulations”), the Health Protection (Coronavirus, \nPublic Health Information for International Passengers) (England) Regulations 2020 and the \nHealth Protection (Coronavirus, Pre-Departure Testing and Operator Liability) (England) \n(Amendment) Regulations 2021. \n\nThey impose requirements on certain categories of person to provide information upon arrival in \nEngland, to take coronavirus tests before and after arrival and to self-isolate in order to prevent the \nspread of infection or contamination from coronavirus or coronavirus disease. They also impose \nobligations on operators to ensure that passengers receive information and comply with the \nrequirements. \n\nAn impact assessment has not been produced for this instrument. An explanatory memorandum \nhas been published alongside this instrument at www.legislation.gov.uk. ", + "page_start": 90, + "page_end": 90, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "**2.**—(1) The Health Protection (Coronavirus, Restrictions) (Self-Isolation) (England) Regulations \n2020(**a**) are amended as follows. \n\n(2) In regulation 2D(1)(c), for “regulation 4 of the Health Protection (Coronavirus, International \nTravel) (England) Regulations 2020” substitute “regulation 9 of the Health Protection \n(Coronavirus, International Travel and Operator Liability) (England) Regulations 2021”. \n\n(3) In regulation 6(1)— \n\n(a) in the definitions of “designated place”, “isolation requirements” and “self-isolating \nworker”, for “regulation 4” substitute “regulation 9”; \n\n(b) in the definition of “International Travel Regulations”, for “the Health Protection \n(Coronavirus, International Travel) (England) Regulations 2020” substitute “the Health \nProtection (Coronavirus, International Travel and Operator Liability) (England) \nRegulations 2021”. ", + "page_start": 88, + "page_end": 88, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "time or by a certain day is to be read instead as a requirement for such action to be taken as \nsoon as reasonably practicable. \n\n(2) The coronavirus exception applies where it is not reasonably practicable for a person \nto meet a requirement referred to in paragraph (1) for a reason relating to the incidence or \ntransmission of coronavirus. \n\n(3) The following regulations are specified for the purposes of paragraphs (1) and (2)— \n\n(a) regulation 15(2) (transfer of EHC plans) (in relation to the second reference to 15 \nworking days), (4), (5), (7) (in relation to the second reference to 15 working days) \nand (8); \n\n(b) regulation 16(2) and (3) (change of responsible commissioning body); \n\n(c) regulation 20(9) and (10) (review where the child or young person attends a school \n\nor other institution); \n\n(d) regulation 21(7), (8) and (9) (review of EHC plan where the child or young person \n\ndoes not attend a school or other institution); \n\n(e) regulation 25(1) (notification of decision whether it is necessary to re-assess ", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20200471_en.pdf" + } + ] + }, + { + "references": { + "source_file": "sg248459.pdf", + "query": "Who is Daniel Casali ?", + "target_page": 12, + "target_passage": " Daniel Casali is a Thought Leader Information Technology Specialist working for 15 years at IBM with Power Systems, high-performance computing, big data, and storage. His role at IBM is to bring to reality solutions that address client’s needs by exploring new technologies for different workloads. He is also fascinated by real multicloud implementations, always trying to abstract and simplify the new challenges of the heterogeneous architectures that are intrinsic to this new consumption model, be that on-premises or in the public cloud. ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**SENSI**BELLAGIO An \neclectic menu features \ndiverse cuisines in an \nearthy arena replete with \nwaterfalls and chrome. A \nbold wine list complements \nChef Martin Heierling’s \nsumptuous work. ", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "\nJack D. Michaels \n\nC H A I R M A N A N D \n\nC H I E F E X E C U T I V E O F F I C E R ", + "page_start": 59, + "page_end": 59, + "source_file": "NYSE_HNI_2003.pdf" + }, + { + "text": "Nick Morgan, Daniel Heap, Amy Elliott, Tim Millar \n\n\n \n \n \n \n [html]\n
January 2016
", + "page_start": 0, + "page_end": 0, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "“Your company has undergone several defining moments throughout its history.” \n\nF \nrom its roots some 35 years ago with the opening \nof the International Hotel, we have played a \nleading role in continuously redefining the Las \n\nVegas experience. \n\nment will come in the months ahead, I am pleased to tell \nyou that we have secured the services of the internationally \nacclaimed architect Cesar Pelli to design our anchor resort \nat the heart of Project CityCenter. \n\nWe announced two significant initiatives in 2004 that, \ntaken together, give your company unrivaled momentum \nto set industry standards for creativity, performance and \nresponsibility for decades to come. Cesar Pelli & Associates has worked with corporate, \n\ngovernment and private clients to design major public \nspaces, museums, airports, research centers, performing arts \ncenters, academic buildings, hotels, office and residential \ntowers and mixed-use projects. \n\nand our plans to develop Project CityCenter on the Las \nVegas Strip are among the most significant announcements \nin Las Vegas history. As this fabled city begins its second \nhundred years, MGM MIRAGE is positioned like no other \ncompany to take advantage of unsurpassed growth oppor- \ntunities in the most dynamic gaming and entertainment \nmarket in the world. \n\nThe work of Cesar Pelli is not constrained by a personal \nstyle or a signature that would limit his architecture; instead, \nit celebrates the unique characteristics of each project. Using \nthis approach, he has designed several exceptional buildings \nin the United States and abroad. ", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "\nPerson ", + "page_start": 8, + "page_end": 8, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "\n.DECELERATloN \nPROFlLE ", + "page_start": 410, + "page_end": 410, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\niL \ni 0.4 ", + "page_start": 105, + "page_end": 105, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\npeople ", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "\n\nD E S I G N ", + "page_start": 39, + "page_end": 39, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Bender and Gebru, et al. \n\n[67] Brendan Kennedy, Drew Kogon, Kris Coombs, Joseph Hoover, Christina Park, \nGwenyth Portillo-Wightman, Aida Mostafazadeh Davani, Mohammad Atari, \nand Morteza Dehghani. 2018. A typology and coding manual for the study of \nhate-based rhetoric. PsyArXiv. July 18 (2018). \n[68] Gary Klein. 2007. Performing a project premortem. Harvard business review 85, \n9 (2007), 18–19. ", + "page_start": 11, + "page_end": 11, + "source_file": "arxiv5_ccby4license.pdf" + } + ] + }, + { + "references": { + "source_file": "sg248459.pdf", + "query": "When does IBM close its acquisition of Red Hat ?", + "target_page": 20, + "target_passage": " On July 9th, 2019, IBM closed its acquisition of Red Hat, a leader in enterprise Linux and open source technology", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**1.2 Red Hat and IBM**\n\nOn July 9th, 2019, IBM closed its acquisition of Red Hat, a leader in enterprise Linux and \nopen source technology. \n\nThis acquisition puts Red Hat and IBM in a unique position to unlock the true value of hybrid \ncloud for your business. By combining the power and flexibility of Red Hat’s open hybrid cloud \ntechnologies with the scale and depth of IBM innovation and industry expertise, you now have \nthe tools to accelerate your cloud journey. \n\nIBM and Red Hat worked together for more than 20 years in making open source a \ncompetitive advantage for businesses on x86, IBM Power Systems, and IBM z Systems®. \nTogether, we are both on a mission to improve open source technology and help your \ncompanies capture the business value of the cloud. ", + "page_start": 19, + "page_end": 19, + "source_file": "sg248459.pdf" + }, + { + "text": "This publication describes how Red Hat and IBM can advance your cloud journey and speed \ngrowth and innovation for your business by using Red Hat OpenShift on IBM Power Systems. \n\n**Note:**Red Hat joins IBM as a distinct unit, preserving the independence and neutrality of \nRed Hat’s open source development heritage and unique development culture. Red Hat’s \nunwavering commitment to open source remains unchanged and it continues to offer \ncustomers choice and flexibility. ", + "page_start": 20, + "page_end": 20, + "source_file": "sg248459.pdf" + }, + { + "text": "**First Edition (March 2020)**\n\nThis edition applies to: \n\n(cid:2) Red Hat OpenShift Container Platform for Power Enterprise V3.11 \n(cid:2) Red Hat Enterprise Linux Server release V7.6 (Maipo) for ppc64le \n(cid:2) IBM Virtual I/O Server V3.1.1.0 \n(cid:2) IBM Cloud PowerVC Manager V1.4.3.1 \n(cid:2) Terraform V0.12.9 \n(cid:2) provider.null V2.1.2 \n(cid:2) provider.openstack V1.22.0 \n\n**© Copyright International Business Machines Corporation 2020. All rights reserved.**\nNote to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule \nContract with IBM Corp. ", + "page_start": 3, + "page_end": 3, + "source_file": "sg248459.pdf" + }, + { + "text": "**Blackiron Data (Blackiron)**\nOn April 17, 2013, we closed an agreement to acquire 100% of the \ncommon shares of Blackiron for cash consideration of $198 million. \nBlackiron provides Business Solutions the ability to enhance its suite of \nenterprise-level data centre and cloud computing services along with \nfibre-based network connectivity services. ", + "page_start": 107, + "page_end": 107, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "In July 2000 the Company entered into subscription agreements for the sale of 877,946 new common shares of the Company. These agre e m e n t s \nw e re signed with accredited investors in transactions exempt from registration pursuant to the exemptions provided in Section 4(2) and \nRegulation D of the Act. Closing with respect to such sale took place on July 14 and August 29, 2000. The purchase price of each share was \n$6.97. The aggregate amount of proceeds to the Company from the private placement was $6.1 million. \n\nThe Company leases many of its ATMs under capital lease arrangements that expire between 2001 and 2005. The leases bear interest between \n8% and 12% per annum. As of December 31, 2000 the Company owed $11.5 million under such capital lease arrangements. (See Note 15 to the \nConsolidated Financial Statements - Leases.) \n\nThe Company expects that its capital re q u i rements will continue in the future but will not be as great as they were in the past, as the Company \nintends to continue to promote its outsourcing capabilities and re-deploy under- p e rf o rming ATMs currently operating in the network. This \nstrategy should reduce the Company’s reliance on capital expenditures in the future as the business continues to gro w. Fixed asset purchases and \ncapital lease payments for 2001 are expected to be approximately $6.2 million in the Company’s existing markets, notably We s t e rn and Central \nE u rope. Acquisitions of related ATM business and investments in new markets in furtherance of the Company’s strategy may re q u i re additional \ncapital expenditures. ", + "page_start": 21, + "page_end": 21, + "source_file": "NASDAQ_EEFT_2000.pdf" + }, + { + "text": "This publication is a first volume in a planned multi-volume publication over the next 12 - 18 \nmonths. Within this initial volume, we explain the fundamental perspective (which is accurate \nas of the time of this writing) while providing pointers to future direction that will be discussed \nin future volumes. \n\n**Note:**This initial publication relates to Red Hat OpenShift 3.11, because this release was \nthe current OpenShift Container Platform (OCP) release for IBM Power Systems at the \ntime of this writing. IBM and Red Hat intend to deliver Red Hat OpenShift 4 for IBM \nPOWER® to accelerate agility for enterprise clients through integrated tooling and a \nfeature-rich Kubernetes container platform for cloud-native development on POWER9 and \nIBM POWER8® processor-based servers. ", + "page_start": 19, + "page_end": 19, + "source_file": "sg248459.pdf" + }, + { + "text": "**Red Hat OpenShift and IBM Cloud**\n**Paks on IBM Power Systems**\n**Volume 1**\n\n\n \n \n \n \n [html]\n
Dino QuinteroSudipto Pal
Ricardo Dobelin BarrosBogdan Savu
Daniel CasaliRichard Wale
Luis Ferreira
Alain Fisher
Federico Fros
Luis Daniel Gonzalez
Miguel Gomez Gonzalez
Mahesh Gurugunti
Rogelio Rivera Gutierrez
Nicolas Joly
Boris Litichevsky
Ismael Solis Moreno
Gabriel Padilla
", + "page_start": 0, + "page_end": 0, + "source_file": "sg248459.pdf" + }, + { + "text": "**1.1 Introduction**\n\nMost companies started or are contemplating their journey to cloud. Although in recent years \nthe adoption of cloud became much more common place, the scope of what a cloud is or can \nbe also increased. This broadening of possibilities unfortunately added confusion and can \nresult in companies being unsure of how their existing application estate can change to \nintegrate with the cloud model. \n\nAs such, doubts still exist around how to start and progress on this journey. It is also true that \nalthough people understand traditional enterprise applications and more modern \ncloud-hosted applications, the integration or co-existence of both can prove equally confusing \nand contradicting. \n\nRecent industry trends, combined with the new partnership between Red Hat and IBM, seek \nto bring some clarity to the landscape while providing new modernization opportunities for \nexisting enterprise applications and familiar environments. \n\nThe main focus of this IBM Redbooks publication relates to IBM Cloud Paks and Red Hat \nOpenShift, which is hosted on IBM Power Systems. Although individually much can be written \nabout either topic, the relationship this publication highlights is between Red Hat OpenShift \nand IBM Power Systems. \n\nWe show what Red Hat OpenShift brings to the IBM Power Systems platform specifically \ndiscuss how it can be deployed and added into existing familiar Power System environments, \nand the benefits that integration and co-existence can provide from an existing enterprise \napplication viewpoint. ", + "page_start": 19, + "page_end": 19, + "source_file": "sg248459.pdf" + }, + { + "text": "Figure 5-2 High-level view of the OpenShift Container Platform for IBM Power Systems \n\nFrom bare metal physical machines to virtualized infrastructure, or in private clouds, the \nOpenShift is supported anywhere that Red Hat Enterprise Linux is running, including all of the \nsupported virtualization platforms (PowerVM or RHEV) and private cloud (PowerVC). ", + "page_start": 92, + "page_end": 92, + "source_file": "sg248459.pdf" + }, + { + "text": "**5.3 Red Hat OpenShift Container Platform 3.11 on IBM**\n**PowerVC**\n\nIn this section, we provide guidelines and considerations for deploying and managing Red \nHat OpenShift Container Platform on IBM Power Virtualization Center (PowerVC). \n\nRed Hat OpenShift Container Platform is a Platform-as-a-Service (PaaS) that provides \ndevelopers and IT organizations with a cloud application platform for deploying new \napplications on secure, scalable resources with minimal configuration and management \noverhead. It allows developers to create and deploy applications by delivering a consistent \nenvironment for both development and during the runtime lifecycle that requires no server \nmanagement. \n\nIBM PowerVC uses OpenStack technology to provide enterprise virtualization and cloud \nmanagement for IBM Power Systems, which provides all of the necessary capabilities for a \nfully featured Infrastructure-as-a-Service (IaaS) private cloud solution. \n\n**Note:**The minimum version for PowerVC is 1.4.3 Fix Pack 1. This version adds IBM \nPowerVC FlexVolume Driver support for OpenShift Container Platform 3.11. ", + "page_start": 94, + "page_end": 94, + "source_file": "sg248459.pdf" + } + ] + }, + { + "references": { + "source_file": "sg248459.pdf", + "query": "What does an ITMS service provide ?", + "target_page": 30, + "target_passage": "An IT Service Management (ITSM) perspective can provide automation and a global management view, and incorporate the necessary software disciplines that are required to build a solid infrastructure for an enterprise, commercial or not. ", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "\n\nit ", + "page_start": 359, + "page_end": 359, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\nit ", + "page_start": 52, + "page_end": 52, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n\nIt ", + "page_start": 276, + "page_end": 276, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n\nIt ", + "page_start": 248, + "page_end": 248, + "source_file": "00-80T-80.pdf" + }, + { + "text": "**IT Service Management and orchestration**\nAn IT Service Management (ITSM) perspective can provide automation and a global \nmanagement view, and incorporate the necessary software disciplines that are required to \nbuild a solid infrastructure for an enterprise, commercial or not. \n\nThe missing point was the orchestration and the orchestration of all containers and resources \naround them. Many people think that orchestration and automation are the same thing, but \nthe orchestration is more complex. Automation often is discussed in the context of specific \ntasks, whereas orchestration refers to the automation of processes and workflows. \n\nOrchestration deals with the end-to-end process simplify the automation and the \nadministration across specific machines and diverse dependencies (see Figure 2-3). \nAutomation attempts to move people out of the equation whereas orchestration is not about \nrigid planning, but arranging and coordination of automated tasks, which ultimately results in \na consolidated process or workflow. Parts can be automated, but the decision is still \nhuman-centric; for example, the definition of which tasks must run, the order of the tasks, role \nassignments, permission, post-deployment, failure recovery, and scaling. ", + "page_start": 29, + "page_end": 29, + "source_file": "sg248459.pdf" + }, + { + "text": "\n\nMOBILE INTERNET \n& E-MAIL ADVANCED \nM2M SOLUTIONS DATA CENTRE & \nCLOUD SERVICES ", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "**Manually assigning an external IP to a service**\nA Kubernetes service serves as an internal load balancer. It identifies a set of replicated pods \nto proxy the connections it receives to them. Backing pods can be added to or removed from \na service arbitrarily, although the service remains consistently available, which enables \nanything that depends on the service to refer to it at a consistent address. ", + "page_start": 81, + "page_end": 81, + "source_file": "sg248459.pdf" + }, + { + "text": "Figure 5-58 Viewing service IP address \n\nThe service IP address is commonly used to provide access to the network interfaces on \neach individual node of the control enclosure. \n\nInstead of reaching the Management IP address, the service IP address directly connects to \neach individual node canister for service operations. You can select a node canister of the \ncontrol enclosure from the drop-down list and then click any of the ports that are shown in the \nGUI. The service IP address can be configure to support IPv4 or IPv6. \n\n**iSCSI information**\nFrom the iSCSI pane in the Settings menu, you can display and configure parameters for the \nsystem to connect to iSCSI-attached hosts, as shown in Figure 5-59 on page 168. ", + "page_start": 188, + "page_end": 188, + "source_file": "sg247938.pdf" + }, + { + "text": "\n\n**EXPAND OUR SERVICES REACH**", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "**8.2.2 Content Manager OnDemand Windows client**\n\nThe Content Manager OnDemand Windows client is a full function, feature-rich client that \nmeets the needs of line-of-business application areas and customer service representatives. \nThe Windows client displays content in its native format and is considered a corporate \ninternal access client. Many technical aspects of the Windows client are described in 8.1.1, \n“Viewer options” on page 186 and 8.1.2, “Client infrastructure options” on page 190. ", + "page_start": 220, + "page_end": 220, + "source_file": "sg246915.pdf" + } + ] + }, + { + "references": { + "source_file": "Publicdomain.pdf", + "query": "What are the two distinct public domain tools support by Creative Commons ?", + "target_page": 1, + "target_passage": "Creative Commons supports two distinct public domain tools, the CC0 Public Domain Dedication and the Public Domain Mark.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Public domain works are valuable because anyone \ncan freely build upon, enhance, and reuse them for \nany purposes without restriction under copyright \nor database law. \n\nThat’s why it’s important for creators to have a clear and \nlegally robust way to place their works in the public domain as \ncompletely as possible, and it’s also important for publishers \nand archives to have a standardized way to identify works that \nare already in the public domain. \n\nCreative Commons supports two distinct public domain tools, \nthe CC0 Public Domain Dedication and the Public Domain \nMark. Creative Commons copyright licenses help authors \nmanage their copyright on terms they choose. Conversely, CC0 \nenables authors and copyright owners who want to dedicate \ntheir works to the worldwide public domain to do so, and PDM \nfacilitates the labeling and discovery of works that are already \nfree of known copyright restrictions. \n\nWhere public domain tools fit in the copyright spectrum \n\nCC0 \nPublic \ndomain \nSome rights \nreserved All rights \nreserved \n\nPDM \nNo known \ncopyright ", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "Creative Commons (CC) is the global nonprofit organization behind the CC \nLicenses and public domain tools, which power open sharing on popular \nplatforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. \nSince 2002, the CC Licenses have served as an alternative to traditional \ncopyright, providing a simple, standardized, and legal way for individuals and \ninstitutions to freely share images, music, research, educational resources, and \ncultural artifacts. \n\n**Chief Executive Officer**\nAnna Tumadóttir \n\n**General Counsel**\nKat Walsh ", + "page_start": 1, + "page_end": 1, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "Works marked with the Public Domain Mark have been \nidentified as being free of known restrictions under copyright \nlaw, including all related and neighboring rights. Anyone can \ncopy, modify, distribute, and perform such works, even for \ncommercial purposes, all without asking permission. \n\nApplying the PDM to a work is easy. Simply visit the PDM \nchooser (http://creativecommons.org/choose/mark) which \nwill lead you through the proces. When completed, you will be \nprovided with the HTML code that you can copy and paste into \nyour website. \n\nCreative Commons does not recommend this tool for works that \nare restricted by copyright laws in one or more jurisdictions. \nConsult with your legal advisor if you are unsure whether you \nshould use the PDM for a certain work. ", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": " For a sense of the complexity, see e.g. Melissa Levine, Richard C. Adler.*Finding the Public Domain:*\n\n14 \n*Copyright Review Management System Toolkit*. 2016, quod.lib.umich.edu/c/crmstoolkit/ \n14616082.0001.001. Accessed 20 Mar. 2024.; Kopel, Matthew. “LibGuides: Copyright at Cornell Libraries: \nCopyright Term and the Public Domain.” guides.library.cornell.edu/copyright/publicdomain; \nMannapperuma, Menesha, et al.*Is It in the Public Domain? A HANDBOOK for EVALUATING the*\n*COPYRIGHT STATUS of a WORK CREATED in the UNITED STATES*. 1923. \n\n See e.g. Moody, Glyn. “Project Gutenberg Blocks Access in Germany to All Its Public Domain Books \n\n15 \nbecause of Local Copyright Claim on 18 of Them.”*Techdirt*, 7 Mar. 2018, www.techdirt.com/ \n2018/03/07/project-gutenberg-blocks-access-germany-to-all-public-domain-books-because-local- \ncopyright-claim-18-them/. Accessed 20 Mar. 2024. ", + "page_start": 8, + "page_end": 8, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn \nOtis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open \nand public domain works. View full licensing and attribution information about all works included in the \nvideo on Flickr. ", + "page_start": 11, + "page_end": 11, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**THREE-LAYER DESIGN**\nCreative Commons (CC) license has three layers: \n\n\"Legal Code\" (base layer): contains terms and conditions to be \nused by lawyers and legally applicable in court. \n\"Human Readable\" (commons deeds): contain the summary of \nthe legal code and key terms. \n\"Machine Readable\": contains HTML or codes for machines to \nrecognize a work is available under a Creative Commons license. ", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "The CC0 Public Domain Dedication \n\n**Use this universal tool if you are a holder of copyright or database**\n**rights, and wish to waive all your rights to the work worldwide.**\n\n\n \n \n \n \n [html]\n
1.
P
1.
Parameters
Patient
1
88
t
parameters
1.
Table
1
1.
1.
Parameters
1.
", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "BY (\"Attribution\"): users must credit the author of the work they \nare using. \nSA (\"ShareAlike\"): adaptations based on this work must be \nlicensed under the same license. \nNC (\"NonCommercial\"): the work is only available to be used for \nnoncommercial purposes. \nND (\"NoDerivative\"): reusers making cannot share adaptations of \nthe work. ", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "with. The vast majority of in-copyright books are out-of-print or out-of-commerce, and most \nare not actively managed by their rightsholders. There is no official registry of copyrighted \nworks and their owners, and existing datasets can be incomplete or erroneous. 16 \n\nAs a result, there may be no way to license the vast majority of in-copyright books, especially \nthose that have or have had limited commercial value. \n Put differently, the barrier to using \nmost books is not simply to pay publishers; even if one had significant financial resources, \nlicensing would not enable access to most works. \n\n17 \n\n**Permissively licensed works**\n\nThere are books that have been permissively licensed in an easily identifiable way, such as \nworks placed under Creative Commons (CC) licenses. Such works explicitly allow particular \nuses of works subject to various responsibilities (e.g., requiring attribution by the user in their \nfollow-on use). \n\nWhile such works could be candidates for inclusion in a books data commons, their inclusion \ndepends on whether the license’s terms can be complied with in the context of AI training. \nFor instance, in the context of CC licensed works, there are requirements for proper \nattribution across all licenses (the CC tools Public Domain Dedication (CC0) and Public \nDomain Mark (PDM) are not licenses and do not require attribution). 18 ", + "page_start": 9, + "page_end": 9, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "CC BY (\"Attribution\") allows people to use the work for any purpose (even \ncommercially and even in modified form) as long as they give attribution to the \ncreator. \nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose \n(even commercially and even in modified form), as long as they give attribution to the \ncreator and make any adaptations they share with others available under the same or \na compatible license. \nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for \nnoncommercial purposes only, and only as long as they give attribution to the \ncreator. \nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the \nwork for noncommercial purposes only, and only as long as they give attribution to \nthe creator and make any adaptations they share with others available under the \nsame or a compatible license. \nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for \nany purpose (even commercially), as long as they give attribution to the creator. \nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the \nunadapted work for noncommercial purposes only, and only as long as they give \nattribution to the licensor. ", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + } + ] + }, + { + "references": { + "source_file": "Publicdomain.pdf", + "query": "What is Creative Commons ?", + "target_page": 1, + "target_passage": " Creative Commons is a global nonprofit organization dedicated to supporting an open and accessible Internet that is enriched with free knowledge and creative resources for people around the world to use, share, and cultivate.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Creative Commons (CC) is the global nonprofit organization behind the CC \nLicenses and public domain tools, which power open sharing on popular \nplatforms like Wikipedia, Flickr, YouTube, Medium, Vimeo, and Khan Academy. \nSince 2002, the CC Licenses have served as an alternative to traditional \ncopyright, providing a simple, standardized, and legal way for individuals and \ninstitutions to freely share images, music, research, educational resources, and \ncultural artifacts. \n\n**Chief Executive Officer**\nAnna Tumadóttir \n\n**General Counsel**\nKat Walsh ", + "page_start": 1, + "page_end": 1, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "2023 was a busy year at Creative \nCommons. Our**Open Culture**program \nand**Open Climate Campaign**entered \ntheir third and second years, respectively. \nWe hosted our first in-person CC Global \nSummit since 2019 in Mexico City. We \nheld critical consultations and open \npanels on AI, copyright, and the CC \nLicenses, cultural heritage, education, \nand science; and we launched our**Open**\n**Infrastructure Circle**in an effort to \nensure the CC Licenses are funded well \ninto the future. ", + "page_start": 2, + "page_end": 2, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "**THREE-LAYER DESIGN**\nCreative Commons (CC) license has three layers: \n\n\"Legal Code\" (base layer): contains terms and conditions to be \nused by lawyers and legally applicable in court. \n\"Human Readable\" (commons deeds): contain the summary of \nthe legal code and key terms. \n\"Machine Readable\": contains HTML or codes for machines to \nrecognize a work is available under a Creative Commons license. ", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "This is a frame from “Twenty Years of Creative Commons (in Sixty Seconds)” by Ryan Junell and Glenn \nOtis Brown for Creative Commons licensed under CC BY 4.0. It includes adaptations of multiple open \nand public domain works. View full licensing and attribution information about all works included in the \nvideo on Flickr. ", + "page_start": 11, + "page_end": 11, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": "Public domain works are valuable because anyone \ncan freely build upon, enhance, and reuse them for \nany purposes without restriction under copyright \nor database law. \n\nThat’s why it’s important for creators to have a clear and \nlegally robust way to place their works in the public domain as \ncompletely as possible, and it’s also important for publishers \nand archives to have a standardized way to identify works that \nare already in the public domain. \n\nCreative Commons supports two distinct public domain tools, \nthe CC0 Public Domain Dedication and the Public Domain \nMark. Creative Commons copyright licenses help authors \nmanage their copyright on terms they choose. Conversely, CC0 \nenables authors and copyright owners who want to dedicate \ntheir works to the worldwide public domain to do so, and PDM \nfacilitates the labeling and discovery of works that are already \nfree of known copyright restrictions. \n\nWhere public domain tools fit in the copyright spectrum \n\nCC0 \nPublic \ndomain \nSome rights \nreserved All rights \nreserved \n\nPDM \nNo known \ncopyright ", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "CC BY (\"Attribution\") allows people to use the work for any purpose (even \ncommercially and even in modified form) as long as they give attribution to the \ncreator. \nCC BY-SA (\"Attribution-ShareAlike\") allows people to use the work for any purpose \n(even commercially and even in modified form), as long as they give attribution to the \ncreator and make any adaptations they share with others available under the same or \na compatible license. \nCC BY-NC (\"Attribution-NonCommercial\") allows people to use the work for \nnoncommercial purposes only, and only as long as they give attribution to the \ncreator. \nCC BY-NC-SA (\"Attribution-NonCommercial-ShareAlike\") allows people to use the \nwork for noncommercial purposes only, and only as long as they give attribution to \nthe creator and make any adaptations they share with others available under the \nsame or a compatible license. \nCC BY-ND (\"Attribution-NoDerivative\") allows people to use the unadapted work for \nany purpose (even commercially), as long as they give attribution to the creator. \nCC BY-NC-ND (\"Attribution-NonCommercial-NoDerivative\") allows people to use the \nunadapted work for noncommercial purposes only, and only as long as they give \nattribution to the licensor. ", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "Texts are adapted from CC Certification for Educators. CC BY license. \nBY, SA, NC, ND icons, CC BY, CC BY-SA, CC BY-NC, CC BY-NC-SA, CC BY-ND, and CC BY-NC-ND buttons are trademark of Creative Commons, and subject to their policies. \n3-layer design of CC license image is taken from CC Certification for Educators. CC BY license. \nLine, icons, and gradients are from Canva, and subject to their policies. ", + "page_start": 0, + "page_end": 0, + "source_file": "Understanding_Creative_Commons_license_(infographic).pdf" + }, + { + "text": "**Areas of Exploration**\n\n**Support for Creators in the**\n**Time of Artificial Intelligence**\n\nIn 2023, we convened hundreds via \nroundtables, community conferences \n(e.g.**MozFest**,**Wikimania**), and public \nevents (e.g. symposium on**Generative**\n**AI & Creativity**)to debate copyright law, \nthe ethics of open sharing, and other \nrelevant areas that touch AI. \n\nAt our CC Global Summit, participants \ndrafted**community-driven principles**\non AI that are a valuable input and will \nhelp inform the organization’s thinking \nas we determine CC’s exact role in the AI \nspace. ", + "page_start": 8, + "page_end": 8, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + }, + { + "text": " In this way, we do not use “commons” in the narrow sense of permissively licensed. What’s more, this \n4 \nresource could also be governed as more of a data “trust,” and, indeed, we discuss extensively the work \nof HathiTrust as a relevant project in this domain. However, our use of the word “commons” is not \nmeant to preclude this or other arrangements. \n\n There are, of course, a range of other types of texts that are not on the web and/or not digital at all - \n5 \ne.g., periodicals, journals, government documents. These are out of scope for this paper, but also worthy \nof further analysis. ", + "page_start": 2, + "page_end": 2, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "We also marked transitions in leadership. \nAt the end of December, Catherine Stihler \nconcluded her time as Chief Executive \nOfficer (CEO) at Creative Commons, and I \ntransitioned in as Interim. In March 2024, I \nwas appointed CC’s permanent CEO. I \nlook forward to working closely with our \nBoard of Directors, staff, and larger \ncommunity on**the critical work that**\n**awaits us in 2024**. ", + "page_start": 2, + "page_end": 2, + "source_file": "2023-Creative-Commons-Annual-Report-2-1.pdf" + } + ] + }, + { + "references": { + "source_file": "Publicdomain.pdf", + "query": "How to apply the PDM to my work ?", + "target_page": 1, + "target_passage": "Simply visit the PDM chooser (http://creativecommons.org/choose/mark) which will lead you through the proces. When completed, you will be provided with the HTML code that you can copy and paste into your website.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Works marked with the Public Domain Mark have been \nidentified as being free of known restrictions under copyright \nlaw, including all related and neighboring rights. Anyone can \ncopy, modify, distribute, and perform such works, even for \ncommercial purposes, all without asking permission. \n\nApplying the PDM to a work is easy. Simply visit the PDM \nchooser (http://creativecommons.org/choose/mark) which \nwill lead you through the proces. When completed, you will be \nprovided with the HTML code that you can copy and paste into \nyour website. \n\nCreative Commons does not recommend this tool for works that \nare restricted by copyright laws in one or more jurisdictions. \nConsult with your legal advisor if you are unsure whether you \nshould use the PDM for a certain work. ", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "**10.6 Submit inventory (PM)**\n\nThis section describes on how the PM submits the inventory by selecting tables for the general submission after \nbeing approved by the NFP (See section 10.5). \n\n**10.6.1 Submit select tables for preparing the general submission**\n\n1. Log in as PM. \n2. Click on “View Inventories Progress” under sub menu “Submission Management”. \n3. The “View Inventories Progress” screen appears. \n4. Select the appropriate inventory by clicking the box under column “Working inventory” (figure 68, a). \n***Note: The selected inventory year to be submitted should be in status “approved” (figure 68, b). \n5. Click on “Work on Inventories” under Submission Management (figure 68, c). \nThis opens the Submit Inventory initial screen (figure 69). \n\n6. Click the inventory year to be submitted (figure 69, a). \n7. Press the “Generate Official Submission” button (figure 69, c). \n\n***Figure 68. View Inventories Progress screen – select inventory for the preparation for the general submission***", + "page_start": 41, + "page_end": 41, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "**Other publications**\n\nThese publications are also relevant as further information sources: \n\n(cid:2) Adobe Press,*Adobe Type 1 Font Format,*Addison-Wesley, 1990, ISBN 0201570440 \n\n(cid:2)*DFSMS Object Access Method Planning, Installation, and Storage Administration Guide*\n*for Object Support*, SC35-0426 \n\n(cid:2)*IBM Content Manager OnDemand Messages and Code,*SC19-3356 \n\n(cid:2)*IBM Content Manager OnDemand - Distribution Facility Installation and Reference*, \nSC19-3358 \n\n(cid:2)*IBM Content Manager OnDemand - Web Enablement Kit Implementation Guide*, \nSC19-3353 \n\n(cid:2)*IBM Content Manager OnDemand - Windows Client Customization Guide*, SC19-3357 \n\n(cid:2)*Content Manager OnDemand for i - Planning and Installation Guide*, SC19-2790 ", + "page_start": 432, + "page_end": 432, + "source_file": "sg246915.pdf" + }, + { + "text": "CC0 (“CC Zero”) is intended for use only \nby authors or holders of copyright and \n\nrelated rights (including database rights), in connection \nwith works that are still subject to those rights in one or \nmore countries. \n\nWhen CC0 is applied to a work, copyright and related \nrights are relinquished worldwide, making the work free \nfrom those restrictions to the greatest extent possible. \n\nThe Public Domain Mark (PDM) is used \nto label works that are already free of \n\nknown copyright restrictions. Unlike CC0, PDM doesn’t \nchange the copyright status of a work. \n\nPDM can be used by anyone, and is intended for use \nwith works that are already free of known copyright \nrestrictions throughout the world. ", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "Public domain works are valuable because anyone \ncan freely build upon, enhance, and reuse them for \nany purposes without restriction under copyright \nor database law. \n\nThat’s why it’s important for creators to have a clear and \nlegally robust way to place their works in the public domain as \ncompletely as possible, and it’s also important for publishers \nand archives to have a standardized way to identify works that \nare already in the public domain. \n\nCreative Commons supports two distinct public domain tools, \nthe CC0 Public Domain Dedication and the Public Domain \nMark. Creative Commons copyright licenses help authors \nmanage their copyright on terms they choose. Conversely, CC0 \nenables authors and copyright owners who want to dedicate \ntheir works to the worldwide public domain to do so, and PDM \nfacilitates the labeling and discovery of works that are already \nfree of known copyright restrictions. \n\nWhere public domain tools fit in the copyright spectrum \n\nCC0 \nPublic \ndomain \nSome rights \nreserved All rights \nreserved \n\nPDM \nNo known \ncopyright ", + "page_start": 0, + "page_end": 0, + "source_file": "Publicdomain.pdf" + }, + { + "text": "**9.1.3 How to convert the data**\n\nContent Manager OnDemand uses the Generic Transform Interface to integrate Content \nManager OnDemand with third-party transform solutions. \n\nConsider the following information about target flows: \n\n(cid:2) HTML might be used with the same intent, but an HTML document is not always displayed \nidentically, depending on the web browser that is used. Additional testing that includes \nyour needs and the encountered environments might be necessary for validation before \nthe implementation. \n\n(cid:2) PDF might be used as a way to make documents available through standard and \n\nno-charge tools, such as Adobe Acrobat Reader. The transformed documents must be \ndisplayable, saveable, and printable the same way regardless of the environment on which \nthe user works. \n\n(cid:2) XML is an intermediate text-based data format for the manipulation of documents, \n\nregardless of the source data stream, and displays the documents totally or partially in a \npersonalized way. The use of XML usually involves additional development, including \nscripts and stylesheets. ", + "page_start": 232, + "page_end": 232, + "source_file": "sg246915.pdf" + }, + { + "text": "**7.9 Additional references**\n\nFor more information, see the following IBM developerWorks® articles: \n\n(cid:2)*Creating PDF Indexing Parameters Using Floating Triggers*: \n\nhttp://ibm.co/1FHsXDq \n\n(cid:2)*Understanding the ACIF Input Exit for DB2 Content Manager OnDemand*: \n\nhttp://ibm.co/1UUcCT0 ", + "page_start": 206, + "page_end": 206, + "source_file": "sg246915.pdf" + }, + { + "text": "You can use SQL code to customize the following actions: \n\n(cid:2) Creating a table space \n(cid:2) Creating a table \n(cid:2) Creating an index \n(cid:2) Other additional action \n\nIf you do not customize the action, Content Manager OnDemand uses the defaults. \n\nExample 11-14 shows a sample program flow. \n\n*Example 11-14 Sample program flow*\n\nAction 1 \nIs there a need to customize the creation of the table space? \nIf yes \n\ncreate the tablespace \nreturn( created = 1) \nElse \n\nOnDemand create the tablespace \nreturn( created = 0) \n\nAction 2 \nIs there a need to customize the creation of the table? \n If yes ", + "page_start": 297, + "page_end": 297, + "source_file": "sg246915.pdf" + }, + { + "text": "**Tasks:** **Completed:**\n\n*Before starting this exercise you MUST have completed all of the topics in*\n*the chapter Creating Charts…*\n\n \n \n \n \n Open the workbook called***PE_Creating Charts.xlsx***(it can be found in the \n Create a***Clustered Column***chart showing the sales of products for the \n Drag the chart down below the data and resize it so that it is the same \n Change the chart type to***3-D Stacked Column***and change the chart title \n\nsame folder as the student files) \n\nmonths of***January***through to***June***\n\nwidth as the data, keeping the proportions as far as possible \n\nto***Sales***\n\n*The chart should appear as shown in sample A on the following page...*\n\n Create a***Pie in 3-D***chart of the products and their totals then place it on its \n Change the***Chart Title***to***Product Sales***\n Change the layout to***Layout 6***\n Print the pie chart \n Use the***Save As***command to save the workbook as***PE_Creating Charts***\n***(Completed).xlsx***", + "page_start": 58, + "page_end": 58, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "**General**\nConsider the following general recommendations when you work with OAM for Content \nManager OnDemand: \n\n(cid:2) Define a user catalog exclusively for collection names. \n\n(cid:2) Cache the user catalog in the virtual lookaside facility (VLF). \n\n(cid:2) Migrate objects to optical or tape (OSMC) during non-peak hours. \n\n(cid:2) Spread OAM collections over multiple DB2/disk/channels. \n\n(cid:2) Spread out the application groups to different collection names: \n\nOAM collections → storage groups → DB2 database \n\n(cid:2) Group your applications based on retrieval expectations: \n\n– Collect small, frequently used applications together. \n– Isolate your important applications so that the other applications do not get in the way. \n\n**DB2**\nConsider the following list of recommendations that relate to DB2: \n\n(cid:2) Ensure that enough DB2 connections are available to support the OAM requests. \n(cid:2) Run the**REORG**,**RUNSTATS**, and**REBIND**commands, as appropriate. \n(cid:2) Partition OAM table spaces larger than 2 GB. \n\n**Devices**\nConsider the following recommendations that relate to devices: \n\n(cid:2) Determine and set the Initial Access Response Seconds (IARS) option. \n\n(cid:2) Assign objects to storage classes that have an adequate IARS that is defined and to \nmanagement classes that do not cause a transition to a slower storage class until the \nfrequency of retrieving the objects is reasonably low. \n\n(cid:2) Determine whether to place the object on disk or removable (optical or tape) media. \n\n(cid:2) If the IARS opts for REMOVABLE media, determine whether to place the object on optical \nor tape. \n\n(cid:2) Verify that the required Sustained Data Rate is achieved based on the selected object \nplacement. ", + "page_start": 134, + "page_end": 134, + "source_file": "sg246915.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia4.pdf", + "query": "Which rivers flow through Lyon?", + "target_page": 1, + "target_passage": "It is located at the confluence of the rivers Rhône and Saône, ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Lyon**\n\n**Lyon**[c] (Franco-Provençal:*Liyon*) is the second-largest city in France \nby urban area and the third largest by city limits.[14] It is located at the \nconfluence of the rivers Rhône and Saône, to the northwest of the \nFrench Alps, 391 km (243 mi) southeast of Paris, 278 km (173 mi) north \nof Marseille, 113 km (70 mi) southwest of Geneva, Switzerland, 58 km \n(36 mi) northeast of Saint-Étienne. \n\n**Lyon**\n\n*Liyon*(Arpitan) \n\n**Prefecture and commune**\n\nThe City of Lyon had a population of 522,250 at the Jan. 2021 census \nwithin its small municipal territory of 48 km2 (19 sq mi),[15] but \ntogether with its suburbs and exurbs the Lyon metropolitan area had a \npopulation of 2,308,818 that same year,[7] the second most populated in \nFrance. Lyon and 58 suburban municipalities have formed since 2015 \nthe Metropolis of Lyon, a directly elected metropolitan authority now in \ncharge of most urban issues, with a population of 1,424,069 in 2021.[16] \nLyon is the prefecture of the Auvergne-Rhône-Alpes region and seat of \nthe Departmental Council of Rhône (whose jurisdiction, however, no \nlonger extends over the Metropolis of Lyon since 2015). \n\nSkyline of Lyon in La Part-Dieu ", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia4.pdf" + }, + { + "text": "\n\n**Modern Lyon**", + "page_start": 2, + "page_end": 2, + "source_file": "wikipedia4.pdf" + }, + { + "text": "***Geography portal***\n\n***Europe portal***\n\n***European Union***\n***portal***\n\n***France portal***\n\nList of films set in Lyon \nList of streets and squares in Lyon \nMères of France \nMontchat \nOccupation of Saint-Nizier church by Lyon prostitutes \n\n**Notes**\n\na. A war cry from 1269, spelt in modern Franco-Provençal as*Avant, Avant, Liyon lo mèlyor*. \nb. Quote from a letter of Cicero to Lucius Munatius Plancus, founder of the city.[1] \nc. Pronunciation: UK: /ˈliːɒ̃/,[8][9] US: /liˈoʊn/*lee-OHN*;[10][11] French: [ljɔ̃] ⓘ; formerly spelled in English as \n\n*Lyons*(/ˈlaɪənz/*LY-*ə*nz*).[11][12] Arpitan:*Liyon*[ʎjɔ̃]; Occitan:*Lion*, hist.*Lionés*.[13] \n\nd. Constant PPP US dollars, base year 2015. ", + "page_start": 20, + "page_end": 20, + "source_file": "wikipedia4.pdf" + }, + { + "text": "**Administration**\n\n**Commune**\n\nLike Paris and Marseille, the commune (municipality) of Lyon is divided into a number of municipal arrondissements, each \nof which is identified by a number and has its own council and town hall. Five arrondissements were originally created in \n1852, when three neighbouring communes (La Croix-Rousse, La Guillotière, and Vaise) were annexed by Lyon. Between \n1867 and 1959, the third arrondissement (which originally covered the whole of the Left Bank of the Rhône) was split three \ntimes, creating a new arrondissement in each case. Then, in 1963, the commune of Saint-Rambert-l'Île-Barbe was annexed to \nLyon's fifth arrondissement. A year later, in 1964, the fifth was split to create Lyon's 9th – and, to date, final – \narrondissement. Within each arrondissement, the recognisable*quartiers*or neighbourhoods are: \n\n1st arrondissement: Slopes of La Croix-Rousse, Terreaux, Martinière/St-Vincent ", + "page_start": 6, + "page_end": 6, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Lyon is served by the Eurolines intercity coach organisation. Its Lyon terminal is \nlocated at the city's Perrache railway station, which serves as an intermodal \ntransportation hub for tramways, local and regional trains and buses, the terminus of \nMetro line A, of the Tramway T2, the bicycle service Vélo'v, and taxis.[77] ", + "page_start": 19, + "page_end": 19, + "source_file": "wikipedia4.pdf" + }, + { + "text": "**External links**\n\nOfficial website (http://www.lyon.fr)(in French) \nVisit Lyon, the official website for tourism in France (https://en.visiterlyon.com/) \nLyon’s English Language News and Information (https://thisislyon.fr/) \nRues de Lyon (https://www.ruesdelyon.net/) Streets, Places, Monuments (in French) \n\nOld maps of Lyon (http://historic-cities.huji.ac.il/france/lyon/lyon.html) Archived (https://web.archive.org/we \nb/20210116220537/http://historic-cities.huji.ac.il/france/lyon/lyon.html) 16 January 2021 at the Wayback \nMachine, Historic cities site (http://historic-cities.huji.ac.il/historic_cities.html) Archived (https://web.archive. \norg/web/20220325051637/http://historic-cities.huji.ac.il/historic_cities.html) 25 March 2022 at the Wayback \nMachine, The National Library of Israel \n\nRetrieved from \"https://en.wikipedia.org/w/index.php?title=Lyon&oldid=1267625203\" ", + "page_start": 24, + "page_end": 24, + "source_file": "wikipedia4.pdf" + }, + { + "text": "**Metropolis**\nSince 2015, the commune of Lyon (48 km2 (19 sq mi) in land area) and 58 suburban communes \nhave formed the Metropolis of Lyon (534 km2 (206 sq mi) in land area), a directly elected \nmetropolitan authority now in charge of most urban issues. The Metropolis of Lyon is the only \nmetropolitan authority in France which is a territorial collectivity, on par with French communes \nand departments. Its metropolitan council was for the first time directly elected by universal \nsuffrage in 2020 within 14 electoral wards, the only directly elected metropolitan council in \nFrance. \n\nThe 14 electoral wards are the following (see map for location): \n\n Lônes et coteaux \n\nMap of the Metropolis of \nLyon and its 59 \ncommunes (the \ncommune of Lyon is in \nred) \n\n Lyon-Centre (Lyon-Centre) \n\n Lyon-Est (Lyon-East) \n Lyon-Nord (Lyon-North) \n\n Lyon-Ouest \n\n Lyon-Sud \n Lyon-Sud-Est \n\n Ouest \n Plateau Nord-Caluire \n\n Porte des Alpes \n\n Portes du Sud \n Rhône Amont \n\n Val de Saône \n\n Villeurbanne \n\nThe six wards with names starting with \"Lyon\" are all located within the commune of Lyon. The Villeurbanne ward is \ncoterminous with the namesake commune. All other seven wards each group various suburban communes. ", + "page_start": 8, + "page_end": 8, + "source_file": "wikipedia4.pdf" + }, + { + "text": "**Climate**\n\nLyon has a humid subtropical climate (Köppen:*Cfa*), bordering an oceanic climate \n(*Köppen*:*Cfb*, Trewartha:*Do*).[38] The mean temperature in Lyon in the coldest month \nis 4.1 °C (39.4 °F) in January and in the warmest month in July is 22.6 °C (72.7 °F). \nPrecipitation is adequate year-round, at an average of 820 mm (32.3 in), the winter \nmonths are the driest. The highest recorded temperature was 40.5 °C (104.9 °F) on 13 \nAugust 2003 while the lowest recorded temperature was −24.6 °C (−12.3 °F) on 22 \nDecember 1938.[39] ", + "page_start": 4, + "page_end": 4, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Lyon has two major railway stations: Lyon-Part-Dieu, which was built to \naccommodate the TGV, and Lyon Perrache, an older station that now provides mostly \nregional service. Smaller railway stations include Gorge-de-Loup, Vaise, Saint-Paul \nand Jean Macé. Lyon was the first city to be connected to Paris by the TGV in \n1981.[76] Since that time the TGV train network has expanded and links Lyon directly \nto Perpignan, Toulouse, Nice, Marseille, Strasbourg, Nantes and Lille. International \ntrains operate directly to Madrid, Barcelona, Milan, Turin, Geneva, Frankfurt, \nLuxembourg, Brussels and London. \n\nThe city is at the heart of a dense road network and is located at the meeting point of \nseveral highways: A6 to Paris, A7 Marseille, A42 to Geneva, and A43 to Grenoble. \nThe city is now bypassed by the A46. A double motorway tunnel passes under \nFourvière, connecting the A6 and the A7 autoroutes, both forming the \"Autoroute du \nSoleil\". \n\nT1 tramway on the Raymond Barre \nbridge ", + "page_start": 18, + "page_end": 18, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Lyon has a rugby union team, Lyon OU, in the Top 14, which moved into Stade de Gerland full-time in 2017–18. In addition, \nLyon has a rugby league side called Lyon Villeurbanne that plays in the French rugby league championship. The club's home \nis the Stade Georges Lyvet in Villeurbanne. ", + "page_start": 15, + "page_end": 15, + "source_file": "wikipedia4.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia4.pdf", + "query": "How big was Lyon's population in 2022? ", + "target_page": 2, + "target_passage": "Population (2022) 520,774", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Lyon**\n\n**Lyon**[c] (Franco-Provençal:*Liyon*) is the second-largest city in France \nby urban area and the third largest by city limits.[14] It is located at the \nconfluence of the rivers Rhône and Saône, to the northwest of the \nFrench Alps, 391 km (243 mi) southeast of Paris, 278 km (173 mi) north \nof Marseille, 113 km (70 mi) southwest of Geneva, Switzerland, 58 km \n(36 mi) northeast of Saint-Étienne. \n\n**Lyon**\n\n*Liyon*(Arpitan) \n\n**Prefecture and commune**\n\nThe City of Lyon had a population of 522,250 at the Jan. 2021 census \nwithin its small municipal territory of 48 km2 (19 sq mi),[15] but \ntogether with its suburbs and exurbs the Lyon metropolitan area had a \npopulation of 2,308,818 that same year,[7] the second most populated in \nFrance. Lyon and 58 suburban municipalities have formed since 2015 \nthe Metropolis of Lyon, a directly elected metropolitan authority now in \ncharge of most urban issues, with a population of 1,424,069 in 2021.[16] \nLyon is the prefecture of the Auvergne-Rhône-Alpes region and seat of \nthe Departmental Council of Rhône (whose jurisdiction, however, no \nlonger extends over the Metropolis of Lyon since 2015). \n\nSkyline of Lyon in La Part-Dieu ", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia4.pdf" + }, + { + "text": "**Demographics**\n\nThe population of the city (commune) of Lyon proper was 522,250 at the January 2021 census.[15] As of 2011, 14% of its \npopulation was born outside Metropolitan France.[67] ", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia4.pdf" + }, + { + "text": "The city of Lyon and 58 suburban municipalities have formed since 2015 the Metropolis of Lyon, a directly elected \nmetropolitan authority now in charge of most urban issues, with a population of 1,424,069 in 2021.[16] ", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia4.pdf" + }, + { + "text": "**Metropolis**\nSince 2015, the commune of Lyon (48 km2 (19 sq mi) in land area) and 58 suburban communes \nhave formed the Metropolis of Lyon (534 km2 (206 sq mi) in land area), a directly elected \nmetropolitan authority now in charge of most urban issues. The Metropolis of Lyon is the only \nmetropolitan authority in France which is a territorial collectivity, on par with French communes \nand departments. Its metropolitan council was for the first time directly elected by universal \nsuffrage in 2020 within 14 electoral wards, the only directly elected metropolitan council in \nFrance. \n\nThe 14 electoral wards are the following (see map for location): \n\n Lônes et coteaux \n\nMap of the Metropolis of \nLyon and its 59 \ncommunes (the \ncommune of Lyon is in \nred) \n\n Lyon-Centre (Lyon-Centre) \n\n Lyon-Est (Lyon-East) \n Lyon-Nord (Lyon-North) \n\n Lyon-Ouest \n\n Lyon-Sud \n Lyon-Sud-Est \n\n Ouest \n Plateau Nord-Caluire \n\n Porte des Alpes \n\n Portes du Sud \n Rhône Amont \n\n Val de Saône \n\n Villeurbanne \n\nThe six wards with names starting with \"Lyon\" are all located within the commune of Lyon. The Villeurbanne ward is \ncoterminous with the namesake commune. All other seven wards each group various suburban communes. ", + "page_start": 8, + "page_end": 8, + "source_file": "wikipedia4.pdf" + }, + { + "text": "\n \n \n \n \n [html]Population of Lyon ( metropolis ) ( 59 communes, within 2020 borders )\n
YearPgp2#%. p. a.YearPgp.#%. p. a.YearP. gp.#%. p. a.
1861418.5151906627.073+ 0.60 %19681.077.794+ 2.17 %
1866427.522+ 0.43 %1911629.931+ 0.09 %19751.153.402+ 0.98 %
1872426.552− 0.04 %1921659.007+ 0.45 %19821.138.718− 0.18 %
1876453.540+ 1.37 %1926691.446+ 0.97 %19901.166.797+ 0.30 %
1881493.778+ 1.66 %1931743.297+ 1.46 %19991.199.589+ 0.31 %
1886527.621+ 1.47 %1936738.220− 0.14 %20101.296.166+ 0.72 %
1891566.115+ 1.46 %1946746.062+ 0.11 %20151.370.678+ 1.12 %
1896600.881+ 1.21 %1954790.662+ 0.71 %20211.424.069+ 0.64 %
1901608.856+ 0.26 %1962947.569+ 2.34 %
", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia4.pdf" + }, + { + "text": "\n \n \n \n \n [html]Population of Lyon ( commune ) ( within 2020 borders )\n
YearPgp :±% p. a.YearPgp.±%. p. a.YearPgp :±% b. a.
1801101.7601876344.513+ 1.33 %1946464.104+ 0.02 %
1806114.643+ 2.41 %1881378.581+ 1.84 %1954475.343+ 0.29 %
1821149.611+ 1.79 %1886404.172+ 1.45 %1962535.746+ 1.54 %
1831182.668+ 2.02 %1891440.315+ 1.78 %1968527.800− 0.25 %
1836198.683+ 1.60 %1896468.311+ 1.25 %1975456.716− 2.06 %
1841206.670+ 0.79 %1901461.687− 0.29 %1982413.095− 1.42 %
1846238.466+ 2.86 %1906474.652+ 0.56 %1990415.487+ 0.07 %
1851259.220+ 1.68 %1911462.248− 0.53 %1999445.452+ 0.78 %
1856293.743+ 2.66 %1921462.446+ 0.00 %2010484.344+ 0.78 %
1861320.326+ 1.72 %1926463.125+ 0.03 %2015513.275+ 1.17 %
1866325.219+ 0.30 %1931463.647+ 0.02 %2021522.250+ 0.29 %
1872324.590− 0.03 %1936463.061− 0.03 %
", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia4.pdf" + }, + { + "text": "All figures come from population censuses. Figures from 1911 to 1936 (incl.) are computed using the redressed figures for the \ncommune of Lyon calculated by INSEE to correct the overestimated population of Lyon published by the municipal authorities at \nthe time (10,000s of false residents had been added by the municipal authorities to artificially inflate the population figures and \nremain the 2nd largest city of France ahead of Marseille).[68] The 1906 figure is computed using the figure for the commune of \nLyon published by the municipal authorities, probably already inflated, but not corrected by INSEE because the overestimate \nwas smaller than 10,000. \nSource: EHESS[70] and INSEE[71] ", + "page_start": 17, + "page_end": 17, + "source_file": "wikipedia4.pdf" + }, + { + "text": "\n\n**Modern Lyon**", + "page_start": 2, + "page_end": 2, + "source_file": "wikipedia4.pdf" + }, + { + "text": "The GDP of Lyon was 124 billion US dollars in 2019,[d][46] making it the second \nrichest city in France after Paris. Lyon and its region Rhône-Alpes represent one of \nthe most important economies in Europe and, according to Loughborough University, \ncan be compared to Philadelphia, Mumbai or Athens with regard to its international \nposition. The city of Lyon is working in partnership to more easily enable the \nestablishment of new headquarters in the territory (ADERLY, Chambre du commerce \net d'industrie, Grand Lyon...). High-tech industries such as biotechnology, software \ndevelopment, video game (Arkane Studios, Ivory Tower, Eden Games, EA France, \nBandai Namco Entertainment Europe), and internet services are also growing. Other \nimportant sectors include medical research and technology, non-profit institutions, \nand universities. Lyon is home to the P4-Inserm–ean Merieux Laboratory which \nconducts top-level vaccine research.[47] \n\nLa Part-Dieu, the city's central \nbusiness district \n\nThe city is home to the headquarters of many large companies such as Groupe SEB, Sanofi Pasteur, Renault Trucks, Norbert \nDentressangle, LCL S.A., Descours & Cabaud, Merial, Point S, BioMérieux, Iveco Bus, Compagnie Nationale du Rhône, GL \nEvents, April Group, Boiron, Feu Vert, Panzani, Babolat, Lyon Airports, LVL Medical, and inter-governmental agencies \nIARC and Interpol. The specialisation of some sectors of activities has led to the creation of many main business centres: La \nPart-Dieu, located in the 3rd arrondissement is the second biggest business quarter after La Défense in Paris with over ", + "page_start": 13, + "page_end": 13, + "source_file": "wikipedia4.pdf" + }, + { + "text": "East of the Rhône from the Presqu'île is a large flat area upon which sits much of modern Lyon and contains most of the \ncity's population. Situated in this area is La Part-Dieu urban centre, which clusters the landmark structures Tour Incity, Tour \nPart-Dieu, Tour Oxygène, and Tour Swiss Life, as well as the city's primary railway station, Gare de Lyon-Part-Dieu. \n\nNorth of this district lays the sixth arrondissement, which is home to one of Europe's largest urban parks, the Parc de la Tête \nd'or, as well as Lycée du Parc and Interpol's world headquarters. ", + "page_start": 3, + "page_end": 3, + "source_file": "wikipedia4.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia4.pdf", + "query": "What is the climate in Lyon ?", + "target_page": 5, + "target_passage": " Lyon has a humid subtropical climate ( Köppen: Cfa), bordering an oceanic climate (Köppen: Cfb, Trewartha: Do).", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Climate**\n\nLyon has a humid subtropical climate (Köppen:*Cfa*), bordering an oceanic climate \n(*Köppen*:*Cfb*, Trewartha:*Do*).[38] The mean temperature in Lyon in the coldest month \nis 4.1 °C (39.4 °F) in January and in the warmest month in July is 22.6 °C (72.7 °F). \nPrecipitation is adequate year-round, at an average of 820 mm (32.3 in), the winter \nmonths are the driest. The highest recorded temperature was 40.5 °C (104.9 °F) on 13 \nAugust 2003 while the lowest recorded temperature was −24.6 °C (−12.3 °F) on 22 \nDecember 1938.[39] ", + "page_start": 4, + "page_end": 4, + "source_file": "wikipedia4.pdf" + }, + { + "text": "\n \n \n \n \n [html]Climate data for Lyon [ LYN ], elevation : 157 m ( 646 ht ), 1993 – 2020 normals, extremes 1920 – presentMonthJanFebMarAprMay\n
JunJulAugSepOctNovDecYearRecord high ° C (° F )19.1 ( 66.4 )21.9 ( 71.4 )26.0 ( 78.8 )30.1 ( 86.2 )34.2 ( 93.6 )
38.4 ( 101.1 )40.4 ( 104.7 )41.4 ( 106.5 )35.8 ( 96.4 )28.4 ( 83.1 )23.0 ( 73.4 )20.2 ( 68.4 )41.4 ( 106.5 )Mean daily maximum ° C (° F )7.1 ( 44.8 )9.0 ( 48.2 )13.8 ( 56.8 )17.4 ( 63.3 )21.5 ( 70.7 )
25.6 ( 78.1 )28.2 ( 82.8 )28.0 ( 82.4 )23.1 ( 73.6 )17.7 ( 63.9 )11.4 ( 52.5 )7.7 ( 45.9 )17.5 ( 63.5 )Daily mean ° C (° F )4.1 ( 39.4 )5.2 ( 41.4 )9.0 ( 48.2 )12.3 ( 54.1 )16.3 ( 61.3 )
20.3 ( 68.5 )22.6 ( 72.7 )22.3 ( 72.1 )17.9 ( 64.2 )13.7 ( 56.7 )8.1 ( 46.6 )4.8 ( 40.6 )13.0 ( 55.4 )Mean daily minimum ° C (° F )1.1 ( 34.0 )1.4 ( 34.5 )4.2 ( 39.6 )7.2 ( 45.0 )11.2 ( 52.2 )
15.0 ( 59.0 )17.0 ( 62.6 )16.6 ( 61.9 )12.8 ( 55.0 )9.6 ( 49.3 )4.9 ( 40.8 )2.0 ( 35.6 )8.6 ( 47.5 )Record low ° C (° F )− 23.0 (− 9.4 )− 22.5 (− 8.5 )− 10.5 ( 13.1 )− 4.4 ( 24.1 )− 3.8 ( 25.2 )
2.3 ( 36.1 )6.1 ( 43.0 )4.6 ( 40.3 )0.2 ( 32.4 )− 4.5 ( 23.9 )− 9.4 ( 15.1 )− 24.6 (− 12.3 )− 24.6 (− 12.3 )Average precipitation mm ( inches )49.8 ( 1.96 )41.6 ( 1.64 )49.4 ( 1.94 )68.9 ( 2.71 )80.9 ( 3.19 )
74.1 ( 2.92 )67.4 ( 2.65 )65.5 ( 2.58 )82.5 ( 3.25 )99.8 ( 3.93 )87.2 ( 3.43 )53.7 ( 2.11 )820.8 ( 32.31 )Average precipitation days (≥ 1.0 mm )8.17.98.49.010.3
8.57.57.27.39.99.49.2102.8Mean monthly sunshine hours71.1102.4173.7197.7223.8
256.5288.1263.1204.1131.478.958.72.049.5Source 1 : Meteo France [ 49 ]Source 2 : Meteo Lyon [ 4 ]
", + "page_start": 5, + "page_end": 5, + "source_file": "wikipedia4.pdf" + }, + { + "text": "\n \n \n \n \n [html]Climate data for Lyon (≥ 3 %), elevation : 201 m, 1961 – 1990 normals and extremesMonthJanFebMarAprMay\n
JunJulAugSepOctNovDecYearRecord high ° C (° F )16.3 ( 61.3 )21.4 ( 70.5 )25.7 ( 78.3 )28.0 ( 82.4 )29.4 ( 84.9 )
34.4 ( 93.9 )39.8 ( 103.6 )37.1 ( 98.8 )33.8 ( 92.8 )28.4 ( 83.1 )22.6 ( 72.7 )20.2 ( 68.4 )39.8 ( 103.6 )Mean maximum ° C (° F )10.2 ( 50.4 )14.4 ( 57.9 )15.9 ( 60.6 )18.6 ( 65.5 )23.1 ( 73.6 )
28.8 ( 83.8 )32.8 ( 91.0 )28.1 ( 82.6 )27.3 ( 81.1 )19.7 ( 67.5 )14.1 ( 57.4 )9.5 ( 49.1 )32.8 ( 91.0 )Mean daily maximum ° C (° F )6.1 ( 43.0 )8.2 ( 46.8 )11.6 ( 52.9 )15.2 ( 59.4 )19.1 ( 66.4 )
22.9 ( 73.2 )26.1 ( 79.0 )26.0 ( 78.8 )22.4 ( 72.3 )17.1 ( 62.8 )10.0 ( 50.0 )6.4 ( 43.5 )15.9 ( 60.7 )Daily mean ° C (° F )3.0 ( 37.4 )4.9 ( 40.8 )7.4 ( 45.3 )10.2 ( 50.4 )14.0 ( 57.2 )
17.6 ( 63.7 )20.6 ( 69.1 )20.0 ( 68.0 )17.1 ( 62.8 )12.7 ( 54.9 )6.7 ( 44.1 )3.9 ( 39.0 )11.5 ( 52.7 )Mean daily minimum ° C (° F )0.2 ( 32.4 )1.4 ( 34.5 )2.9 ( 37.2 )5.2 ( 41.4 )9.1 ( 48.4 )
12.5 ( 54.5 )14.8 ( 58.6 )14.4 ( 57.9 )11.7 ( 53.1 )8.3 ( 46.9 )3.5 ( 38.3 )0.7 ( 33.3 )7.1 ( 44.7 )Mean minimum ° C (° F )− 7.0 ( 19.4 )− 4.7 ( 23.5 )− 1.4 ( 29.5 )3.2 ( 37.8 )7.6 ( 45.7 )
10.9 ( 51.6 )13.1 ( 55.6 )12.9 ( 55.2 )8.1 ( 46.6 )4.5 ( 40.1 )1.0 ( 33.8 )− 4.7 ( 23.5 )− 7.0 ( 19.4 )Record low ° C (° F )− 23.0 (− 9.4 )− 19.3 (− 2.7 )− 10.5 ( 13.1 )− 3.2 ( 26.2 )− 0.3 ( 31.5 )
3.6 ( 38.5 )6.1 ( 43.0 )5.2 ( 41.4 )1.9 ( 35.4 )− 3.2 ( 26.2 )− 7.1 ( 19.2 )− 16.0 ( 3.2 )− 23.0 (− 9.4 )Average precipitation mm ( inches )54.0 ( 2.13 )53.8 ( 2.12 )72.2 ( 2.84 )56.1 ( 2.21 )72.6 ( 2.86 )
73.2 ( 2.88 )54.5 ( 2.15 )71.6 ( 2.82 )53.2 ( 2.09 )56.2 ( 2.21 )68.0 ( 2.68 )55.8 ( 2.20 )741.2 ( 29.19 )Average precipitation days (≥ 1.0 mm )10.49.39.79.610.9
8.26.88.27.38.58.99.8107.6Average snowy days5.53.92.51.10.0
0.00.00.00.00.02.04.619.6Average relative humidity (%)8480747172
7065707682848676Mean monthly sunshine hours62.689.8147.5184.2215.9
250.9292.6259.0208.1134.375.355.41.975.6Percent possible sunshine2331414647
5462605640272142Source 1 : NOAA [ 42 ]
", + "page_start": 6, + "page_end": 6, + "source_file": "wikipedia4.pdf" + }, + { + "text": "**Lyon**\n\n**Lyon**[c] (Franco-Provençal:*Liyon*) is the second-largest city in France \nby urban area and the third largest by city limits.[14] It is located at the \nconfluence of the rivers Rhône and Saône, to the northwest of the \nFrench Alps, 391 km (243 mi) southeast of Paris, 278 km (173 mi) north \nof Marseille, 113 km (70 mi) southwest of Geneva, Switzerland, 58 km \n(36 mi) northeast of Saint-Étienne. \n\n**Lyon**\n\n*Liyon*(Arpitan) \n\n**Prefecture and commune**\n\nThe City of Lyon had a population of 522,250 at the Jan. 2021 census \nwithin its small municipal territory of 48 km2 (19 sq mi),[15] but \ntogether with its suburbs and exurbs the Lyon metropolitan area had a \npopulation of 2,308,818 that same year,[7] the second most populated in \nFrance. Lyon and 58 suburban municipalities have formed since 2015 \nthe Metropolis of Lyon, a directly elected metropolitan authority now in \ncharge of most urban issues, with a population of 1,424,069 in 2021.[16] \nLyon is the prefecture of the Auvergne-Rhône-Alpes region and seat of \nthe Departmental Council of Rhône (whose jurisdiction, however, no \nlonger extends over the Metropolis of Lyon since 2015). \n\nSkyline of Lyon in La Part-Dieu ", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia4.pdf" + }, + { + "text": "com/article/273644).*Digitaljournal.com*. \n\n35. (in French) Georges Duby (ed),*Histoire de la France : Dynasties et révolutions, de 1348 à 1852*(vol. 2), \nLarousse, 1999 p. 53 ISBN 2-03-505047-2 \n\n36. \"Lyon, France: Local Transport\" (http://www.lonelyplanet.com/france/burgundy-and-the-rhone/lyon/transport/g \netting-around/local-transport). Lonely Planet. Retrieved 2 February 2017. \n\n37. \"Historic Site of Lyon\" (https://whc.unesco.org/en/list/872/).*unesco.org*. UNESCO World Heritage Centre. \nRetrieved 31 July 2015. \n\n38. Gregory, Stanley. “Climatic Classification and Climatic Change (Klimaklassifikation Und Klimaänderung) (http \ns://www.jstor.org/stable/25636095).”*Erdkunde*, vol. 8, no. 4, 1954, pp. 246–252.*JSTOR.*\n\n39. \"Données climatiques de la station de Lyon: Relevés de 2016 – Lyon\" (https://web.archive.org/web/20161004 ", + "page_start": 22, + "page_end": 22, + "source_file": "wikipedia4.pdf" + }, + { + "text": " temperatures in ", + "page_start": 393, + "page_end": 393, + "source_file": "00-80T-80.pdf" + }, + { + "text": "**Demographics**\n\nThe population of the city (commune) of Lyon proper was 522,250 at the January 2021 census.[15] As of 2011, 14% of its \npopulation was born outside Metropolitan France.[67] ", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia4.pdf" + }, + { + "text": "**Metropolis**\nSince 2015, the commune of Lyon (48 km2 (19 sq mi) in land area) and 58 suburban communes \nhave formed the Metropolis of Lyon (534 km2 (206 sq mi) in land area), a directly elected \nmetropolitan authority now in charge of most urban issues. The Metropolis of Lyon is the only \nmetropolitan authority in France which is a territorial collectivity, on par with French communes \nand departments. Its metropolitan council was for the first time directly elected by universal \nsuffrage in 2020 within 14 electoral wards, the only directly elected metropolitan council in \nFrance. \n\nThe 14 electoral wards are the following (see map for location): \n\n Lônes et coteaux \n\nMap of the Metropolis of \nLyon and its 59 \ncommunes (the \ncommune of Lyon is in \nred) \n\n Lyon-Centre (Lyon-Centre) \n\n Lyon-Est (Lyon-East) \n Lyon-Nord (Lyon-North) \n\n Lyon-Ouest \n\n Lyon-Sud \n Lyon-Sud-Est \n\n Ouest \n Plateau Nord-Caluire \n\n Porte des Alpes \n\n Portes du Sud \n Rhône Amont \n\n Val de Saône \n\n Villeurbanne \n\nThe six wards with names starting with \"Lyon\" are all located within the commune of Lyon. The Villeurbanne ward is \ncoterminous with the namesake commune. All other seven wards each group various suburban communes. ", + "page_start": 8, + "page_end": 8, + "source_file": "wikipedia4.pdf" + }, + { + "text": "Data accessibility. This article has no additional data. \nCompeting interests. We declare we have no competing interests. \nFunding. This research received funding from the European Union Seventh Framework Programme FP7/2007– \n2013 under grant agreement no. 603864 (HELIX: \n‘High-End cLimate Impacts and eXtremes’; www. \nhelixclimate.eu). The work of R.A.B., C.B., J.C., L.G., K.L. and K.R. was additionally supported by the Joint \nUK BEIS/Defra Met Office Hadley Centre Climate Programme (GA01101). \nAcknowledgements. The authors thank Ed Pope, Jason Lowe and Dann Mitchell for advice and discussion, \nAlissa Haward and Maria Pearce for project management and administration of HELIX, and two anonymous \nreviewers whose comments substantially improved the paper. ", + "page_start": 24, + "page_end": 24, + "source_file": "pubmed11.pdf" + }, + { + "text": "The city of Lyon and 58 suburban municipalities have formed since 2015 the Metropolis of Lyon, a directly elected \nmetropolitan authority now in charge of most urban issues, with a population of 1,424,069 in 2021.[16] ", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia4.pdf" + } + ] + }, + { + "references": { + "source_file": "uksi_20210538_en.pdf", + "query": " What should do the rector, vicar or curate in charge of a church or chapel to which a register of marriage services has been provided ?", + "target_page": 2, + "target_passage": "ensure that the register is kept in that church or chapel, and (b) do everything that is reasonably practicable to ensure that the register is protected against theft, loss or damage.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Requirements about the keeping of registers of marriage services**\n\n**4.**—(1) The rector, vicar or curate in charge of a church or chapel to which a register of marriage \n\nservices has been provided under regulation 2(1) must— \n\n(a) ensure that the register is kept in that church or chapel, and \n(b) do everything that is reasonably practicable to ensure that the register is protected against \n\ntheft, loss or damage. \n\n(2) Where there is no rector, vicar or curate in charge of a church or chapel to which a register of \nmarriage services has been provided under regulation 2(1), the obligations under paragraph (1) in \nrespect of that register fall on the churchwardens of the parish in which the church or chapel is \nsituated. ", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "*Made* *-* *-* *-* *-* *29th April 2021*\n\n*Coming into force -* *-* *4th May 2021*\n\nThe Registrar General makes these Regulations with the approval of the Secretary of State in \nexercise of the powers conferred by section 74(1)(c)(v), (1A)(a) and (3) of the Marriage Act \n1949(**a**). \n\n**Citation, commencement, extent and interpretation**\n\n**1.**—(1) These Regulations may be cited as the Marriage (Keeping of Records in Churches and \n\nChapels) Regulations 2021. \n\n(2) These Regulations come into force on 4th May 2021. \n(3) These Regulations extend to England and Wales. \n(4) In these Regulations, “chapel” does not include a chapel to which Part 5 of the Marriage Act \n1949 (marriages in naval, military and air force chapels) applies(**b**). \n\n**Duty of parochial church councils to provide registers of marriage services**\n\n**2.**—(1) The parochial church council of a parish must provide books for the purpose of making \nrecords under regulation 3 to each church and chapel of the Church of England(**c**) in that parish in \nwhich banns of matrimony may be published. \n\n(2) Books provided under paragraph (1) are to be known as “registers of marriage services”. \n(3) A register of marriage services provided under paragraph (1) must meet the requirements of \nparagraphs (4) and (5). \n\n(4) The register must be made of durable material. \n(5) For the purposes of enabling a record to be made in the register under regulation 3 in respect \n\nof a marriage, the register must be printed in such a way that it— ", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "**EXPLANATORY NOTE**\n\n*(This note is not part of the Regulations)*\n\nThese Regulations provide for records of marriages to be kept in churches and chapels of the \nChurch of England and the Church in Wales, other than chapels to which Part 5 of the Marriage \nAct 1949 applies (naval, military and air force chapels). \n\nRegulation 2 requires parochial church councils to provide books known as “registers of marriage \nservices” to churches and chapels in their parish in which banns of matrimony may be published, \nfor the purposes of keeping the records required by regulation 3. Regulation 2 also imposes \nrequirements relating to the durability and pre-printed content of these registers, and provides that \nthey belong to the parochial church council. \n\nRegulation 3 requires specified information to be recorded in a register of marriage services when \na marriage has been solemnized on or after 4th May 2021 according to the rites of the Church of \nEngland or Church in Wales in a church or chapel in which banns of matrimony may be \npublished. The record must be made and signed by the member of the clergy by whom the \nmarriage was solemnized. ", + "page_start": 2, + "page_end": 2, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "**Duty to record information about marriages solemnized according to the rites of the Church**\n**of England or Church in Wales**\n\n**3.**—(1) Paragraphs (2), (3) and (4) apply where a marriage has been solemnized according to the \nrites of the Church of England in a church or chapel in which banns of matrimony may be \npublished. \n\n(2) As soon as practicable after the marriage has been solemnized, the clergyman by whom the \nmarriage was solemnized must make a record of the following information in relation to that \nmarriage in a register of marriage services provided to the church or chapel under regulation \n2(1)— \n\n(a) the date and place of the marriage; \n(b) the name and surname of each party; \n(c) the date of birth of each party; \n(d) the occupation (if any) of each party; \n(e) the address of each party at the time of the marriage; \n(f) \n\nthe names and surnames of each party’s parents, so far as those names and surnames are \nknown to the clergyman who solemnized the marriage; \n\n(g) the name and surname of each of the witnesses in whose presence the marriage was \nsolemnized; \n\n(h) the name and surname of the clergyman by whom the marriage was solemnized. \n\n(3) The clergyman must record the information required by paragraph (2) in English, and may \nalso record information required by that paragraph in Welsh where the church or chapel is situated \nin Wales. \n\n(4) After making a record under paragraph (2) the clergyman must sign it. \n(5) This regulation does not apply in relation to a marriage solemnized before 4th May 2021. ", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "(a) indicates the descriptions of information required by each of sub-paragraphs (a) to (h) of \nregulation 3(2) in relation to the marriage, and \n\n(b) provides corresponding spaces for recording information required by each of those sub- \n\nparagraphs in relation to the marriage. \n\n(6) A register of marriage services provided under paragraph (1) by a parochial church council \nbelongs to that parochial church council. ", + "page_start": 1, + "page_end": 1, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "(**a**) 1949 c. 76 (12 & 13 Geo 6). Section 74 was amended by Schedule 2 to the Registration Service Act 1953 (c. 37) and by \nparagraph 5(1)(d) of Schedule 2 to the Transfer of Functions (Registration) Order 2008 (S.I. 2008/678) and subsequently \nrenumbered as section 74(1) by article 12 of the Registration of Marriages etc. (Electronic Communications and Electronic \nStorage) Order 2009 (S.I. 2009/2821). Section 74(1) was amended by paragraph 19 of Schedule 15 to the Immigration Act \n2016 (c. 19) and paragraph 43 of Schedule 1 to the Registration of Marriages Regulations 2021 (S.I. 2021/411), which also \ninserted subsection (1A). \n(**b**) See section 68(2) of the Marriage Act 1949. The certification function of the Admiralty under that section was transferred to \nthe Secretary of State by the Defence (Transfer of Functions) Act 1964 (c. 15). \n(**c**) Section 78(2) of the Marriage Act 1949 provides for references to the Church of England to be construed as including ", + "page_start": 0, + "page_end": 0, + "source_file": "uksi_20210538_en.pdf" + }, + { + "text": "this purpose; \n\n(b) if P complies with any reasonable requirements imposed by the person so authorised in \n\nrelation to the exercise, the visit to the person or attendance at the funeral. \n\n**Meaning of “place”**\n\n**14.**For the purposes of this Schedule the place referred to in paragraphs 8 to 13 means the room \nin the designated accommodation where P is staying and, if connected to the room where P is \nstaying, the room of any person referred to in paragraph 11(a) (travelling companion), including \nany balcony, and does not include the communal areas or any garden, yard, passage, stair, garage, \nouthouse or appurtenance of the accommodation in which the place is situated. \n\n**Designations**\n\n**15.**The Secretary of State must designate for the purposes of this Schedule— \n\n(a) accommodation; \n(b) transportation to the designated accommodation, \n\nand must publish details of the designations in such manner as appears to the Secretary of State to \nbe appropriate. \n\n**Duties where P is a child**\n\n**16.**If P is a child— \n\n(a) any person who has custody or charge of P when P is travelling to England must ensure, \nso far as is reasonably practicable, that P complies with the obligations in paragraphs 5 \nand 6; \n\n(b) any person who has custody or charge of P during P’s period of self-isolation must \nensure, so far as is reasonably practicable, that P self-isolates in accordance with this \nSchedule. ", + "page_start": 77, + "page_end": 77, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "(b) \nin the case of a by-election, as soon as practicable after a vacancy has occurred among \nthe Specially Elected Members. \n(2) A meeting of the Elected Members of the National Assembly that is held for the purpose of \na general election shall be summoned by the Speaker. \n(3) No other business than the holding of a general election may be transacted at any meeting ", + "page_start": 56, + "page_end": 56, + "source_file": "Botswana-constitution.pdf" + }, + { + "text": "(d) to visit a person (“D”) whom P reasonably believes is dying, and where P is a member of \nD’s household or a close family member or friend of D; \n\n(e) to attend the funeral of a member of P’s household or a close family member; \n(f) \n\nin other exceptional circumstances such as— \n(i) to seek medical assistance where this is required urgently or on the advice of a \nregistered medical practitioner including to access services from dentists, opticians, \naudiologists, chiropodists, chiropractors, osteopaths and other medical and health \npractitioners, including services relating to mental health, \n\n(ii) to access critical public services including social services or services provided to \nvictims (such as victims of crime), \n\n(iii) to avoid injury or illness or to escape risk of harm, \n(iv) to access veterinary services where this is required urgently or on the advice of a \n\nveterinary surgeon. \n\n(2) P may only leave or be outside of the place where P is self-isolating in reliance on the \n\ngrounds mentioned in sub-paragraph (1)(c), (d) or (e)— \n\n(a) if P has been given prior permission by a person authorised by the Secretary of State for ", + "page_start": 77, + "page_end": 77, + "source_file": "uksi_20210582_en.pdf" + }, + { + "text": "undertaken by the test provider, and responsibility for reporting medical issues; \n\n(f) \n\nthey have an effective system of clinical governance in place which includes appropriate \nstandard operating procedures in relation to the carrying out of appropriate tests; \n\n(g) a registered clinical scientist has oversight of clinical practices undertaken by the test \nprovider, and responsibility for reporting clinical issues; \n\n(h) they have systems in place to identify any adverse incidents or quality control issues in \nrelation to appropriate tests and be able to report them as soon as reasonably practicable \nto the Secretary of State; \n\n(i) \n\nthey administer or provide an appropriate test to P, on or after the fifth day after the day \non which P arrived in England having received the information required by paragraph \n4(b) and (c) (as appropriate); and \n\n(j) \n\nif they arrange with another person (“X”) for X to carry out any element of the single \nend-to-end testing service on their behalf, the test provider ensures that X complies with \nany of paragraphs (c) to (i) and 5(2), (3) and (5) as is relevant to the carrying out of that \nelement. \n\n(2) For the purposes of sub-paragraph (1)— \n\n(a) “point of care test” means a test processed outside a laboratory environment; \n(b) “registered clinical scientist” means a person registered as a clinical scientist with the \nHealth and Care Professions Council pursuant to article 5 of the Health Professions Order \n2001(**b**); \n\n(c) “single end-to-end testing service” means a service which comprises accepting the \nbooking from the person to be tested, collecting and processing the sample to be tested, \ncarrying out genomic sequencing and providing the test result to P. \n\n(3) For the purposes of sub-paragraph (1)(c) and (d), a person or laboratory (as the case may be) \nmeets the relevant requirements for accreditation to a standard where that person, or in the case of \na laboratory where the person who is the operator of the laboratory— \n\n(a) has made a valid application for accreditation to UKAS (“stage one”); and \n\n(b) complies with the requirements of sub-paragraph (4) where relevant. \n\n(4) The requirements of this sub-paragraph are that— \n\n(a) in the case of a person who completed stage one— \n\n(i) before 15th December 2020 and who is carrying out a test after 18th January 2021, \n(ii) on or after 15th December 2020 and who is carrying out a test after whichever is the \n\nlater of— \n(aa) 18th January 2021, and \n(bb) the date four weeks after the date on which they completed stage one, \n\nthey have complied with the requirements published by UKAS in relation to accreditation \nto that standard at http://www.ukas.com/C19-Stage2-UKAS-Appraisal (“stage two”), \n\n(b) in the case of a person who completed stage two— \n\n(i) on or before 18th January 2021 and who is carrying out a test on or after 1st July \n\n2021, \n\n(ii) after 18th January 2021 and who is carrying out a test on or after whichever is the \n\nlater of— \n(aa) 1st July 2021, and \n(bb) the date four months after the date on which they completed stage two, \n\nthey are accredited by UKAS to that standard. ", + "page_start": 69, + "page_end": 69, + "source_file": "uksi_20210582_en.pdf" + } + ] + }, + { + "references": { + "source_file": "tesla_form_10q.pdf", + "query": "What are Tesla's total liabilities and equity in 2024?", + "target_page": 5, + "target_passage": "119,852", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Litigation Related to Directors’ Compensation \n\nOn June 17, 2020, a purported Tesla stockholder filed a derivative action in the Delaware Court of Chancery, \n\npurportedly on behalf of Tesla, against certain of Tesla’s current and former directors regarding compensation awards granted \nto Tesla’s directors, other than Elon Musk, between 2017 and 2020. The suit asserts claims for breach of fiduciary duty and \nunjust enrichment and seeks declaratory and injunctive relief, unspecified damages and other relief. Defendants filed their \nanswer on September 17, 2020. \n\nOn July 14, 2023, the parties filed a Stipulation and Agreement of Compromise and Settlement, which does not involve \n\nan admission of any wrongdoing by any party. If the settlement is approved by the Court, this action will be fully settled and \ndismissed with prejudice. Pursuant to the terms of the agreement, Tesla provided notice of the proposed settlement to \nstockholders of record as of July 14, 2023. The Court held a hearing regarding the settlement on October 13, 2023, after which \nit took the settlement and plaintiff counsels’ fee request under advisement. On August 14, 2024, the parties submitted a joint \nletter requesting that the Court approve and enter final judgment with respect to the settlement, and decide the fee request at a \nlater date. The settlement is not expected to have an adverse impact on our results of operations, cash flows or financial \nposition. ", + "page_start": 26, + "page_end": 26, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "2024 Notes \n\nDuring the second quarter of 2024, the 2024 Notes reached maturity and were fully settled. Additionally, during the third \nquarter of 2024, we settled the warrants entered into in connection with the issuance of the 2024 Notes, resulting in the issuance \nof 8.5 million shares of our common stock. The remaining warrants were settled in October 2024. \n\nAutomotive Asset-backed Notes \n\nDuring the nine months ended September 30, 2024, we transferred beneficial interests related to certain leased vehicles \n\nand financing receivables into special purpose entities and issued $1.57 billion in aggregate principal amount of Automotive \nAsset-backed Notes, with terms similar to our other previously issued Automotive Asset-backed Notes. The proceeds from the \nissuance, net of debt issuance costs, were $1.56 billion. \n\nIn October 2024, we transferred beneficial interests related to certain leased vehicles into a special purpose entity and \n\nissued $783 million in aggregate principal amount of Automotive Asset-backed Notes, with terms similar to our other \npreviously issued Automotive-backed Notes. \n\nChina Working Capital Facility \n\nIn April 2024, one of our subsidiaries entered into a loan agreement (the “China Working Capital Facility”) with lenders \nin China for an unsecured revolving facility of up to RMB 20.00 billion to be used for certain production expenditures as well \nas repayment of certain finance facilities. Borrowed funds bear interest at a rate equal to the Loan Prime Rate published by the \nPeople’s Bank of China minus 1.18%. The China Working Capital Facility is non-recourse to our assets. ", + "page_start": 24, + "page_end": 24, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "TESLA, INC. \n\nFORM 10-Q FOR THE QUARTER ENDED SEPTEMBER 30, 2024 \n\nINDEX \n\nPART I. FINANCIAL INFORMATION \n\nItem 1. Financial Statements \n\nConsolidated Balance Sheets \n\nConsolidated Statements of Operations \n\nConsolidated Statements of Comprehensive Income \n\nConsolidated Statements of Redeemable Noncontrolling Interests and Equity \n\nConsolidated Statements of Cash Flows \n\nNotes to Consolidated Financial Statements \n\nItem 2. Management's Discussion and Analysis of Financial Condition and Results of Operations \n\nItem 3. Quantitative and Qualitative Disclosures about Market Risk \n\nItem 4. Controls and Procedures ", + "page_start": 2, + "page_end": 2, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Certain Derivative Lawsuits in Delaware \n\nBefore converting from a Delaware to Texas corporation on June 13, 2024, three separate derivative actions brought by \npurported Tesla stockholders were filed in the Delaware Court of Chancery on May 24, June 10 and June 13, 2024, purportedly \non behalf of Tesla, against current and former directors regarding topics involving Elon Musk and others, X Corp. (formerly \nTwitter) and x.AI. These suits assert various claims, including breach of fiduciary duty and breach of contract, and seek \nunspecified damages and other relief. On August 6, 2024, the plaintiffs in these three actions moved to consolidate the matters \ninto a single case, and a hearing on that motion is scheduled for November 18, 2024. \n\nLitigation and Investigations Relating to Alleged Discrimination and Harassment \n\nOn February 9, 2022, the California Civil Rights Department (“CRD,” formerly “DFEH”) filed a civil complaint against \n\nTesla in Alameda County, California Superior Court, alleging systemic race discrimination, hostile work environment and pay \nequity claims, among others. CRD’s amended complaint seeks monetary damages and injunctive relief. The case is currently in \ndiscovery. Trial is scheduled for September 15, 2025. ", + "page_start": 27, + "page_end": 27, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Tesla, Inc. \n\nConsolidated Statements of Comprehensive Income \n(in millions) \n(unaudited) \n\nThree Months Ended September 30, \n\n2024 2023 \n\nNet income \nOther comprehensive income (loss): \n\n$ 2,183 $ 1,878 $ \n\nForeign currency translation adjustment \nUnrealized net gain on investments, net of tax \nNet loss realized and included in net income 445 \n8 \n— (289) \n7 \n— \n\n2,636 1,596 \n\nComprehensive income \nLess: Comprehensive income (loss) attributable to \nnoncontrolling interests and redeemable \nnoncontrolling interests in subsidiaries \nComprehensive income attributable to common \nstockholders \n$ ", + "page_start": 7, + "page_end": 7, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "New York alleging breach of a stock warrant agreement that was entered into as part of a convertible notes offering in 2014. In \n2018, JP Morgan informed Tesla that it had adjusted the strike price based upon Mr. Musk’s August 7, 2018 Twitter post that he \nwas considering taking Tesla private. Tesla disputed JP Morgan’s adjustment as a violation of the parties’ agreement. In 2021, \nTesla delivered shares to JP Morgan per the agreement, which they duly accepted. JP Morgan now alleges that it is owed \napproximately $162 million as the value of additional shares that it claims should have been delivered as a result of the \nadjustment to the strike price in 2018. On January 24, 2022, Tesla filed multiple counterclaims as part of its answer to the \nunderlying lawsuit, asserting among other points that JP Morgan should have terminated the stock warrant agreement in 2018 \nrather than make an adjustment to the strike price that it should have known would lead to a commercially unreasonable result. \nTesla believes that the adjustments made by JP Morgan were neither proper nor commercially reasonable, as required under the \nstock warrant agreements. JP Morgan filed a motion for judgment on the pleadings, which Tesla opposed, and on September \n12, 2024, the Court denied JP Morgan’s motion. ", + "page_start": 27, + "page_end": 27, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Between August 10, 2018 and September 6, 2018, nine purported stockholder class actions were filed against Tesla and \n\nElon Musk in connection with Mr. Musk’s August 7, 2018 Twitter post that he was considering taking Tesla private. On \nJanuary 16, 2019, Plaintiffs filed their consolidated complaint in the United States District Court for the Northern District of \nCalifornia and added as defendants the members of Tesla’s board of directors. The consolidated complaint asserts claims for \nviolations of the federal securities laws and seeks unspecified damages and other relief. The parties stipulated to certification of \na class of stockholders, which the court granted on November 25, 2020. Trial started on January 17, 2023, and on February 3, \n2023, a jury rendered a verdict in favor of the defendants on all counts. After trial, plaintiffs filed a motion for judgment as a \nmatter of law and a motion for new trial, which the Court denied and judgement was entered in favor of defendants on July 11, \n2023. On July 14, 2023, plaintiffs filed a notice of appeal. The appeal, which is pending in the United States Court of Appeals \nfor the Ninth Circuit, has been fully briefed by the parties, and is scheduled for oral argument on October 25, 2024. ", + "page_start": 26, + "page_end": 26, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Tesla, Inc. \n\nNotes to Consolidated Financial Statements \n\n(unaudited) \n\nNote 1 – Overview & Summary of Significant Accounting Policies \n\nOverview \n\nTesla, Inc. (“Tesla”, the “Company”, “we”, “us” or “our”) was incorporated in the State of Delaware on July 1, 2003 and \nconverted to a Texas corporation on June 13, 2024. ", + "page_start": 12, + "page_end": 12, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Assets \n\nCurrent assets \n\nCash and cash equivalents \n\nShort-term investments \n\nAccounts receivable, net \n\nInventory \n\nPrepaid expenses and other current assets \n\nTotal current assets \n\nOperating lease vehicles, net \n\nSolar energy systems, net \n\nProperty, plant and equipment, net \n\nOperating lease right-of-use assets \n\nDigital assets, net \n\nIntangible assets, net \n\nGoodwill \n\nDeferred tax assets \n\nOther non-current assets \n\nTotal assets \n\nLiabilities \n\nCurrent liabilities \n\nAccounts payable \n\nAccrued liabilities and other \n\nDeferred revenue \n\nCurrent portion of debt and finance leases \n\nTotal current liabilities \n\nDebt and finance leases, net of current portion \n\nDeferred revenue, net of current portion \n\nOther long-term liabilities \n\nTotal liabilities \n\nCommitments and contingencies (Note 10) \n\nRedeemable noncontrolling interests in subsidiaries \n\nEquity \n\nStockholders’ equity \n\nPreferred stock; $0.001 par value; 100 shares authorized; no shares issued and outstanding \n\noutstanding as of September 30, 2024 and December 31, 2023, respectively \n\nAdditional paid-in capital \n\nAccumulated other comprehensive loss \n\nRetained earnings \n\nTotal stockholders’ equity \n\nNoncontrolling interests in subsidiaries \n\nTotal liabilities and equity ", + "page_start": 4, + "page_end": 4, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "On February 27, 2023, a proposed class action was filed in the U.S. District Court for the Northern District of California \n\nagainst Tesla, Inc., Elon Musk and certain current and former Company executives. The complaint alleges that the defendants \nmade material misrepresentations and omissions about the Company’s Autopilot and FSD Capability technologies and seeks \nmoney damages and other relief on behalf of persons who purchased Tesla stock between February 19, 2019, and February 17, \n2023. An amended complaint was filed on September 5, 2023, naming only Tesla, Inc. and Elon Musk as defendants. On \nNovember 6, 2023, Tesla moved to dismiss the amended complaint. On September 30, 2024, the Court granted Tesla’s motion \nto dismiss without prejudice. \n\nOn March 14, 2023, a proposed class action was filed against Tesla, Inc. in the U.S. District Court for the Northern \n\nDistrict of California. Several similar complaints were also filed in the same court and these cases have now all been \nconsolidated. These complaints allege that Tesla violates federal antitrust and warranty laws through its repair, service, and \nmaintenance practices and seeks, among other relief, damages for persons who paid Tesla for repairs services or Tesla \ncompatible replacement parts from March 2019 to March 2023. On July 17, 2023, these plaintiffs filed a consolidated amended \ncomplaint. On September 27, 2023, the court granted Tesla’s motion to compel arbitration as to three of the plaintiffs, and on \nNovember 17, 2023, the court granted Tesla’s motion to dismiss without prejudice. The plaintiffs filed a Consolidated Second \nAmended Complaint on December 12, 2023, which Tesla moved to dismiss. Plaintiffs also appealed the court’s arbitration \norder, which was denied. On June 17, 2024, the Court granted in part and denied in part Tesla’s motion to dismiss the \nConsolidated Second Amended Complaint. ", + "page_start": 28, + "page_end": 28, + "source_file": "tesla_form_10q.pdf" + } + ] + }, + { + "references": { + "source_file": "tesla_form_10q.pdf", + "query": "Where was Tesla incorporated? ", + "target_page": 13, + "target_passage": "State of Delaware", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Tesla, Inc. \n\nNotes to Consolidated Financial Statements \n\n(unaudited) \n\nNote 1 – Overview & Summary of Significant Accounting Policies \n\nOverview \n\nTesla, Inc. (“Tesla”, the “Company”, “we”, “us” or “our”) was incorporated in the State of Delaware on July 1, 2003 and \nconverted to a Texas corporation on June 13, 2024. ", + "page_start": 12, + "page_end": 12, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Certain Derivative Lawsuits in Delaware \n\nBefore converting from a Delaware to Texas corporation on June 13, 2024, three separate derivative actions brought by \npurported Tesla stockholders were filed in the Delaware Court of Chancery on May 24, June 10 and June 13, 2024, purportedly \non behalf of Tesla, against current and former directors regarding topics involving Elon Musk and others, X Corp. (formerly \nTwitter) and x.AI. These suits assert various claims, including breach of fiduciary duty and breach of contract, and seek \nunspecified damages and other relief. On August 6, 2024, the plaintiffs in these three actions moved to consolidate the matters \ninto a single case, and a hearing on that motion is scheduled for November 18, 2024. \n\nLitigation and Investigations Relating to Alleged Discrimination and Harassment \n\nOn February 9, 2022, the California Civil Rights Department (“CRD,” formerly “DFEH”) filed a civil complaint against \n\nTesla in Alameda County, California Superior Court, alleging systemic race discrimination, hostile work environment and pay \nequity claims, among others. CRD’s amended complaint seeks monetary damages and injunctive relief. The case is currently in \ndiscovery. Trial is scheduled for September 15, 2025. ", + "page_start": 27, + "page_end": 27, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Additionally, on June 1, 2022 the Equal Employment Opportunity Commission (“EEOC”) issued a cause finding against \nTesla that closely parallels the CRD’s allegations. On September 28, 2023, the EEOC filed a civil complaint against Tesla in the \nUnited States District Court for the Northern District of California asserting claims for race harassment and retaliation and \nseeking, among other things, monetary and injunctive relief. ", + "page_start": 27, + "page_end": 27, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "On June 16, 2022, two Tesla stockholders filed separate derivative actions in the U.S. District Court for the Western \nDistrict of Texas, purportedly on behalf of Tesla, against certain of Tesla’s current and former directors. Both suits assert claims \nfor breach of fiduciary duty, unjust enrichment, and violation of the federal securities laws in connection with alleged race and \ngender discrimination and sexual harassment. Among other things, plaintiffs seek declaratory and injunctive relief, unspecified \ndamages payable to Tesla, and attorneys’ fees. On July 22, 2022, the Court consolidated the two cases and on September 6, \n2022, plaintiffs filed a consolidated complaint. On November 7, 2022, the defendants filed a motion to dismiss the case and on \nSeptember 15, 2023, the Court dismissed the action but granted plaintiffs leave to file an amended complaint. On November 2, \n2023, plaintiff filed an amended complaint purportedly on behalf of Tesla, against Elon Musk. On December 19, 2023, the \ndefendants moved to dismiss the amended complaint, which the Court granted on April 12, 2024, with leave for plaintiffs to \namend. On May 15, 2024, plaintiffs filed a second amended consolidated complaint purportedly on behalf of Tesla, against Mr. \nMusk. On July 1, 2024, the defendants moved to dismiss the second amended consolidated complaint. ", + "page_start": 27, + "page_end": 27, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "On February 27, 2023, a proposed class action was filed in the U.S. District Court for the Northern District of California \n\nagainst Tesla, Inc., Elon Musk and certain current and former Company executives. The complaint alleges that the defendants \nmade material misrepresentations and omissions about the Company’s Autopilot and FSD Capability technologies and seeks \nmoney damages and other relief on behalf of persons who purchased Tesla stock between February 19, 2019, and February 17, \n2023. An amended complaint was filed on September 5, 2023, naming only Tesla, Inc. and Elon Musk as defendants. On \nNovember 6, 2023, Tesla moved to dismiss the amended complaint. On September 30, 2024, the Court granted Tesla’s motion \nto dismiss without prejudice. \n\nOn March 14, 2023, a proposed class action was filed against Tesla, Inc. in the U.S. District Court for the Northern \n\nDistrict of California. Several similar complaints were also filed in the same court and these cases have now all been \nconsolidated. These complaints allege that Tesla violates federal antitrust and warranty laws through its repair, service, and \nmaintenance practices and seeks, among other relief, damages for persons who paid Tesla for repairs services or Tesla \ncompatible replacement parts from March 2019 to March 2023. On July 17, 2023, these plaintiffs filed a consolidated amended \ncomplaint. On September 27, 2023, the court granted Tesla’s motion to compel arbitration as to three of the plaintiffs, and on \nNovember 17, 2023, the court granted Tesla’s motion to dismiss without prejudice. The plaintiffs filed a Consolidated Second \nAmended Complaint on December 12, 2023, which Tesla moved to dismiss. Plaintiffs also appealed the court’s arbitration \norder, which was denied. On June 17, 2024, the Court granted in part and denied in part Tesla’s motion to dismiss the \nConsolidated Second Amended Complaint. ", + "page_start": 28, + "page_end": 28, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "UNITED STATES \nSECURITIES AND EXCHANGE COMMISSION \nWashington, D.C. 20549 \nFORM 10-Q \n\n(Mark One) \nx QUARTERLY REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF \n1934 \n\nFor the quarterly period ended September 30, 2024 \nOR \no TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF \n1934 \n\nFor the transition period from__ ____ ___to__ ____ ___\n\nCommission File Number: 001-34756 \n\nTesla, Inc. \n\n(Exact name of registrant as specified in its charter) \n\nTexas 91-2197729 \n\n(State or other jurisdiction of \nincorporation or organization) (I.R.S. Employer \nIdentification No.) ", + "page_start": 0, + "page_end": 0, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Between October 17, 2018 and March 8, 2021, seven derivative lawsuits were filed in the Delaware Court of Chancery, \n\npurportedly on behalf of Tesla, against Mr. Musk and the members of Tesla’s board of directors, as constituted at relevant \ntimes, in relation to statements made and actions connected to a potential going private transaction, with certain of the lawsuits \nchallenging additional Twitter posts by Mr. Musk, among other things. Several of those actions were consolidated, and all have \nbeen stayed. In addition to these cases, two derivative lawsuits were filed on October 25, 2018 and February 11, 2019 in the \nU.S. District Court for the District of Delaware, purportedly on behalf of Tesla, against Mr. Musk and the members of the Tesla \nboard of directors as then constituted. Those cases have also been consolidated and stayed pending resolution of the appeal in \nthe above-referenced consolidated purported stockholder class action. ", + "page_start": 26, + "page_end": 26, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Between August 10, 2018 and September 6, 2018, nine purported stockholder class actions were filed against Tesla and \n\nElon Musk in connection with Mr. Musk’s August 7, 2018 Twitter post that he was considering taking Tesla private. On \nJanuary 16, 2019, Plaintiffs filed their consolidated complaint in the United States District Court for the Northern District of \nCalifornia and added as defendants the members of Tesla’s board of directors. The consolidated complaint asserts claims for \nviolations of the federal securities laws and seeks unspecified damages and other relief. The parties stipulated to certification of \na class of stockholders, which the court granted on November 25, 2020. Trial started on January 17, 2023, and on February 3, \n2023, a jury rendered a verdict in favor of the defendants on all counts. After trial, plaintiffs filed a motion for judgment as a \nmatter of law and a motion for new trial, which the Court denied and judgement was entered in favor of defendants on July 11, \n2023. On July 14, 2023, plaintiffs filed a notice of appeal. The appeal, which is pending in the United States Court of Appeals \nfor the Ninth Circuit, has been fully briefed by the parties, and is scheduled for oral argument on October 25, 2024. ", + "page_start": 26, + "page_end": 26, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "SIGNATURES \n\nPursuant to the requirements of Section 13 or 15(d) the Securities Exchange Act of 1934, the registrant has duly \ncaused this report to be signed on its behalf by the undersigned, thereunto duly authorized. \n\nTesla, Inc. ", + "page_start": 48, + "page_end": 48, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "On October 21, 2022, a lawsuit was filed in the Delaware Court of Chancery by a purported shareholder of Tesla \n\nalleging, among other things, that board members breached their fiduciary duties in connection with their oversight of the \nCompany’s 2018 settlement with the SEC, as amended. Among other things, the plaintiff seeks reforms to the Company’s \ncorporate governance and internal procedures, unspecified damages, and attorneys’ fees. The lawsuit has been stayed pending \nresolution of a motion to consolidate certain derivative lawsuits in the Delaware Court of Chancery referenced below. \n\nOn November 15, 2021, JPMorgan Chase Bank (“JP Morgan”) filed a lawsuit against Tesla in the Southern District of ", + "page_start": 27, + "page_end": 27, + "source_file": "tesla_form_10q.pdf" + } + ] + }, + { + "references": { + "source_file": "tesla_form_10q.pdf", + "query": "What is the reason for the increase in Tesla's tax rate from 2023 to 2024?", + "target_page": 26, + "target_passage": " increase in our effective tax rate is primarily due to the impact of releasing the valuation allowance on our U.S. deferred tax assets in the fourth quarter of 2023 and changes in the mix of our jurisdictional earnings", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "Our provision for income taxes increased by $434 million in the three months ended September 30, 2024 and increased \nby $652 million in the nine months ended September 30, 2024 as compared to the three and nine months ended September 30, \n2023, respectively. Our effective tax rate increased from 8% to 22% in the three months ended September 30, 2024 and \nincreased from 10% to 23% in the nine months ended September 30, 2024 as compared to the three and nine months ended \nSeptember 30, 2023, respectively. These increases are primarily due to the impact of releasing the valuation allowance on our \nU.S. deferred tax assets in the fourth quarter of 2023 and changes in mix of jurisdictional earnings. \n\nSee Note 9, Income Taxes, to the consolidated financial statements included elsewhere in this Quarterly Report on Form \n10-Q for further details. \n\nLiquidity and Capital Resources \n\nWe expect to continue to generate net positive operating cash flow as we have done in the last five fiscal years. The cash \n\nwe generate from our core operations enables us to fund ongoing operations and production, our research and development \nprojects for new products and technologies including our proprietary battery cells, additional manufacturing ramps at existing \nmanufacturing facilities, the construction of future factories, and the continued expansion of our retail and service locations, \nbody shops, Mobile Service fleet, Supercharger, including to support NACS, energy product installation capabilities and \nautonomy and other artificial intelligence enabled products. ", + "page_start": 42, + "page_end": 42, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Cost of services and other revenue increased $507 million, or 25%, in the three months ended September 30, 2024 as \n\ncompared to the three months ended September 30, 2023. Cost of services and other revenue increased $1.47 billion, or 26%, in \nthe nine months ended September 30, 2024 as compared to the nine months ended September 30, 2023. The increases were \nprimarily due to volume increases in used vehicle sales, insurance services, paid Supercharging, non-warranty maintenance \nservices and collision and part sales. \n\n30 ", + "page_start": 37, + "page_end": 37, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Note 9 – Income Taxes \n\nOur effective tax rate was 22% and 23% for the three and nine months ended September 30, 2024, respectively, \ncompared to 8% and 10% for the three and nine months ended September 30, 2023, respectively. The increase in our effective \ntax rate is primarily due to the impact of releasing the valuation allowance on our U.S. deferred tax assets in the fourth quarter \nof 2023 and changes in the mix of our jurisdictional earnings. \n\nOur effective tax rates for the three and nine months of 2024 and 2023 as compared to the U.S. federal statutory rate of \n\n21% were primarily impacted by the mix of our jurisdictional earnings subject to different tax rates, valuation allowances on \nour deferred tax assets and benefits from our U.S. tax credits and the Inflation Reduction Act of 2022 (“IRA”) manufacturing \ncredits. \n\nWe are subject to tax examinations in the U.S. federal, state and foreign jurisdictions. Given the uncertainty in timing \n\nand outcome of our tax examinations, an estimate of the range of the reasonably possible change in gross unrecognized tax \nbenefits within twelve months cannot be made at this time. \n\nNote 10 – Commitments and Contingencies ", + "page_start": 25, + "page_end": 25, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "Automotive & Services and Other Segment \n\nAutomotive sales revenue increased $249 million, or 1%, in the three months ended September 30, 2024 as compared to \nthe three months ended September 30, 2023, due to an increase of approximately 23,000 combined Model 3 and Model Y cash \ndeliveries and an increase of 8,000 deliveries of other models primarily due to our production ramp of Cybertruck. \nAdditionally, we recognized $326 million of FSD revenue for Cybertruck and certain features such as Actually Smart Summon \nin the third quarter of 2024. The increases were partially offset by lower average selling price on our vehicles driven by overall \nprice reductions and attractive financing options provided year over year as well as mix. \n\nAutomotive sales revenue decreased $4.06 billion, or 7%, in the nine months ended September 30, 2024 as compared to \nthe nine months ended September 30, 2023, primarily due to lower average selling price on our vehicles driven by overall price \nreductions and attractive financing options provided year over year as well as mix. Additionally, there was a decrease of \napproximately 17,000 combined Model 3 and Model Y cash deliveries partially due to the early phase of the production ramp \nof the updated Model 3 at our Fremont factory. The decreases were partially offset by an increase of approximately 19,000 \ndeliveries of other models primarily due to our production ramp of Cybertruck and an increase in FSD revenue compared to the \nprior period, as discussed above. ", + "page_start": 35, + "page_end": 35, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "$ 610 \n\nOur statutory income tax rate increased from 26.4% in 2012 to 26.5% \nin 2013 because of changes in Canadian provincial corporate income \ntax rates. \n\n**Deferred Tax Assets and Liabilities**\n\n**2013** 2012 \n\nDeferred tax assets \nDeferred tax liabilities \n**$**\n**31**\n**(1,702)**\n$ \n31 \n(1,501) \n\nNet deferred tax liability **$ (1,671)** $ (1,470) ", + "page_start": 109, + "page_end": 109, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "20% \n$5,000 \n\n•*Production taxes*also only increased slightly (11 percent), \ndespite significant revenue increase (87 percent). Through a \nseries of strategic dispositions, the Company has shifted its \nstate production mix from primarily high severance tax rate \njurisdictions (states of Colorado and North Dakota) to lower severance tax rate jurisdictions \n(states of Texas and Oklahoma). \n\n Q1-13 Q2-13 Q3-13 Q4-13 Q1-14 Q2-14 Q3-14 Q4-14 \n\nn ADJUSTED EBITDAX (US$000s) \n—— ADJUSTED EBITDAX MARGIN (%) \n\n•*General and administrative expenses*remained relatively flat compared to prior year. \nThis is primarily due to the fact that the Company began ramping up staffing in 2013 as \nit expected development growth in late 2013 and 2014. ", + "page_start": 7, + "page_end": 7, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Income Tax Expense (2014 vs. 2013) \nThe increase in the effective tax rate for 2014 compared with 2013 was primarily due to tax adjustments associated with a reassessment of \nour deferred tax assets related to acquisitions. \n\nIncome Tax Expense (2013 vs. 2012) \nThe increase in the effective tax rate for 2013 compared with 2012 was primarily due to changes in our estimated state tax reserves. \n\n**Fourth Quarter Results**\nThe following are our results for the fourth quarters of 2014 and 2013: ", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "Research and Development Expense \n\nThree Months Ended \nSeptember 30, Nine Months Ended \nSeptember 30, Change \n\n2024 2023 $ % 2024 2023 \n\n$ 1,039 $ 1,161 $ (122) (11)% $ 3,264 $ 2,875 $ 389 \n\n4 % 5 % 5 % 4 % \n\nResearch and development (“R&D”) expenses decreased $122 million, or 11%, in the three months ended September 30, \n\n2024 as compared to the three months ended September 30, 2023 primarily due to a decrease in vehicle programs, partially \noffset by an increase in AI related costs year over year. R&D expenses as a percentage of revenue decreased from 5% to 4% in \nthe three months ended September 30, 2024 as compared to the three months ended September 30, 2023 primarily due to lower \nR&D expenses in the current period. \n\nR&D expenses increased $389 million, or 14%, in the nine months ended September 30, 2024 as compared to the nine \n\nmonths ended September 30, 2023. The overall increases were primarily driven by additional costs year over year related to AI \nprograms. R&D expenses as a percentage of revenue increased from 4% to 5% in the nine months ended September 30, 2024 \nas compared to the nine months ended September 30, 2023 as we continue to expand our product roadmap and technologies. ", + "page_start": 39, + "page_end": 39, + "source_file": "tesla_form_10q.pdf" + }, + { + "text": "$12 million in 2004. The increase is due to the full year of Borgata’s results, offset by a \nreduction to state income taxes in the fourth quarter of 2004. Borgata received a notice \nof refund of certain state tax credits and recorded a benefit for amounts earned in 2003 \nand 2004, which had previously been fully reserved. Our share of the adjustment was \n$12 million. We expect our share of the benefit of these tax credits to positively impact \nthis line item by approximately $8 million per year for the next three years. \n\nThe following table summarizes information related to our income taxes: ", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_MGM_2004.pdf" + }, + { + "text": "New York alleging breach of a stock warrant agreement that was entered into as part of a convertible notes offering in 2014. In \n2018, JP Morgan informed Tesla that it had adjusted the strike price based upon Mr. Musk’s August 7, 2018 Twitter post that he \nwas considering taking Tesla private. Tesla disputed JP Morgan’s adjustment as a violation of the parties’ agreement. In 2021, \nTesla delivered shares to JP Morgan per the agreement, which they duly accepted. JP Morgan now alleges that it is owed \napproximately $162 million as the value of additional shares that it claims should have been delivered as a result of the \nadjustment to the strike price in 2018. On January 24, 2022, Tesla filed multiple counterclaims as part of its answer to the \nunderlying lawsuit, asserting among other points that JP Morgan should have terminated the stock warrant agreement in 2018 \nrather than make an adjustment to the strike price that it should have known would lead to a commercially unreasonable result. \nTesla believes that the adjustments made by JP Morgan were neither proper nor commercially reasonable, as required under the \nstock warrant agreements. JP Morgan filed a motion for judgment on the pleadings, which Tesla opposed, and on September \n12, 2024, the Court denied JP Morgan’s motion. ", + "page_start": 27, + "page_end": 27, + "source_file": "tesla_form_10q.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0764.pdf", + "query": "Which is the first candidate for experimenting the case of electrons interacting with a single boson mode?", + "target_page": 6, + "target_passage": "The primary candidate for such mode is an optical phonon", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "approximation is that the self-energy can be computed \nanalytically. The full self-energy obtained with the lat- \ntice dispersion is more involved and can only be obtained \nnumerically, but its structure is quite similar to the one \nobtained with a constant DOS. \nThe self-energy for a constant DOS is given by \n\ni \n2π \n(13) \n\nZ \nwhere \n\nω2 \n0 \nω2 \n0 − (iΩ)2 \n\nand λn is a dimensionless electron-boson coupling. Inte- \ngrating and transforming to real frequencies, we obtain \n\nπ \n2 \n\nWe next consider the case of electrons interacting with \na single boson mode which by itself is not affected by su- \nperconductivity. The primary candidate for such mode is \nan optical phonon. The imaginary part of the NS self en- \nergy has been discussed numerous times in the literature. \nWe make one simplifying assumption – approximate the \nDOS by a constant in calculating fermionic self-energy. \nWe will, however, keep the full lattice dispersion in the \ncalculations of the optical integral. The advantage of this \n(ω + ωo)2 − ∆2 ! ", + "page_start": 5, + "page_end": 5, + "source_file": "1001.0764.pdf" + }, + { + "text": "modes of neighboring tetrahedra. And these coupling \nconstants λx,y,z need to be tuned to produce Jx,y,z of \nthe Kitaev model. This is still not easy to implement in \nsolid state systems. At lowest non-trivial order of pertur- \nbative expansion, we do get our model (9). Higher order \nterms in expansion destroy the exact solvability, but may \nbe controlled by the small parameters λx,y,z/k. \n\nthe desired Jx,y,z terms in (8) from the first and second \norder of perturbations. \n\nThe calculation can be dramatically simplified by the \nfollowing fact that any physical spin-1/2 operator Sx,y,z \nℓ \nconverts the cluster spin singlet states \ninto \nspin-1 states of the cluster. This can be checked by \nexplicit calculations and will not be proved here. For \nall the perturbations to be considered later, the above \nmentioned fact can be exploited to replace the factor \nHcluster k]−1 in the second order pertur- \n[0 \nHcluster j − \nbation to a c-number ( \n\nτ z = 1 \n| ± i \n\n2Jcluster)−1. \nThe detailed calculations are given in Appendix B. We \n− ", + "page_start": 6, + "page_end": 6, + "source_file": "1001.0266.pdf" + }, + { + "text": "ing theory put into practice: First-principles modeling of trans- \nport in doped silicon wires”, Phys. Rev. Lett. 99(7), 076803 \n(Aug. 2007), doi:10.1103/PhysRevLett.99.076803. \n\n[30] M. Ushiro, K. Uno, T. Fujikawa, Y. Sato, K. Tohji, F. Watari, \nW.-J. Chun, Y. Koike, and K. Asakura, “X-ray absorption fine \nstructure (XAFS) analyses of Ni species trapped in graphene \nsheet of carbon nanofibers”, Phys. Rev. B 73(14), 144103 (Apr. \n2006), doi:10.1103/PhysRevB.73.144103. \n[25] J. M. Soler, E. Artacho, J. D. Gale, A. Garcia, J. Junquera, P. Or- \ndej´on, and D. S´anchez-Portal, “The SIESTA method for ab ini- \ntio order-n materials simulation”, J. Phys.: Condens. Matter \n14(11), 2745 (Mar. 2002), doi:10.1088/0953-8984/14/11/302. \n[26] J. S. Griffith, The Theory of Transition-Metal Ions (Cambridge ", + "page_start": 4, + "page_end": 4, + "source_file": "1001.2538.pdf" + }, + { + "text": "2/3 (S1 S2 + S3 S4 + S1 S3 \np \n· \n+ S2 · \nS4 + S1 · \nS4 + S2 \n\nThis exact construction contains high order physical \nspin interactions, which is undesirable for practical im- \nplementation. We described two possible approaches to \nreduce this problem: generating the high order spin in- \nteractions by perturbative expansion of the coupling to \noptical phonon, or the magnetic coupling between clus- \nters. This perturbative construction will introduce trun- \ncation error of perturbation series, which may be con- \ntrolled by small expansion parameters. Whether these \nconstructions can be experimentally engineered is how- \never beyond the scope of this study. It is conceivable that \nother perturbative expansion can also generate these high \norder spin interactions, but this possibility will be left for \nfuture works. \n\nS3). \n· · · \n\nThe functions f E \nbut are reproduced here, \n1,2 for the E modes have been given before \n\nf T2 \n1 = (S2 \nf T2 \n2 = (S1 \nf T2 \n3 = (S1 \n\n· − · \nS3 S2 S4), \n· − · \nS2 S3 S4) Acknowledgments ", + "page_start": 7, + "page_end": 7, + "source_file": "1001.0266.pdf" + }, + { + "text": "We performed the same calculations of conductivities \nand optical integrals as in the previous three cases. The \nresults are summarized in Figs. 17 - 22. Fig 17 shows con- \nductivities in the NS and the SCS for two couplings λ = 1 \nand λ = 10 (keeping λωsf constant). Other parameters \nZo and ωo are calculated according to the discussion after \nEq 21. for ωsf = 26 meV , λ = 1, we find ωo = 40 meV , \nZo = 0.77. And for ωsf = 2.6 meV , λ = 10, we find \nωo = 13.5 meV , Zo = 1.22. Note that the conductivity \nin the SCS starts at 2∆ + ωo (i.e. the resonance energy \n\n1 \n\nFIG. 20: ∆W (in meV) for λ = 1(top) and λ = 10(bottom). \nWe used ωsf = 26 meV /λ and ∆ = 30meV . The zero crossing \nis not affected because we keep λωsf constant. The notable \ndifference is the widening of the dip at a larger λ. ", + "page_start": 11, + "page_end": 11, + "source_file": "1001.0764.pdf" + }, + { + "text": "We emphasize that because the first intra-cluster term \nPcluster Hcluster commutes with the latter Kitaev terms \nindependent of the representation used, the Kitaev model \nis realized as the exact low energy Hamiltonian of this \nmodel without truncation errors of perturbation theories, \n/Jcluster)2 or higher order terms will \nnamely no ( \n| \nbe generated under the projection to low energy clus- \nter singlet space. This is unlike, for example, the t/U \nexpansion of the half-filled Hubbard model22,23, where \nat lowest t2/U order the effective Hamiltonian is the \nHeisenberg model, but higher order terms (t4/U 3 etc.) \nshould in principle still be included in the low energy ef- \nfective Hamiltonian for any finite t/U . Similar compari- \nson can be made to the perturbative expansion studies of \nthe Kitaev-type models by Vidal et al.9, where the low \nenergy effective Hamiltonians were obtained in certian \nanisotropic (strong bond/triangle) limits. Although the \nspirit of this work, namely projection to low energy sec- \ntor, is the same as all previous perturbative approaches \nto effective Hamiltonians. \n\nJx,y,z| ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0266.pdf" + }, + { + "text": "We now turn to a more microscopic model- the CB \nmodel. The model describes fermions interacting by ex- \nchanging soft, overdamped collective bosons in a partic- \nular, near-critical, spin or charge channel31,44,45. This \ninteraction is responsible for the normal state self-energy \nand also gives rise to a superconductivity. A peculiar \nfeature of the CB model is that the propagator of a col- \nlective boson changes below Tc because this boson is not \nan independent degree of freedom (as in EB model) but \nis made out of low-energy fermions which are affected by \nsuperconductivity32. \n\n0 \n\nFIG. 15: Top – σ(ω) in the NS and the SCS in the ‘corrected’ \nMFLI model with the feedback from SC on the quasiparticle \n√−ω2+∆2 . In the SCS σ \ndamping: iΓ term transforms into \nnow begins at Ω = 2∆. The parameters are same as in Fig. \n10. Bottom – the behavior of Kubo sum with Γ. Observe \nthat W (ωc) in the NS is larger than in the SCS. \n\nΓ ", + "page_start": 9, + "page_end": 9, + "source_file": "1001.0764.pdf" + }, + { + "text": "integral in the SCS at T = 0 and in the NS extrapolated \nto T = 0 and compare the cut off effect ∆f (ωc) to ∆WK \nterm. We also analyze the sign of ∆W (ωc) at large fre- \nquencies and discuss under what conditions theoretical \nW (∞) increases in the SCS. \n\nWe perform calculations for four models. First is a \nconventional BCS model with impurities (BCSI model). \nSecond is an Einstein boson (EB) model of fermions in- \nteracting with a single Einstein boson whose propaga- \ntor does not change between NS and SCS. These two \ncases will illustrate a conventional idea of the spectral \nweight in SCS being less than in NS. Then we con- \nsider two more sophisticated models: a phenomenological \n“marginal Fermi liquid with impurities” (MFLI) model \nof Norman and P´epin30, and a microscopic collective bo- \nson (CB) model31 in which in the NS fermions interact \nwith a gapless continuum of bosonic excitations, but in a \nd−wave SCS a gapless continuum splits into a resonance \nand a gaped continuum. This model describes, in par- \nticular, interaction of fermions with their own collective \nspin fluctuations32 via ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0764.pdf" + }, + { + "text": "10 \n\nout first deriving the normal state self-energy microscop- \nically (this is what we will do in the next section). The \nresults of the calculations for the modified MFLI model \nare presented in Figs. 15 and 16. We clearly see that the \nbehavior is now different and ∆WK < 0 for all Γ. This \nis the same behavior as we previously found in BCSI \nand EB models. So we argue that the ‘unconventional’ \nbehavior exhibited by the original MFLI model is most \nlikely the manifestation of a particular modeling incon- \nsistency. Still, Ref. 30 made a valid point that the fact \nthat quasiparticles behave more close to free fermions in \na SCS than in a NS, and this effect tends to reverse the \nsigns of ∆WK and of the kinetic energy 43. It just hap- \npens that in a modified MFLI model the optical integral \nis still larger in the NS. ", + "page_start": 9, + "page_end": 9, + "source_file": "1001.0764.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
II. Formulation of the Pseudo - spin - 1 / 2 from Four - spin Cluster.III. Realization of the Kitaev Model.
3IV. Generate the High Order Physical Spin
Interactions by Perturbative Expansion. A. Generate the High Order Terms by Coupli5
to Optical Pluonon.5
B. Generate the High Order Terms by Magnetic Interactions between Clusters.τ
V. Conclusions.8
Acknowledgments8
A. Coupling between Distortions of a Tetrahedron and the Pseudo - spins8
B. Derivation of the Terms Generated by Second Order Perturbation of Inter - cluste Magnetic Interactions9
References10
", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0266.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0764.pdf", + "query": "What was the optical integral analysis proposed by Norman and Pépin?", + "target_page": 8, + "target_passage": "a phenomenological model for the self energy which fits normal state scattering rate measure- ments by ARPES", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Optical Integral and Sum Rule Violation \n\nSaurabh Maiti, Andrey V. Chubukov \nDepartment of Physics, University of Wisconsin, Madison, Wisconsin 53706, USA \n(Dated: November 9, 2018) ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0764.pdf" + }, + { + "text": "addressing the issue of the optical sum rule in the c−axis7 \nand in-plane conductivities 8–16 in overdoped, optimally \ndoped, and underdoped cuprates. The experimental re- \nsults demonstrated, above all, outstanding achievements \nof experimental abilities as these groups managed to de- \ntect the value of the optical integral with the accuracy \nof a fraction of a percent. The analysis of the change \nof the optical integral between normal and SCS is even \nmore complex because one has to (i) extend NS data to \nT < Tc and (ii) measure superfluid density with the same \naccuracy as the optical integral itself. \n\nThe analysis of the optical integral showed that in over- \ndoped cuprates it definitely decreases below Tc, in con- \nsistency with the expectations at weak coupling11. For \nunderdoped cuprates, all experimental groups agree that \na relative change of the optical integral below Tc gets \nmuch smaller. There is no agreement yet about the sign \nof the change of the optical integral : Molegraaf et al.8 \nand Santander-Syro et al.9 argued that the optical inte- \ngral increases below Tc, while Boris et al.10 argued that \nit decreases. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0764.pdf" + }, + { + "text": "Fig 5 shows the optical sum in NS and SCS in clean \nand dirty limits (the parameters are stated in the fig- \nure). This plot shows that the Kubo sums are almost \ncompletely recovered by integrating up to the bandwidth \nof 1eV : the recovery is 95% in the clean limit and ∼ 90% \nin the dirty limit. In Fig 6 we plot ∆W (ωc) as a function \nof ωc in clean and dirty limits. ∆W (∞) is now non-zero, \nin agreement with Fig. 4 and we also see that there is For completeness, we first present some well known \nresults about the conductivity and optical integral for a ", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0764.pdf" + }, + { + "text": "1 \n) \n\n∞ \nW \n( \n\n0.6 \n/ \n) \nc \n\nω \nW \n( \n\n0.2 \n\n0 \n0.5 \nω \n in eV \nc \n\nFIG. 11: The evolution of the optical integral in the NS (top) \nand the SCS (bottom) in the original MFLI model. Parame- \nters are the same as above. Note that only \n80% of the \nspectral weight is recovered up to 1eV . \n75 \n∼ − \n\nNS and SCS ∆W (Original MFLI) \n\nwith lattice \nwithout lattice \n\n) \nc \n20 \nω \n( \n\nS \nN \nW \n− \n) \n10 \n\nnot not a generic one. There exists a range of parame- \nters α and Γ where ∆WK is still positive, but ∆W (ωc) \nchanges the sign twice and is negative at intermediate \nfrequencies. We show an example of such behavior in \nFig14. Still, for most of the parameters, the behavior of \n∆W (ωc) is the same as in Fig. 12. \n\nc \nω \n( \n\nC \nS \nW \n0 \n0.2 \n0.6 \n0.4 \nω \n in eV \nc \n\nFIG. 12: Evolution of the difference of the optical integrals in \nthe SCS and the NS with the upper cut-off ωc. Parameters are \nthe same as before. Observe that the optical sum in the SCS \nis larger than in the NS and that ∆W has not yet reached \n∆WK up to the bandwidth. The dashed line is the FGT \nresult. ", + "page_start": 8, + "page_end": 8, + "source_file": "1001.0764.pdf" + }, + { + "text": "15 \n\nF. Marsiglio for many discussions concerning the infrared \nconductivity and optical integrals and thank A. Boris, E. \nvan Heumen, J. Hirsch, and F. Marsiglio for the com- \nments on the manuscript. The work was supported by \nnsf-dmr 0906953. \n\nWe would like to thank M. Norman, Tom Timusk, \nDmitri Basov, Chris Homes, Nicole Bontemps, Andres \nSantander-Syro, Ricardo Lobo, Dirk van der Marel, A. \nBoris, E. van Heumen, A. B. Kuzmenko, L. Benfato, and ", + "page_start": 14, + "page_end": 14, + "source_file": "1001.0764.pdf" + }, + { + "text": "From the expression above, we find that the pumping statis- \ntic can influence the linewidth. For regular injection (*p*= 1), \nthe linewidth is the narrowest, while for Poissonian injection \n(*p*= 0), the linewidth is the broadest. But even for regular \ninjection, the linewidth is larger than the case of one cavity. \nThat means the mechanism of separated-field does not play \nthe role in reducing the linewidth as in the conventional opti- \ncal Ramsey method, which is counter-intuitive. However, the \nseparated fields are indispensable for any phase detection like \natom interferometry. The details about the method of active \natom interferometry will appear elsewhere. \n\n1 \n*I*0 \n(δϕ2)ω = (δ*Y*2)ω. \n\n1 1 \n\nκ/2, as in the recently \nτ− \nIn the region γ*ab*≪ \nproposed active optical clock [15] with atomic beam. The \nphase quadrature component of the field fluctuations can be \nexpressed as \n\n*T*− \n≪ ≪ \n\n*g*2 \n4(κ/2 + γ*ab*)2 { \n4γ*ab*˜*Nass*", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "8 \n\nBCSI model. However, before that, we show in Figs 10- \n12 the conductivities and the optical integrals for the \noriginal MFLI model. \n\nConductivities (Original MFLI) \n\nNS \n0.2 \nSC \n\n∆+ω \n1 \n) \n\nω \n( \nσ 0.1 ", + "page_start": 7, + "page_end": 7, + "source_file": "1001.0764.pdf" + }, + { + "text": "4 \n\nan energy of interband transitions, which is roughly 2eV . \nThis would be consistent with Refs. 8,9. \njust list the formulas that we used in our computations. \nThe conductivity σ(Ω) and the optical integral W (ωc) \nare given by (see for example Ref. 35). \n\nWe begin with formulating our calculational basis in \nthe next section. Then we take up the four cases and \nconsider in each case the extent to which the Kubo sum is \nsatisfied up to the order of bandwidth and the functional \nform and the sign of ∆W (ωc). The last section presents \nour conclusions. \n\nΠ′′(Ω) \nΩ \n= − \n\nωc ωc \n\nΠ′′(Ω) \nΩ π \n2 \nW (ωc) = σ′(Ω) dΩ = − dΩ + Π′(0) \n\n0 \nZ \n0+ \nZ \nII. OPTICAL INTEGRAL IN NORMAL AND \nSUPERCONDUCTING STATES \n(7b) \n\nThe generic formalism of the computation of the op- \ntical conductivity and the optical integral has been dis- \ncussed several times in the literature21–23,26,29 and we where ‘X ′’ and ‘X ′′’ stand for real and imaginary parts \nof X. We will restrict with T = 0. The polarization \noperator Π(Ω) is (see Ref. 36) ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0764.pdf" + }, + { + "text": "\nSURFACE TUFT PHOTOGRAHS FOR \nA SWEPT, TAPERED WlNG \n60° DELTA, AR=2.31, A=0 ", + "page_start": 102, + "page_end": 102, + "source_file": "00-80T-80.pdf" + }, + { + "text": ") \n10 \nc \nω \n( \n\nS \nN \nW \n− \n) \nc \n0 ω \n( \n\nC \nS \nW \n∆ W \nK \n\n−10 \n0.2 \n0.4 \nω \n in eV \nc \n0.6 0.8 \n\nFIG. 16: Evolution of the difference of the optical integrals \nbetween the SCS and the NS with the upper cut-off ωc for \nthe “corrected” MFLI model. Now ∆W (ωc) is negative above \nsome frequency. Parameters are same as in the Fig 15. ", + "page_start": 9, + "page_end": 9, + "source_file": "1001.0764.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0764.pdf", + "query": "What is the Ferrel-Glover-Tinkham sum rule?", + "target_page": 1, + "target_passage": "the redistribution of the spectral weight between normal and superconducting state", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "One particular case, studied in detail for conventional \nsuperconductors, \nis the redistribution of the spectral \nweight between normal and superconducting states. This \nis known as Ferrel-Glover-Tinkham (FGT) sum rule:2,3 \n\nπnse2 \n2m \n\n∞ \nRe σN S(Ω) = (2) \n0+ 0+ \nZ Z \n\nIn reality, as already pointed out by Hirsch, there is no \ntrue violation as the change of the total spectral weight where ns is the superfluid density, and πnse2/(2m) is ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0764.pdf" + }, + { + "text": "Optical Integral and Sum Rule Violation \n\nSaurabh Maiti, Andrey V. Chubukov \nDepartment of Physics, University of Wisconsin, Madison, Wisconsin 53706, USA \n(Dated: November 9, 2018) ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0764.pdf" + }, + { + "text": "the spectral weight under the δ-functional piece of the \nconductivity in the superconducting state. \n\nI. INTRODUCTION \n\nIn practice, the integration up to an infinite frequency \nis hardly possible, and more relevant issue for practical \napplications is whether a sum rule is satisfied, at least ap- \nproximately, for a situation when there is a single electron \nband which crosses the Fermi level and is well separated \nfrom other bands. Kubo considered this case in the same \npaper of 1957 and derived the expression for the “band”, \nor Kubo sum rule \n\nThe analysis of sum rules for optical conductivity has a \nlong history. Kubo, in an extensive paper1 in 1957, used \na general formalism of a statistical theory of irreversible \nprocesses to investigate the behavior of the conductivity \nin electronic systems. For a system of interacting elec- \ntrons, he derived the expression for the integral of the real \npart of a (complex) electric conductivity σ(Ω) and found \nthat it is independent on the nature of the interactions \nand reduces to \n′ \n∞ \n‘ \n\nπe2 \n2N \n∇2 \n~kx \nRe σ(Ω) dΩ = WK = \nε~k n~k \n(3) \n∞ \n(1) \n0 \nZ \nX~k ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0764.pdf" + }, + { + "text": "′ denotes the principal value of the integral, \n~k,(N is the number of lat- \ntice sites), nF (x) is the Fermi function which is a step \nP \nP \nfunction at zero temperature, G and F are the normal \nand anomalous Greens functions. given by37 \n\nwhere \n~k is understood to be 1 \nThe 2 is due to the trace over spin indices. We show the \ndistribution functions in the NS and SCS under different \ncircumstances in Fig 2. \nN \nR \n\nThe ~k-summation is done over first Brillouin zone for a \n2-D lattice with a 62x62 grid. The frequency integrals are \ndone analytically wherever possible, otherwise performed \nusing Simpson’s rule for all regular parts. Contributions \nfrom the poles are computed separately using Cauchy’s \ntheorem. For comparison, in all four cases we also calcu- \nd2k = dΩkdǫkνǫk,Ωk \nlated FGT sum rule by replacing \nand keeping ν constant. We remind that the FGT is \nthe result when one assumes that the integral in W (ωc) \npredominantly comes from a narrow region around the \nFermi surface. \n\n1 \nω − Σ(k, ω) − ε~k + iδ \nZk,ωω + ε~k \nk,ω) − ε2 \n~k \n+ iδsgn(ω) \n(9b) \n\nZk,ω∆k,ω \nk,ω) − ε2 \n~k ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0764.pdf" + }, + { + "text": "*C*∗0)2 = 0, (*C*1 − \n*C*∗2)2 = \n\n*C*∗1)2 = \nsin2 (Ω*R*τ) sin2 (∆2*T*) , \n− \n\nsin2 (Ω*R*τ) sin2 (∆2*T*) , \n(*C*2 − − \n\nwe get \n\nγ2 \n*ab*\n(κ/2 + γ*ab*)2 { (κ/2 + γ*ab*)2 \nω2[(κ/2 + γ*ab*)2 + ω2)] \n(δϕ2)ω = *DS T*\n\n*p*sin2(Ω*R*τ) sin2(∆2*T*)] +*DRam*[2 \n, \n} \n(10) \n− ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2670.pdf" + }, + { + "text": "l )2 + (my \n(mx \nl )2 , \nml = (2) \nq \n\nwhich is related to the SO(2) symmetry breaking. At the \nsame time, it turns out to be significant also the average \norder parameter of the film, defined as \n\nn ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0510.pdf" + }, + { + "text": "γ*bNb*(*t*) + γ′*aNa*(*t*) \n\n− \n+*g*[*a*†(*t*)*M*(*t*) +*M*†(*t*)*a*(*t*)] +*Fb*(*t*), \n− \n(5) ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2670.pdf" + }, + { + "text": "Fig 5 shows the optical sum in NS and SCS in clean \nand dirty limits (the parameters are stated in the fig- \nure). This plot shows that the Kubo sums are almost \ncompletely recovered by integrating up to the bandwidth \nof 1eV : the recovery is 95% in the clean limit and ∼ 90% \nin the dirty limit. In Fig 6 we plot ∆W (ωc) as a function \nof ωc in clean and dirty limits. ∆W (∞) is now non-zero, \nin agreement with Fig. 4 and we also see that there is For completeness, we first present some well known \nresults about the conductivity and optical integral for a ", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0764.pdf" + }, + { + "text": "1 2 3 \nλ (coupling) \n\nFIG. 18: The behavior of Kubo sums in the CB model. Note \nthat the spectral weight in the NS is always larger than in the \nSCS. We set ωsf = 26 meV ,λ = 1, and ∆ = 30 meV . ", + "page_start": 11, + "page_end": 11, + "source_file": "1001.0764.pdf" + }, + { + "text": "ωc \nW (ωc) = Re σ(Ω) dΩ = WK + f (ωc) \n\n0 \nZ ′ \n′ \n∞ \nf (ωc) = − Re σ(Ω) dΩ (4) \nωc \nZ \n\nThe Kubo formula, Eq. (3) is obtained assuming that \nthe second part is negligible. This is not guaranteed, \nhowever, as typical ωc ∼ 1 − 2eV are comparable to the \nbandwidth. \nThe differential sum rule ∆W is also a sum of two \nterms \n\n∆W (ωc) = ∆WK + ∆f (ωc) (5) \n\nwhere ∆WK is the variation of the r.h.s. of Eq. 3, \nand ∆f (ωc) is the variation of the cutoff term. Because \nconductivity changes with T at all frequencies, ∆f (ωc) \nalso varies with temperature. It then becomes the issue \nwhether the experimentally observed ∆W (ωc) is predom- \ninantly due to “intrinsic” ∆WK, or to ∆f (ωc). [A third \npossibility is non-applicability of the Kubo formula be- \ncause of the close proximity of other bands, but we will \nnot dwell on this.] \n\nFor the NS, previous works21,22 on particular models \nfor the cuprates indicated that the origin of the temper- \nature dependence of W (ωc) is likely the T dependence \nof the cutoff term f (ωc). Specifically, Norman et. al.22 \napproximated a fermionic DOS by a constant (in which ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0764.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0266.pdf", + "query": "What does Kitaev show about spin- 1/2 model?", + "target_page": 1, + "target_passage": "spin- 1/2 model can be mapped to a model with one Majo- rana fermion per site coupled to Ising gauge fields on the links", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "However, in the original Kitaev model and its later \ngeneralizations in the form of spin models, spin rotation \nsymmetry is explicitly broken. This makes them harder \nto realize in solid state systems. There are many pro- \nposals to realized the Kitaev model in more controllable \nin cold atom optical lattices17,18, or in \nsituations, e.g. \nsuperconducting circuits19. But it is still desirable for \ntheoretical curiosity and practical purposes to realize the \nKitaev-type models in spin rotation invariant systems. \n\ntion III the Kitaev model will be explicitly constructed \nusing this formalism, and some properties of this con- \nstruction will be discussed. In Section IV we will discuss \ntwo possible ways to generate the high order spin in- \nteractions involved in the construction of Section III by \nperturbative expansions. Conclusions and outlook will \nbe summarized in Section V. \n\nIn this paper we realize the Kitaev honeycomb lattice \nmodel as the low energy Hamiltonian for a spin rotation \ninvariant system. The trick is not to use the physical spin \nas the spin in the Kitaev model, instead the spin-1/2 in \nKitaev model is from some emergent two-fold degener- \nate low energy states in the elementary unit of physical \nsystem. This type of idea has been explored recently by \nJackeli and Khaliullin20, in which the spin-1/2 in the Ki- \ntaev model is the low energy Kramers doublet created by \nstrong spin-orbit coupling of t2g orbitals. In the model \npresented below, the Hilbert space of spin-1/2 in the Ki- \ntaev model is actually the two dimensional spin singlet \nsector of four antiferromagnetically coupled spin-1/2 mo- \nments, and the role of spin-1/2 operators(Pauli matrices) \nin the Kitaev model is replaced by certain combinations \nSℓ)] between the \nof Sj · \nfour spins. \n\nII. FORMULATION OF THE PSEUDO-SPIN-1/2 \nFROM FOUR-SPIN CLUSTER. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0266.pdf" + }, + { + "text": "In this construction the pseudo-spin correlations in the \nKitaev model will be mapped to dimer or spin-chirality \ncorrelations in the physical spin system. The correspond- \ning picture of the fractionalized Majorana fermion exci- \ntations and Ising vortices still remain to be clarified. ", + "page_start": 7, + "page_end": 7, + "source_file": "1001.0266.pdf" + }, + { + "text": "Note that the original Kitaev model (1) has three- \nfold rotation symmetry around a honeycomb lattice site, \ncombined with a three-fold rotation in pseudo-spin space \n(cyclic permutation of τ x, τ y, τ z). This is not apparent \nin our model (8) in terms of physical spins, under the \ncurrent representation of τ x,y,z. We can remedy this by \nusing a different set of pseudo-spin Pauli matrices τ ′x,y,z \nin (7), \n\n′x = \nτ \nτ ′y = \n′z = 1/3τ z + \n1/3τ z \n1/3τ z 2/3τ x, \n1/6τ x + \n1/6τ x \n\np \n\n1/2τ y, \n1/2τ y \np \nτ \np \n− p − p \n\nWith proper representation choice, they have a symmet- \nric form in terms of physical spins, \n\n′x = \nτ \nτ ′y = \nτ ′z = (4/3)S4 (S2 S3) + 2/3(2S1 S4 + 1/2) ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0266.pdf" + }, + { + "text": "We constructed the exactly solvable Kitaev honeycomb \nmodel1 as the exact low energy effective Hamiltonian of \na spin-1/2 model [equations (8) or (9)] with spin-rotation \nand time reversal symmetry. The spin in Kitaev model is \nrepresented as the pseudo-spin in the two-fold degenerate \nspin singlet subspace of a cluster of four antiferromag- \nnetically coupled spin-1/2 moments. The physical spin \nmodel is a honeycomb lattice of such four-spin clusters, \nwith certain inter-cluster interactions. The machinery \nfor the exact mapping to pseudo-spin Hamiltonian was \ndeveloped (see e.g. TABLE I), which is quite general \nand can be used to construct other interesting (exactly \nsolvable) spin-1/2 models from spin rotation invariant \nsystems. \n\nThe generic couplings in (A1) [second term] can be \nconverted to couplings to these orthogonal modes, \n\nwhere Q are generalized coordinates of the corresponding \nmodes, functions f can be read off from TABLE 1.2 of \nRef.35. For the A mode, δrℓm = 2/3QA, so f A is \np \n\nf A = ", + "page_start": 7, + "page_end": 7, + "source_file": "1001.0266.pdf" + }, + { + "text": "The exactly solvable Kitaev honeycomb lattice model is realized as the low energy effect Hamil- \ntonian of a spin-1/2 model with spin rotation and time-reversal symmetry. The mapping to low \nenergy effective Hamiltonian is exact, without truncation errors in traditional perturbation series \nexpansions. This model consists of a honeycomb lattice of clusters of four spin-1/2 moments, and \ncontains short-range interactions up to six-spin(or eight-spin) terms. The spin in the Kitaev model \nis represented not as these spin-1/2 moments, but as pseudo-spin of the two-dimensional spin singlet \nsector of the four antiferromagnetically coupled spin-1/2 moments within each cluster. Spin corre- \nlations in the Kitaev model are mapped to dimer correlations or spin-chirality correlations in this \nmodel. This exact construction is quite general and can be used to make other interesting spin-1/2 \nmodels from spin rotation invariant Hamiltonians. We discuss two possible routes to generate the \nhigh order spin interactions from more natural couplings, which involves perturbative expansions \nthus breaks the exact mapping, although in a controlled manner. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0266.pdf" + }, + { + "text": "Great efforts have been invested to better understand \nthe properties of the Kitaev model. For example, sev- \neral groups have pointed out that the fractionalized Ma- \njorana fermion excitations may be understood from the \nmore familiar Jordan-Wigner transformation of 1D spin \nsystems2,3. The analogy between the non-Abelian Ising \nvortices and vortices in p + ip superconductors has been \nraised in serveral works4–7. Exact diagonalization has \nbeen used to study the Kitaev model on small lattices8. \nAnd perturbative expansion methods have been devel- \noped to study the gapped phases of the Kitaev-type \nmodels9. \nKitaev’s exactly solvable spin-1/2 honeycomb lattice \nmodel1 (noted as the Kitaev model hereafter) has in- \nspired great interest since its debut, due to its exact \nsolvability, fractionalized excitations, and the potential Many generalizations of the Kitaev model have been ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0266.pdf" + }, + { + "text": "In this Section we will construct the pseudo-spin-1/2 \nfrom a cluster of four physical spins, and map the phys- \nical spin operators to pseudo-spin operators. The map- \nping constructed here will be used in later Sections to \nconstruct the effective Kitaev model. In this Section we \nwill work entirely within the four-spin cluster, all unspec- \nified physical spin subscripts take values 1, . . . , 4. \n\nSk [or the spin-chirality Sj · (Sk × \n\nConsider a cluster of four spin-1/2 moments(called \nphysical spins hereafter), \nlabeled by S1,...,4, antiferro- \nmagnetically coupled to each other (see the right bot- \ntom part of FIG. 2). The Hamiltonian within the clus- \nter(up to a constant) is simply the Heisenberg antiferro- \nmagnetic(AFM) interactions, \n\nOne major drawback of the model to be presented is \nthat it contains high order spin interactions(involves up \nto six or eight spins), thus is still unnatural. However it \nopens the possibility to realize exotic (exactly solvable) \nmodels from spin-1/2 Hamiltonian with spin rotation in- \nvariant interactions. We will discuss two possible routes \nto reduce this artificialness through controlled perturba- \ntive expansions, by coupling to optical phonons or by \nmagnetic couplings between the elementary units. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0266.pdf" + }, + { + "text": "In this Section we will use directly the results of the \nprevious Section to write down a Hamiltonian whose low \nenergy sector is described by the Kitaev model. The \nHamiltonian will be constructed on the physical spin lat- \ntice illustrated in FIG. 2. \nIn this Section we will use \nj, k to label four-spin clusters (pseudo-spin-1/2 sites), the \nphysical spins in cluster j are labeled as Sj1, . . . , Sj4. \nApply the mappings developed in Section II, we have ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0266.pdf" + }, + { + "text": "1 Alexei Kitaev, Ann. Phys. (N.Y.) 321, 2 (2006). \n2 Xiao-Yong Feng, Guang-Ming Zhang, Tao Xiang, Phys. \nRev. Lett. 98, 087204 (2007). ", + "page_start": 9, + "page_end": 9, + "source_file": "1001.0266.pdf" + }, + { + "text": "τ z = χ234/(√3/4) = (4/√3)S2 (S3 S4) (6) \n\n− \nThe above representations of τ x,y,z are all invariant under \nglobal spin rotation of the physical spins. \n\n− · × \n\nWith the machinery of equations (4), (5), and (6), it \nwill be straightforward to construct various pseudo-spin- \n1/2 Hamiltonians on various lattices, of the Kitaev vari- \nety and beyond, as the exact low energy effective Hamil- \ntonian of certain spin-1/2 models with spin-rotation sym- \nmetry. In these constructions a pseudo-spin lattice site \nactually represents a cluster of four spin-1/2 moments. It is simpler to consider the permutation operators \nSk + 1/2, which just exchange the states \n= k). \nPjk ≡ \nof the two physical spin-1/2 moments j and k (j \nAs an example we consider the action of P34, \n\n2Sj · \n\nIII. REALIZATION OF THE KITAEV MODEL. \n+ ω2 + ω \n| ↓↑↑↓i | ↓↑↓↑i \n\n+ ω2 \n| ↑↓↑↓i(cid:17) ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0266.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0266.pdf", + "query": "How can fractionalised Majorana fermion excitations be understood?", + "target_page": 1, + "target_passage": "from the more familiar Jordan-Wigner transformation of 1D spin systems", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Great efforts have been invested to better understand \nthe properties of the Kitaev model. For example, sev- \neral groups have pointed out that the fractionalized Ma- \njorana fermion excitations may be understood from the \nmore familiar Jordan-Wigner transformation of 1D spin \nsystems2,3. The analogy between the non-Abelian Ising \nvortices and vortices in p + ip superconductors has been \nraised in serveral works4–7. Exact diagonalization has \nbeen used to study the Kitaev model on small lattices8. \nAnd perturbative expansion methods have been devel- \noped to study the gapped phases of the Kitaev-type \nmodels9. \nKitaev’s exactly solvable spin-1/2 honeycomb lattice \nmodel1 (noted as the Kitaev model hereafter) has in- \nspired great interest since its debut, due to its exact \nsolvability, fractionalized excitations, and the potential Many generalizations of the Kitaev model have been ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0266.pdf" + }, + { + "text": "In this construction the pseudo-spin correlations in the \nKitaev model will be mapped to dimer or spin-chirality \ncorrelations in the physical spin system. The correspond- \ning picture of the fractionalized Majorana fermion exci- \ntations and Ising vortices still remain to be clarified. ", + "page_start": 7, + "page_end": 7, + "source_file": "1001.0266.pdf" + }, + { + "text": "where τ x,y,z are Pauli matrices, and x, y, z-links are de- \nfined in FIG. 1. It was shown by Kitaev1 that this spin- \n1/2 model can be mapped to a model with one Majo- \nrana fermion per site coupled to Ising gauge fields on the \nlinks. And as the Ising gauge flux has no fluctuation, the \nmodel can be regarded as, under each gauge flux config- \nuration, a free Majorana fermion problem. The ground \nstate is achieved in the sector of zero gauge flux through \neach hexagon. The Majorana fermions in this sector have \nDirac-like gapless dispersion resembling that of graphene, \nas long as \nsatisfy the triangular rela- \nJz| \ntion, sum of any two of them is greater than the third \none1. It was further proposed by Kitaev1 that opening of \nfermion gap by magnetic field can give the Ising vortices \nnon-Abelian anyonic statistics, because the Ising vortex \nwill carry a zero-energy Majorana mode, although mag- \nnetic field destroys the exact solvability. \n\nJx| \n, \nJy| \n, and \n| | | ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0266.pdf" + }, + { + "text": "d2q \n(2π)2 χ(q, ω)G(k + q, ω + Ω) dω \n2π \nΣ(k, Ω) = 3g2 (6) \n\nZ \n\nwhere g is the spin-fermion coupling, and χ(q, ω) is the \nspin susceptibility whose dynamics changes between NS \nand SCS. \n\nFrom our analysis we found that the introduction of \na finite fermionic bandwidth by means of a lattice has \ngenerally a notable effect on both W and ∆W . We \nfound that for all models except for BCSI model, only \n70% − 80% of the optical spectral weight is obtained by \nintegrating up to the bandwidth. In these three models, \nthere also exists a wide range of ωc in which the behavior \nof ∆W (ωc) is due to variation of ∆f (ωc) which is domi- \nnant comparable to the ∆WK term. This dominance of \nthe cut off term is consistent with the analysis in Refs. \n21,22,33. ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0764.pdf" + }, + { + "text": "The most relevant point for our discussion is that this \nmodel contains the physics which we identified above as \na source of a potential sign change of ∆WK . Namely, \nat strong coupling the fermionic self-energy in the NS \nis large because there exists strong scattering between \nlow-energy fermions mediated by low-energy collective \nbosons. In the SCS, the density of low-energy fermions \ndrops and a continuum collective excitations becomes \ngaped. Both effects reduce fermionic damping and lead \nto the increase of WK in a SCS. If this increase exceeds a \nconventional loss of WK due to a gap opening, the total \n∆WK may become positive. \n\nThe CB model has been applied numerous times to the \ncuprates, most often under the assumption that near- \ncritical collective excitations are spin fluctuations with \nmomenta near Q = (π, π). This version of a CB bo- \nson is commonly known as a spin-fermion model. This \nmodel yields dx2 \ny2 superconductivity and explains in a \nquantitative way a number of measured electronic fea- \ntures of the cuprates, in particular the near-absence of \nthe quasiparticle peak in the NS of optimally doped and \nunderdoped cuprates39 and the peak-dip-hump structure \nin the ARPES profile in the SCS31,32,46,47. In our analy- \nsis we assume that a CB is a spin fluctuation. ", + "page_start": 9, + "page_end": 9, + "source_file": "1001.0764.pdf" + }, + { + "text": "χ0 \n4∆2 \nΩ D( 4∆2 \n\nΩ2 ) + iΩK2(1 − 4∆2 \nΩ2 ) \n(cid:1) \n\n# \n\nfor Ω >> 2∆ (23) \n\nIn the SCS fermionic excitations acquire a gap. This \ngap affects fermionic self-energy in two ways: directly, via \nthe change of the dispersion of an intermediate boson in \nthe exchange process involving a CB, and indirectly, via \nthe change of the propagator of a CB. We remind our- \nselves that the dynamics of a CB comes from a particle- \nhole bubble which is indeed affected by ∆. \n\nSubstituting Eq 6 for χ(q, Ω) into the formula for the \nself-energy one obtains Σ′′(ω) in a SCS state as a sum of \ntwo terms31 The effect of a d−wave pairing gap on a CB has been \ndiscussed in a number of papers, most recently in31. In ", + "page_start": 10, + "page_end": 10, + "source_file": "1001.0764.pdf" + }, + { + "text": "S1 + S2 + S3 + S4)2 (11) \n\n· \nwith Jcluster > 0 and 0 < r < 3. However this is not \nconvenient for later discussions and will not be used. \n\nWe briefly describe some of the properties of (8). Its \nlow energy states are entirely in the space that each of the \nclusters is a physical spin singlet (called cluster singlet \nsubspace hereafter). Therefore physical spin correlations \nare strictly confined within each cluster. The excitations \ncarrying physical spin are gapped, and their dynamics \nare ‘trivial’ in the sense that they do not move from one \ncluster to another. But there are non-trivial low energy \nphysical spin singlet excitations, described by the pseudo- \nspins defined above. The correlations of the pseudo-spins \ncan be mapped to correlations of their corresponding \nphysical spin observables (the inverse mappings are not \nunique, c.f. TABLE I). For example τ x,y correlations \nbecome certain dimer-dimer correlations, τ z correlation \nbecomes chirality-chirality correlation, or four-dimer cor- \nrelation. It will be interesting to see the corresponding \npicture of the exotic excitations in the Kitaev model, e.g. \nthe Majorana fermion and the Ising vortex. However this \nwill be deferred to future studies. ", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0266.pdf" + }, + { + "text": "integral in the SCS at T = 0 and in the NS extrapolated \nto T = 0 and compare the cut off effect ∆f (ωc) to ∆WK \nterm. We also analyze the sign of ∆W (ωc) at large fre- \nquencies and discuss under what conditions theoretical \nW (∞) increases in the SCS. \n\nWe perform calculations for four models. First is a \nconventional BCS model with impurities (BCSI model). \nSecond is an Einstein boson (EB) model of fermions in- \nteracting with a single Einstein boson whose propaga- \ntor does not change between NS and SCS. These two \ncases will illustrate a conventional idea of the spectral \nweight in SCS being less than in NS. Then we con- \nsider two more sophisticated models: a phenomenological \n“marginal Fermi liquid with impurities” (MFLI) model \nof Norman and P´epin30, and a microscopic collective bo- \nson (CB) model31 in which in the NS fermions interact \nwith a gapless continuum of bosonic excitations, but in a \nd−wave SCS a gapless continuum splits into a resonance \nand a gaped continuum. This model describes, in par- \nticular, interaction of fermions with their own collective \nspin fluctuations32 via ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0764.pdf" + }, + { + "text": "11 \n\nhigh-energy fermions and is an input for the low-energy \ntheory. Below we follow Refs. 31,33 and assume that \nthe momentum dependence of a collective boson is flat \nnear (π, π). The self energy within such model has been \nworked out consistently in Ref. 31,33. \nIn the normal \nstate \n\na SCS a gapless continuum described by Eq. (20) trans- \nforms into a gaped continuum, with a gap about 2∆ and \na resonance at ω = ω0 < 2∆, where for a d−wave gap we \ndefine ∆ as a maximum of a d−wave gap. \nThe spin susceptibility near (π, π) in a superconductor \ncan generally be written up as \n\nχQ \n1 − i Π(Ω) \nωsf \nω2 \nω2 1 \n2 \nχ(q ∼ Q, Ω) = (21) \nΣ′′(ω) = − λnωsf log 1 + \nsf ! \n\nω \nωsf \nΣ′(ω) = −λnωsf arctan ", + "page_start": 10, + "page_end": 10, + "source_file": "1001.0764.pdf" + }, + { + "text": "modes of neighboring tetrahedra. And these coupling \nconstants λx,y,z need to be tuned to produce Jx,y,z of \nthe Kitaev model. This is still not easy to implement in \nsolid state systems. At lowest non-trivial order of pertur- \nbative expansion, we do get our model (9). Higher order \nterms in expansion destroy the exact solvability, but may \nbe controlled by the small parameters λx,y,z/k. \n\nthe desired Jx,y,z terms in (8) from the first and second \norder of perturbations. \n\nThe calculation can be dramatically simplified by the \nfollowing fact that any physical spin-1/2 operator Sx,y,z \nℓ \nconverts the cluster spin singlet states \ninto \nspin-1 states of the cluster. This can be checked by \nexplicit calculations and will not be proved here. For \nall the perturbations to be considered later, the above \nmentioned fact can be exploited to replace the factor \nHcluster k]−1 in the second order pertur- \n[0 \nHcluster j − \nbation to a c-number ( \n\nτ z = 1 \n| ± i \n\n2Jcluster)−1. \nThe detailed calculations are given in Appendix B. We \n− ", + "page_start": 6, + "page_end": 6, + "source_file": "1001.0266.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0266.pdf", + "query": "What happens when the spin-rotation symmetry is explicitly broken?", + "target_page": 2, + "target_passage": "makes them harder to realize in solid state systems", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "In (16), we have been able to reduce the four spin in- \nteractions in (8) to inter-cluster Heisenberg interactions, \nand the six-spin interactions in (8) to inter-cluster spin- \nchirality interactions. The inter-cluster Heisenberg cou- \nplings in Hperturbation x,y may be easier to arrange. The inter-cluster spin-chirality coupling in Hperturbation z ex- \nplicitly breaks time reversal symmetry and is probably \nharder to implement in solid state systems. However \nspin-chirality order may have important consequences \nin frustrated magnets36,37, and a realization of spin- ", + "page_start": 6, + "page_end": 6, + "source_file": "1001.0266.pdf" + }, + { + "text": "1 Frustrated spin Systems, edited by H. T. Diep (World Sci- 134420 (2009). \n\n16 J. Bohr D. Gibbs, J. D. Axe, D. E. Moncton, K. L. \nD’Amico, C. F. Majkrzak, J. Kwo, M. Hong, C. L. Chien, \nand J. Jensen, Physica B 159, 93 (1989). \n17 H. T. Diep, Phys. Rev. B 39, 397 (1989). \n18 D. Loison, Physica A 275, 207 (2000). \n19 N. Metropolis, et al., J. Chem. Phys. 21, 1087 (1953). \n20 F. R. Brown and T. J. Woch, Phys. Rev. Lett. 58, 2394 \n\nentific, 2004). \n\n2 H. Kawamura, J. Phys.: Cond. Matt. 10, 4707 (1998). \n3 T. Kimura et al., Nature (London) 426, 55 (2003). \n4 F. Cinti et al., Phys. Rev. Lett. 100, 057203 (2008). \n5 J.H. Park, S. Onoda, N. Nagaosa, and J. H. Han, Phys. \nRev. Lett. 101, 167202 (2008), and references therein. \n6 S. W. Cheong and M. Mostovoy, Nature Materials (Lon- ", + "page_start": 6, + "page_end": 6, + "source_file": "1001.0510.pdf" + }, + { + "text": "Consider first a single tetrahedron with four spins \n1, . . . , 4. The general distortions of this tetrahedron can \nbe classified by their symmetry (see for example Ref.35). \nOnly two tetragonal to orthorhombic distortion modes, \nQE \n2 (illustrated in FIG. 3), couple to the pseudo- \nspins defined in Section II. A complete analysis of all \nmodes is given in Appendix A. The coupling is of the \n\n1 and QE ", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0266.pdf" + }, + { + "text": "p| \n\nk )λ2 j + τ x \n\n(Sk3 \nSk4)(1 \n× \n· \nHcluster k]−1 \nHcluster j − \nSj4) \n· \nWe can use the previous argument for both cluster j and \nk, so (1 \n−Pjk) can be \n−PAB)[0 \n2Jcluster)−1. This term becomes \nreplace by c-number ( \n\n− Pjk) \n\nHcluster j − \n− \n\nr λ2 \nHmagnetic = Hcluster j + \n2Jcluster Pjk[Sj2 \n(Sk3 Sk4)][Sk2 (Sj3 Sj3)] \nPjk. \nX \nj X \nx−links \n− · × · × \n\nSpin rotation symmetry again helps to separate the terms \nj τ z \nτ z \nk . \nfor cluster j and k, and we get \n· \nThe other cross term r λ2 \nSj4)(1 \n(Sk3 \nHcluster j − \n\n+ λyHperturbation y \nX \ny−links \n\n− \nPjkSk2 \nHcluster k]−1(1 \n+ λzHperturbation z \n\n− \n× \nX \nz−links ", + "page_start": 9, + "page_end": 9, + "source_file": "1001.0266.pdf" + }, + { + "text": "Appendix A: Coupling between Distortions of a \nTetrahedron and the Pseudo-spins \n\nIn this Appendix we reproduce from Ref.35 the cou- \nplings of all tetrahedron distortion modes to the spin ", + "page_start": 7, + "page_end": 7, + "source_file": "1001.0266.pdf" + }, + { + "text": "In this Subsection we consider more conventional per- \nturbations, magnetic interactions between the clusters, \nSk with j and k belong \ne.g. the Heisenberg coupling Sj · \nto different tetrahedra. This has the advantage over the \nprevious phonon approach for not introducing additional \ndegrees of freedom. But it also has a significant disad- \nvantage: the perturbation does not commute with the \ncluster Heisenberg Hamiltonian (2), so the cluster sin- \nglet subspace will be mixed with other total spin states. \nIn this Subsection we will use the spin-chirality represen- \ntation (6) for τ z. \n\nwill only list the results here. \nThe perturbation on x-links is given by \n\nλy Hperturbation, y \n\nSk1 + sgn(Jy) \nSj4 + Sk3 (Sj3 \nSk4) \n\nSj4) (Sk3 Sk4)] \n\nPjk = \nτ z \nj,k = s \n\n· \n(Sj3 \n· \n· \n\n− · − \n\n· \nJy| · \nThe perturbation on z-links is \n\n− | \n\nPs=±1 | ih \nJcluster. ", + "page_start": 6, + "page_end": 6, + "source_file": "1001.0266.pdf" + }, + { + "text": "in terms of physical spins S, has full \nspin rotation symmetry and time-reversal symmetry. A \npseudo-magnetic field term \n~τj term can also be \nincluded under this mapping, however the resulting Ki- \ntaev model with magnetic field is not exactly solvable. \nIt is quite curious that such a formidably looking Hamil- \ntonian (8), with biquadratic and six-spin(or eight-spin) \nterms, has an exactly solvable low energy sector. \n\nThis model, \n\n~h \nPj · ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0266.pdf" + }, + { + "text": "where S(~q), with ~q = (0, 0, qz), is the structure factor24 \n(i.e. the Fourier transform of the spin correlation func- \ntion) along the z-direction of the film, while the normal- \nization factor K is the structure factor integral at T = 0. \nAlthough the use of the last observable can be seen as a \nsuitable and elegant way to overcome the intrinsic diffi- \nculties met in defining a correct helical order parameter, \nfree of any undue external bias (as the wave-vector Qz ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0510.pdf" + }, + { + "text": "× \nThe first order term in (15) vanishes due to the same \nreason as before. There are four terms in the second \norder perturbation. The first one is \nPjkSj2 \n[0 \n− \n− Pjk)Sj2 \n(1 \n\n(Sk3 \n× \nHcluster j − \nSk4)(1 \n− Pjk) \nHcluster k]−1 \nSk4) \n× \n× \n(Sk3 \nPjk \n\n· \nFor the cluster j part we can use the same arguments \nas before, the Hcluster j can be replaced by a c-number \nJcluster. For the cluster k part, consider the fact that \nSk4], \nSk3 \nthe action of Sk3 \nSk4 on physical singlet states of k will \nalso only produce spin-1 state. So we can replace the \nHcluster k in the denominator by a c-number Jcluster as \nwell. Use spin rotation symmetry to separate the j and \nk parts, this term simplifies to \n\n× \nPjki − \n\n= \n− \n\nλ2 \nThe perturbation on x-links is then (not unique), \nSj2 \nPj · Pk(Sk3 \nSk4) (Sk3 Sk4) \nPk. · × · × \nSk2)] \n· ", + "page_start": 8, + "page_end": 8, + "source_file": "1001.0266.pdf" + }, + { + "text": "S1 + S2 + S3 + S4)2 (11) \n\n· \nwith Jcluster > 0 and 0 < r < 3. However this is not \nconvenient for later discussions and will not be used. \n\nWe briefly describe some of the properties of (8). Its \nlow energy states are entirely in the space that each of the \nclusters is a physical spin singlet (called cluster singlet \nsubspace hereafter). Therefore physical spin correlations \nare strictly confined within each cluster. The excitations \ncarrying physical spin are gapped, and their dynamics \nare ‘trivial’ in the sense that they do not move from one \ncluster to another. But there are non-trivial low energy \nphysical spin singlet excitations, described by the pseudo- \nspins defined above. The correlations of the pseudo-spins \ncan be mapped to correlations of their corresponding \nphysical spin observables (the inverse mappings are not \nunique, c.f. TABLE I). For example τ x,y correlations \nbecome certain dimer-dimer correlations, τ z correlation \nbecomes chirality-chirality correlation, or four-dimer cor- \nrelation. It will be interesting to see the corresponding \npicture of the exotic excitations in the Kitaev model, e.g. \nthe Majorana fermion and the Ising vortex. However this \nwill be deferred to future studies. ", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0266.pdf" + } + ] + }, + { + "references": { + "source_file": "basic-english-language-skills.PDF", + "query": "What is the Oxbridge Academy email?", + "target_page": 59, + "target_passage": "Email: info@oxbridgeacademy.co.za", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "SEND YOUR REGISTRATION FORM \n\nSend your registration form to the \nregistrations office at Oxbridge Academy via \none of the following channels: \n\nFax: \nPost: \nE-mail: registrar@oxbridgeacademy.co.za \n086 262 5550 \nPO Box 12723, Die Boord, 7613 ", + "page_start": 26, + "page_end": 26, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "If you are an Oxbridge Academy student, we’d like you to know \nthat we are here to help you every step of the way, and that we will \ngive you the opportunity to resubmit your assignments if you don’t \nachieve a pass mark the first time around. ", + "page_start": 36, + "page_end": 36, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "If you are under the age of 18, your parent or guardian will need to sign \nthis section of the form to state that they are aware of your registration \nwith Oxbridge Academy, and that they do not have any objections. If you \nare unemployed, you will need a guarantor to sign this section of the \nform. Your parent or guarantor will be held responsible if you miss any of \nyour payments in relation to your course fees. ", + "page_start": 25, + "page_end": 25, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "To make the college registration process easier for you, we’ve compiled a \ncomprehensive guide on how to register at Oxbridge Academy \n(www.oxbridgeacademy.co.za/enrol-now/). The guide also includes general \ntips that will be relevant to the application and registration processes at \nother colleges. \n\n**There are 4 steps you need to follow when you want to**\n**register as a student at Oxbridge Academy:**\n\n**1.**Select Your Course \n\n**2.** Fill in Your Student Details \n\n**3.**Select Your Delivery Option \n\n**4.** Pay Your Registration Fee and Send in Your Form ", + "page_start": 20, + "page_end": 20, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Applying for college (www.oxbridgeacademy.co.za/enrol-now/) can be a \ndaunting experience. Not only do you need to choose a course, but you \nalso need to make sure that you: \n• meet the entry requirements \n• meet the deadlines \n• \n• \n• fill in the forms correctly \nsend the forms to the right address \ninclude all the necessary attachments ", + "page_start": 20, + "page_end": 20, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "1. Read (and follow) the instructions carefully. \nIf you are an Oxbridge Academy student, the general assignment \nguidelines will be provided in your “Success” Study Guide. Specific \ninstructions will also be included at the beginning of each of your \nassignments. \n\n2. Read the questions carefully. \nMake sure you understand what is being asked of you, so that you \nfocus on answering the right questions, instead of providing irrelevant \ninformation. \n\n3. Remember that presentation is important. \nNeatness, spelling, and the structure of your assignment will all count \ntoward the mark that you receive for your assignment. \n\n4. \nto the assignment questions. \nBut make sure to use your own words – don’t just copy. You need to show \nthe person marking your assignment that you have developed a sound \nunderstanding of the subject. \n\nUse your course material and other external sources to find answers ", + "page_start": 37, + "page_end": 37, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "We are registered with the Department of Higher Education and Training as a Private College in terms of Section \n31(6)(a) of the Continuing Education and Training Act, 2006 (Act No. 16 of 2006). Registration No. 2009/FE07/070. \n\n*Developed for Oxbridge Academy*", + "page_start": 58, + "page_end": 58, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Different courses have different registration fees. Please check the course \nfees list (www.oxbridgeacademy.co.za/Documents/ Price-list-2015.pdf) to \nfind out how much you need to pay to register for your chosen course, and \npay this amount using the banking details provided at the bottom of the \nregistration form. Remember to attach your proof of payment. ", + "page_start": 25, + "page_end": 25, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Please make sure to check the accreditation status of your chosen course. \nSome of our courses are non-credit bearing skills development courses, \nwhich are neither accredited by external bodies nor registered on the NQF. \nPlease go to our website:*oxbridgeacademy.co.za*for more \nabout our skills development courses. \n\ninformation ", + "page_start": 21, + "page_end": 21, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "**Use a relevant and descriptive subject line.**\nThis way, your tutor will immediately know what your e-mail is \nabout, and he or she will be more likely to open it. A good subject \nline might read as follows: “Enquiry regarding Assignment 1 for \nSafety Management 101” ", + "page_start": 33, + "page_end": 33, + "source_file": "basic-english-language-skills.PDF" + } + ] + }, + { + "references": { + "source_file": "sg247938.pdf", + "query": "When is it necessary to use a host multipathing driver for load balancing?", + "target_page": 340, + "target_passage": "For load balancing and access redundancy on the host side, the use of a host multipathing driver is required in the following situations: Protection from fabric link failures, including port failures on the IBM Spectrum Virtualize system nodes Protection from a host HBA failure (if two HBAs are in use) Protection from fabric failures if the host is connected through two HBAs to two separate fabrics Provide load balancing across the host HBA", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "(cid:2) Balanced host load across HBA ports \n\nIf the host has more than one HBA port per fabric, zone each host port with a separate \ngroup of Storwize V7000 ports. \n\n(cid:2) Balanced host load across Storwize V7000 ports \n\nTo obtain the best overall performance of the subsystem and to prevent overloading, the \nload of each Storwize V7000 port should be equal. Assuming a similar load is generated \nby each host, you can achieve this balance by zoning approximately the same number of \nhost ports to each Storwize V7000 port. ", + "page_start": 76, + "page_end": 76, + "source_file": "sg247938.pdf" + }, + { + "text": "Figure 3-4 Overview of four-path host zoning \n\nWhen possible, use the minimum number of paths that are necessary to achieve a sufficient \nlevel of redundancy. For the Storwize V7000 environment, no more than four paths per I/O \nGroup are required to accomplish this layout. \n\nAll paths must be managed by the multipath driver on the host side. Make sure that the \nmultipath driver on each server can handle the number of paths required to access all \nvolumes mapped to the host. \n\nFor hosts that use four HBAs/ports with eight connections to an I/O Group, use the zoning \nschema that is shown in Figure 3-5 on page 57. You can combine this schema with the \nprevious four-path zoning schema. ", + "page_start": 77, + "page_end": 77, + "source_file": "sg247938.pdf" + }, + { + "text": "These numbers estimate the amount of traffic between the two clustered systems when no \nI/O is taking place to mirrored volumes. Half of the data is sent by each of the systems. The \ntraffic is divided evenly over all available intercluster links. Therefore, if you have two \nredundant links, half of this traffic is sent over each link. \n\nThe bandwidth between sites must be sized to meet the peak workload requirements. You \ncan estimate the peak workload requirement by measuring the maximum write workload \naveraged over a period of 1 minute or less, and adding the heartbeat bandwidth. Statistics \nmust be gathered over a typical application I/O workload cycle, which might be days, weeks, \nor months, depending on the environment in which the Storwize V7000 is used. \n\nWhen planning the inter-site link, consider also the initial sync and any future resync \nworkloads. It might be worthwhile to secure additional link bandwidth for the initial data \nsynchronization. \n\nIf the link between the sites is configured with redundancy so that it can tolerate single \nfailures, you must size the link so that the bandwidth and latency requirements are met even \nduring single failure conditions. \n\nWhen planning the inter-site link, make a careful note whether it is dedicated to the \ninter-cluster traffic or is going to be used to carry any other data. Sharing link with other traffic \n(for example, cross-site IP traffic) might reduce the cost of creating the inter-site connection \nand improve link utilization. However, doing so might affect the links’ ability to provide the \nrequired bandwidth for data replication. ", + "page_start": 98, + "page_end": 98, + "source_file": "sg247938.pdf" + }, + { + "text": "(cid:2) Number of paths per host multipath device \n\nThe maximum supported number of paths per multipath device that is visible on the host is \neight. Although the IBM Subsystem Device Driver Path Control Module (SDDPCM), \nrelated products, and most vendor multipathing software can support more paths, the \nStorwize V7000 expects a maximum of eight paths. In general, you see only an effect on \nperformance from more paths than eight. Although the IBM Spectrum Virtualize can work \nwith more than eight paths, this design is technically unsupported. \n\n(cid:2) Do not intermix dissimilar array types or sizes \n\nAlthough the IBM Spectrum Virtualize supports an intermix of differing storage within \nstorage pools, it is best to always use the same array model, Redundant Array of \nIndependent Disks (RAID) mode. RAID size (RAID 5 6+P+S does not mix well with RAID 6 \n14+2), and drive speeds. \n\nRules and guidelines are no substitution for monitoring performance. Monitoring performance \ncan provide a validation that design expectations are met, and identify opportunities for \nimprovement. \n\n**IBM Spectrum Virtualize performance perspectives**\n\nIBM Spectrum Virtualize software was developed by the IBM Research Group. It is designed \nto run on commodity hardware (mass-produced Intel-based processors [CPUs] with \nmass-produced expansion cards) and to provide distributed cache and a scalable cluster \narchitecture. One of the main goals of this design was to use refreshes in hardware. Currently, \nthe Storwize V7000 cluster is scalable up to eight nodes (four control enclosures). ", + "page_start": 762, + "page_end": 762, + "source_file": "sg247938.pdf" + }, + { + "text": "Hosts that connect to the Storwize V7000 system with iSCSI protocol must be configured \ncorrectly, as described in Chapter 3, “Planning” on page 43. \n\n**Note:**Certain host operating systems can be directly connected to the Storwize V7000 \nsystem without the need for FC fabric switches. For more information, see this page of the \nIBM System Storage Interoperation Center (SSIC). \n\nFor load balancing and access redundancy on the host side, the use of a host multipathing \ndriver is required in the following situations: \n\n(cid:2) Protection from fabric link failures, including port failures on the IBM Spectrum Virtualize \nsystem nodes \n\n(cid:2) Protection from a host HBA failure (if two HBAs are in use) \n\n(cid:2) Protection from fabric failures if the host is connected through two HBAs to two separate \nfabrics \n\n(cid:2) Provide load balancing across the host HBAs \n\nFor more information about various host operating systems and versions that are supported \nby IBM Storwize V7000, see this page of the IBM System Storage Interoperation Center \n(SSIC). \n\nFor more information about how to attach various supported host operating systems to IBM \nStorwize V7000, see IBM Knowledge Center. ", + "page_start": 339, + "page_end": 339, + "source_file": "sg247938.pdf" + }, + { + "text": "**13.2.2 Recommendations**\n\nFor the most optimal performance in loading, we recommend the following practices: \n\n(cid:2) For Multiplatforms and z/OS, run parallel load jobs to take advantage of multiprocessors, \nlarge memory pools, multiple data paths, and multiple disk drives. \n\n(cid:2) Ensure that each parallel load is loading to a different application group. \n\n(cid:2) Ensure that you set up a different temp directory for each of the parallel loads. The**-c**\n**indexDir**indexer parameter (which specifies the directory in which the indexer stores \ntemporary data) must always be specified for**ARSLOAD**and must be unique for each \nrunning**ARSLOAD**process. \n\n(cid:2) For IBM i, start multiple output queue monitors over a single output queue to improve \n\nthroughput and take advantage of multiprocessors, large memory pools, and multiple disk \ndrives. \n\n(cid:2) Each Content Manager OnDemand process is limited by the performance of a single \n\nprocessor. For example, the OS/400 indexer uses only one processor when it indexes a \ndocument. Using two or more processors in your system or LPAR does not improve the \nperformance of the OS/400 indexer. However, by using two or more processors in your \nsystem or LPAR, you might be able to run multiple load jobs simultaneously. You can start \nmultiple output queue monitors over a single output queue to improve document load \nperformance. ", + "page_start": 325, + "page_end": 325, + "source_file": "sg246915.pdf" + }, + { + "text": "In an IBM Storwize V7000 environment, the use of active/active architecture and the I/O \nhandling for a volume can be managed by both nodes of the I/O group. Therefore, servers \nthat are connected through Fibre Channel connectors*must*use multipath device drivers \nhandle this capability. \n\nThe IBM Storwize V7000 I/O groups are connected to the SAN so that all application servers \naccessing volumes from the I/O group have access to them. Up to 2048 host server objects \ncan be defined in four I/O groups. ", + "page_start": 41, + "page_end": 41, + "source_file": "sg247938.pdf" + }, + { + "text": "Figure 3-5 Overview of eight-path host zoning \n\nFor more information, see Chapter 8, “Hosts” on page 317. \n\n**3.6.6 Zoning considerations for Metro Mirror and Global Mirror**\n\nThe SAN configurations that use intercluster Metro Mirror and Global Mirror relationships \nrequire the following other switch zoning considerations: \n\n(cid:2) Review the latest requirements and recommendations at this website. \n\n(cid:2) If two ISLs are connecting the sites, split the ports from each node between the ISLs. That \nis, exactly one port from each node must be zoned across each ISL. \n\n(cid:2) Local clustered system zoning continues to follow the standard requirement for all ports on \nall nodes in a clustered system to be zoned to one another. \n\nWhen designing zoning for a geographically dispersed solution, consider the effect of the \ncross-site links on the performance of the local system. \n\n**Important:**Be careful when you perform the zoning so that ports that are dedicated for \nintra-cluster communication are*not*used for Host/Storage traffic in the 8-port and 12-port \nconfigurations. \n\nThe use of mixed port speeds for intercluster communication can lead to port congestion, \nwhich can negatively affect the performance and resiliency of the SAN. Therefore, it is not \nsupported. ", + "page_start": 78, + "page_end": 78, + "source_file": "sg247938.pdf" + }, + { + "text": "**Syst em A** **Syste m B**\n\n*Figure 12-4 Horizontal and vertical scaling with multiple LPARs*\n\nThis scenario is in organizations with large systems, such as AIX or z/OS, that are installed \nand that have enough available capacity to support the required Content Manager \nOnDemand workload. One advantage of this configuration is that you can control the priority \nof work and computer resource distribution to each of the LPARs, such as the number of \nprocessors or the processing priority (depending on the computer system/operating system \narchitecture) that is allocated to each of the LPARs. So, for example, load jobs can be \nassigned a low priority during the day when the focus is on data retrieval and a high priority \nduring the night when the focus is on data loading. \n\nThis setup supports horizontal scalability by using multiple technologies as appropriate. The \nmain constraint is that clients must have access to all systems through TCP/IP. \n\n**12.2.6 Multiple server configuration rules**\n\nThe following general rules apply when you configure multiple Content Manager OnDemand \nservers. In all cases, for additional guidance, see the appropriate Content Manager \nOnDemand documentation or contact Content Manager OnDemand Lab Services. \n\n(cid:2) Each Content Manager OnDemand server has its own set of configuration files. \n\n(cid:2) The parameters in all configuration files must be set so that all of the servers are part of \nthe same instance. \n\n(cid:2) The Content Manager OnDemand clients connect to the IP address listening port of the \nContent Manager OnDemand server (library server module). \n\n(cid:2) The documents are retrieved from the various object servers based on the location \n\ninformation that is returned by the library server. This retrieval is transparent to the client \nsystems. \n\n(cid:2) Parallel load processes must have separate temp directories. ", + "page_start": 314, + "page_end": 314, + "source_file": "sg246915.pdf" + }, + { + "text": "\n \n \n \n \n [html]ce considerationsWhen you are designing the BMI ( Spectrum Vitualize infrastructure or maintaining an existing infrastructure, you must comsider many factors in terms of their potential effect on performance. These factors include, but are not limbediRemember the following high - level rules when you are designing your storage area network ( SAN ) and BM Spectrum Virtualize layout.\n
• Host - to - System inter - owitch limk ( ISL ) oversubscriptionThis area is the most significant inpul / output ( I / O ) load across IGI... The recommendation is to maintain a maimum of 7 - to - 1 oversusbocription. A higher ratio is possible, but it lends to lead to IO bothenecks. This suggestion also assum
• Storage - to - System ISL oversubscriptionThis area is the second most significant I / D load across ISLs. The maximum oversubscription is 7 - to - 1. A higher ratio is not supported. Again, this suggestion assumes a multiple - awitch SAN tabric design.
• Node - to - node ISL oversubscriptionThis area down not apply to Stownice VTDD clusters composed of a unique control encoure. This area is the least significant load of the three possible overublecroption betterworks. In storaded wristory. It ’ s lond can be ignored. Afterug
", + "page_start": 761, + "page_end": 761, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0955.pdf", + "query": "Which orbiting instrument provides near-continuous full-sky coverage in the hard X-ray/low-energy gamma-ray range?", + "target_page": 1, + "target_passage": "Gamma ray Burst Monitor", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "The NaI and BGO detectors on the Gamma ray Burst Monitor (GBM) on Fermi are now being \nused for long term monitoring of the hard X-ray/low energy gamma ray sky. Using the Earth \noccultation technique demonstrated previously by the BATSE instrument on the Compton Gamma \nRay Observatory, GBM produces multiband light curves and spectra for known sources and transient \noutbursts in the 8 keV - 1 MeV band with its NaI detectors and up to 40 MeV with its BGO. Coverage \nof the entire sky is obtained every two orbits, with sensitivity exceeding that of BATSE at energies \nbelow ∼ 25 keV and above ∼ 1.5 MeV. We describe the technique and present preliminary results \nafter the first ∼ 17 months of observations at energies above 100 keV. Seven sources are detected: \nthe Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, GRS 1915+105, and the transient source \nXTE J1752-223. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0955.pdf" + }, + { + "text": "sists of 12 NaI detectors 5(cid:48)(cid:48) in diameter by 0.5(cid:48)(cid:48) thick \nmounted on the corners of the spacecraft and oriented \nsuch that they view the entire sky not occulted by the \nEarth. GBM also contains 2 BGO detectors 5(cid:48)(cid:48) in di- \nameter by 5(cid:48)(cid:48) thick located on opposite sides of the \nspacecraft. None of the GBM detectors have direct \nimaging capability. \n\nI. INTRODUCTION \n\nThe Gamma ray Burst Monitor (GBM) on Fermi is \ncurrently the only instrument in orbit providing nearly \ncontinuous full sky coverage in the hard X-ray/low \nenergy gamma ray energy range. The Earth occul- \ntation technique, used very successfully on BATSE, \nhas been adapted to GBM. An initial catalog of 64 \nsources is currently being monitored and continuously \naugmented. At energies above 100 keV, six steady \nsources (the Crab, Cyg X-1, Swift J1753.5-0127, 1E \n1740-29, Cen A, GRS 1915+105) and one transient \nsource (XTE J1752-223) have been detected in the \nfirst year of observation. We describe the instrument, \noutline the technique, and present light curves for the \nseven sources. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0955.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\nObservations of Soft Gamma Ray Sources > 100 keV Using Earth Occultation \nwith GBM \n\nG.L. Case, M.L. Cherry, J. Rodi \nDept. of Physics & Astronomy, Louisiana State Univ., Baton Rouge, LA 70803, USA \n\nA. Camero-Arranz \nFundaci´on Espa˜nola de Ciencia y Tecnolog´ıa (MICINN), C/Rosario Pino,14-16, 28020-Madrid, Spain \n\nE. Beklen \nMiddle East Technical University (METU), 06531, Ankara, Turkey \n\nC. A. Wilson-Hodge \nNASA Marshall Space Flight Center, Huntsville, AL 35812 \n\nP. Jenke \nNASA Postdoctoral Program Fellow, NASA Marshall Space Flight Center, Huntsville, AL 35812 \n\nP.N. Bhat, M.S. Briggs, V. Chaplin, V. Connaughton, R. Preece \nUniversity of Alabama in Huntsville, Huntsville, AL 35899 \n\nM.H. Finger \nUSRA, National Space Science and Technology Center, Huntsville, AL 35899 ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0955.pdf" + }, + { + "text": "The VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is \nused to study very high energy (VHE; E>100 GeV) γ-ray emission from astrophysical objects. VERITAS is \ncurrently the most sensitive VHE γ-ray observatory in the world and one of the VERITAS collaboration’s Key \nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class \nof identified VHE sources, with ∼30 known to emit VHE photons. More than 70 AGN, almost all of which \nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE \nexposure. These observations have resulted in the detection of VHE γ-rays from 16 AGN (15 blazars), including \n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected \nresults are presented. \n0 \n1 \n0 \n2 \n\nn \na \nJ \n**1. Introduction**\n\n5 \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + }, + { + "text": "source while it is in the hard state, with longer obser- \nvations potentially verifying significant emission above \n300 keV. \nwill use the GBM CSPEC data with their finer energy \nbins to obtain a fit to the spectrum and compare the \npower law index to that measured by Integral. \n\nSWIFT J1753.5-0127 (Fig. 7) is a LMXB with \nthe compact object likely being a black hole. Swift \ndiscovered this source when it observed a large flare \nin July of 2005. The source did not return to qui- \nescence but settled into a low intensity hard state \n[14]. BATSE occultation measurements from 1991- \n2000 showed no significant emission from this source \nabove 25 keV [15]. The GBM results show that this \nsource is still in a hard state, with significant emis- \nsion above 100 keV. We will continue to monitor this \n\nB. Transient Source \n\nThe new transient black hole candidate XTE \nJ1752-223 rose from undetectable on 2009 October \n24 to 511 ± 50 mCrab (12 - 25 keV), 570 ± 70 mCrab \n(25 - 50 keV), 970 ± 100 mCrab (50 - 100 keV), and \n330 ± 100 mCrab (100 - 300 keV) on 2009 November \n2 [2, 16]. The light curve is variable, especially in the ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0955.pdf" + }, + { + "text": "eral sources over the same time intervals in ref. [2], \nwhere it is seen that the results measured by the two \ninstruments compare well. At energies above the up- \nper energy limit of ∼ 195 keV of the Swift 22-month \ncatalog [6], however, the GBM observations provide \nthe only wide-field monitor available of the low en- \nergy gamma ray sky. \n\nThis work uses the GBM CTIME data, with its \n8 broad energy channels and 0.256-second resolution, \nrebinned to 2-second resolution. The occultation tech- \nnique relies on an input catalog of known sources. \nCurrently, we are monitoring 64 sources. Of these \n64 sources, 6 steady sources are detected above 100 \nkeV with a significance of at least 5σ after ∼ 490 days \nof observations, and one transient source. \n\nA. Steady Sources \n\nThe sources Crab, Cyg X-1, Swift J1753.5-0127, 1E \n1740-29, Cen A, and GRS 1915+105 are detected by \nGBM at energies above 100 keV. We show GBM light \ncurves generated from the Earth occultation analysis \nin several energy bands with one day resolution for \nthese six sources in Figures 2 - 7. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0955.pdf" + }, + { + "text": "III. RESULTS \n\nTable I gives the fluxes and significances averaged \nover all the days from Aug. 12, 2008 (the beginning of \nscience operations) to Dec. 15, 2009, approximately \n490 days. \n\nThe results presented here are preliminary. We \nhave not completed the fine tuning of our algorithms, \nthough the average fluxes are not expected to change \nmuch. Future work will \ninclude using the GBM \nCSPEC data, with its finer energy binning, to exam- \nine the detailed spectra for these sources. \n\nThe Crab (Fig. 2) spectrum in the hard x-ray/low \nenergy gamma-ray region can be described by a bro- \nken power law, with the spectrum steepening at 100 \nkeV and then hardening at 650 keV [7, 8]. While the \nGBM CTIME data do not have the spectral resolution The measured 20 - 50 keV GBM light curves are \ncompared to Swift’s 15 - 50 keV light curves for sev- \n\neConf C091122 ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0955.pdf" + }, + { + "text": "GRS 1915+105 (Fig. 5) is a LMXB with the com- \npact object being a massive black hole. Evidence for \nemission above 100 keV has been seen previously [12] \nwith BATSE. The GBM light curve integrated over \n490 days shows significant emission above 100 keV. \n\n1E 1740-29 (Fig. 6) is a LMXB very near the \nGalactic Center. It is a microquasar, and spends most \nIntegral observa- \nof its time in the low/hard state. \ntions indicate the presence of a power law tail above \n200 keV [13]. The present GBM results are consis- \ntent with this high energy emission. In the future, we \n\neConf C091122 ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0955.pdf" + }, + { + "text": "tion of correlated VHE and X-ray flux variability, as \nwell as correlated spectral hardening in both the VHE \nand X-ray bands. The VHE MWL observations were \nperformed in both ”quiescent” and flaring states for \nsome of the observed blazars. For the observed HBL \nobjects, the SEDs can be well described by a simple \nSSC model in both high and low states. However, an \nadditional external Compton component is necessary \nto adequately fit the SEDs of the IBL objects. \n\norating institutions in the construction and operation \nof the instrument. \n\n**References**\n\nThe Fermi-LAT is already having a significant im- \npact on the blazar KSP. In future seasons, the VER- \nITAS blazar discovery program will focus its dis- \ncovery program on hard-spectrum blazars detected \nby Fermi-LAT, and will likely have a greater focus \non high-risk/high-reward objects at larger redshifts \n(0.3 < z < 0.7). \nIn addition, the number of VHE \nblazars studied in pre-planned MWL campaigns will \nincrease as data from the Fermi-LAT will be publicly \navailable. \nIn particular, the extensive pre-planned \nMWL campaigns will focus on objects that are note- \nworthy for the impact their data may have on under- \nstanding the EBL. The simultaneous observations of \nblazars by VERITAS and Fermi-LAT will completely \nresolve the higher-energy SED peak, often for the first \ntime, enabling unprecedented constraints on the un- \nderlying blazar phenomena to be derived. ", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0770.pdf" + }, + { + "text": "four 12-m \natmospheric-Cherenkov telescopes located in Arizona, \nis used to study VHE γ-rays from a variety of astro- \nphysical sources [4]. VERITAS began scientific obser- \nvations with a partial array in September 2006 and has \nroutinely observed with the full array since Septem- \nber 2007. The performance metrics of VERITAS in- \nclude an energy threshold of ∼100 GeV, an energy \nresolution of ∼15%, an angular resolution of ∼0.1◦, \nand a sensitivity yielding a 5σ detection of a 1% Crab \nNebula flux object in <30 hours1. VERITAS has an \nactive maintenance program (e.g. frequent mirror re- \ncoating and alignment) to ensure its continued high \nperformance over time, and an upgrade improving \nboth the camera (higher quantum-efficiency PMTs) \nand the trigger system has been proposed to the fund- \ning agencies. \n\nVERITAS, a stereoscopic array of \n\nVHE blazars have double-humped spectral energy \ndistributions (SEDs), with one peak at UV/X-ray en- \nergies and another at GeV/TeV energies. The ori- \ngin of the lower-energy peak is commonly explained \nas synchrotron emission from the relativistic electrons \nin the blazar jets. The origin of the higher-energy \npeak is controversial, but is widely believed to be the \nresult of inverse-Compton scattering of seed photons \noff the same relativistic electrons. The origin of the \nseed photons in these leptonic scenarios could be the \nsynchrotron photons themselves, or photons from an \nexternal source. Hadronic scenarios are also plausible \nexplanations for the VHE emission, but generally are \nnot favored. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0955.pdf", + "query": "What is Cyg X-1?", + "target_page": 3, + "target_passage": "is a HMXB and one of the first systems determined to contain a black hole", + "chunk_present": { + "presence": true, + "index": 6 + } + }, + "top_chunk": [ + { + "text": "\n4 \nSTABLE, POSITIVE CyAC ", + "page_start": 272, + "page_end": 272, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n\n“1 ", + "page_start": 163, + "page_end": 163, + "source_file": "00-80T-80.pdf" + }, + { + "text": "**XY (Scatter)**\n\n", + "page_start": 44, + "page_end": 44, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "\n\nOF WIND \n\n-1 ", + "page_start": 385, + "page_end": 385, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n\nC:G. 1 \nO.C. \nC:G. ", + "page_start": 68, + "page_end": 68, + "source_file": "00-80T-80.pdf" + }, + { + "text": "LP AR - 1 \n\n", + "page_start": 315, + "page_end": 315, + "source_file": "sg246915.pdf" + }, + { + "text": "to observe these breaks, GBM is able to see significant \nemission above 300 keV, consistent with the canonical \nhard spectrum. \n\nCen A (Fig. 3) is a Sy 2 galaxy that is the brightest \nAGN in hard x-rays/low energy gamma rays. It has \na hard spectrum (Γ = 1.8) and has been observed at \nenergies > 1 MeV [9]. The GBM results are consis- \ntent with this hard spectrum, though GBM does not \nhave the sensitivity to determine if the hard spectrum \ncontinues beyond 300 keV or if the spectrum cuts off. \nCyg X-1 (Fig. 4) is a HMXB and one of the \nfirst systems determined to contain a black hole. It \nhas been observed to emit significant emission above \n100 keV including a power law tail extending out to \ngreater than 1 MeV [10, 11]. The GBM results show \nsignificant emission above 300 keV, consistent with \nthe power law tail observed when Cyg X-1 is in its \nhard state. ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0955.pdf" + }, + { + "text": "\n\n1 ", + "page_start": 23, + "page_end": 23, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "The NaI and BGO detectors on the Gamma ray Burst Monitor (GBM) on Fermi are now being \nused for long term monitoring of the hard X-ray/low energy gamma ray sky. Using the Earth \noccultation technique demonstrated previously by the BATSE instrument on the Compton Gamma \nRay Observatory, GBM produces multiband light curves and spectra for known sources and transient \noutbursts in the 8 keV - 1 MeV band with its NaI detectors and up to 40 MeV with its BGO. Coverage \nof the entire sky is obtained every two orbits, with sensitivity exceeding that of BATSE at energies \nbelow ∼ 25 keV and above ∼ 1.5 MeV. We describe the technique and present preliminary results \nafter the first ∼ 17 months of observations at energies above 100 keV. Seven sources are detected: \nthe Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, GRS 1915+105, and the transient source \nXTE J1752-223. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0955.pdf" + }, + { + "text": "\nI \n1 ", + "page_start": 125, + "page_end": 125, + "source_file": "00-80T-80.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0955.pdf", + "query": "What satellite is the Gamma Ray Burst Observatory on?", + "target_page": 1, + "target_passage": " Fermi satellite", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "sists of 12 NaI detectors 5(cid:48)(cid:48) in diameter by 0.5(cid:48)(cid:48) thick \nmounted on the corners of the spacecraft and oriented \nsuch that they view the entire sky not occulted by the \nEarth. GBM also contains 2 BGO detectors 5(cid:48)(cid:48) in di- \nameter by 5(cid:48)(cid:48) thick located on opposite sides of the \nspacecraft. None of the GBM detectors have direct \nimaging capability. \n\nI. INTRODUCTION \n\nThe Gamma ray Burst Monitor (GBM) on Fermi is \ncurrently the only instrument in orbit providing nearly \ncontinuous full sky coverage in the hard X-ray/low \nenergy gamma ray energy range. The Earth occul- \ntation technique, used very successfully on BATSE, \nhas been adapted to GBM. An initial catalog of 64 \nsources is currently being monitored and continuously \naugmented. At energies above 100 keV, six steady \nsources (the Crab, Cyg X-1, Swift J1753.5-0127, 1E \n1740-29, Cen A, GRS 1915+105) and one transient \nsource (XTE J1752-223) have been detected in the \nfirst year of observation. We describe the instrument, \noutline the technique, and present light curves for the \nseven sources. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0955.pdf" + }, + { + "text": "The NaI and BGO detectors on the Gamma ray Burst Monitor (GBM) on Fermi are now being \nused for long term monitoring of the hard X-ray/low energy gamma ray sky. Using the Earth \noccultation technique demonstrated previously by the BATSE instrument on the Compton Gamma \nRay Observatory, GBM produces multiband light curves and spectra for known sources and transient \noutbursts in the 8 keV - 1 MeV band with its NaI detectors and up to 40 MeV with its BGO. Coverage \nof the entire sky is obtained every two orbits, with sensitivity exceeding that of BATSE at energies \nbelow ∼ 25 keV and above ∼ 1.5 MeV. We describe the technique and present preliminary results \nafter the first ∼ 17 months of observations at energies above 100 keV. Seven sources are detected: \nthe Crab, Cyg X-1, Swift J1753.5-0127, 1E 1740-29, Cen A, GRS 1915+105, and the transient source \nXTE J1752-223. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0955.pdf" + }, + { + "text": "GRS 1915+105 (Fig. 5) is a LMXB with the com- \npact object being a massive black hole. Evidence for \nemission above 100 keV has been seen previously [12] \nwith BATSE. The GBM light curve integrated over \n490 days shows significant emission above 100 keV. \n\n1E 1740-29 (Fig. 6) is a LMXB very near the \nGalactic Center. It is a microquasar, and spends most \nIntegral observa- \nof its time in the low/hard state. \ntions indicate the presence of a power law tail above \n200 keV [13]. The present GBM results are consis- \ntent with this high energy emission. In the future, we \n\neConf C091122 ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0955.pdf" + }, + { + "text": "eral sources over the same time intervals in ref. [2], \nwhere it is seen that the results measured by the two \ninstruments compare well. At energies above the up- \nper energy limit of ∼ 195 keV of the Swift 22-month \ncatalog [6], however, the GBM observations provide \nthe only wide-field monitor available of the low en- \nergy gamma ray sky. \n\nThis work uses the GBM CTIME data, with its \n8 broad energy channels and 0.256-second resolution, \nrebinned to 2-second resolution. The occultation tech- \nnique relies on an input catalog of known sources. \nCurrently, we are monitoring 64 sources. Of these \n64 sources, 6 steady sources are detected above 100 \nkeV with a significance of at least 5σ after ∼ 490 days \nof observations, and one transient source. \n\nA. Steady Sources \n\nThe sources Crab, Cyg X-1, Swift J1753.5-0127, 1E \n1740-29, Cen A, and GRS 1915+105 are detected by \nGBM at energies above 100 keV. We show GBM light \ncurves generated from the Earth occultation analysis \nin several energy bands with one day resolution for \nthese six sources in Figures 2 - 7. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0955.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\nObservations of Soft Gamma Ray Sources > 100 keV Using Earth Occultation \nwith GBM \n\nG.L. Case, M.L. Cherry, J. Rodi \nDept. of Physics & Astronomy, Louisiana State Univ., Baton Rouge, LA 70803, USA \n\nA. Camero-Arranz \nFundaci´on Espa˜nola de Ciencia y Tecnolog´ıa (MICINN), C/Rosario Pino,14-16, 28020-Madrid, Spain \n\nE. Beklen \nMiddle East Technical University (METU), 06531, Ankara, Turkey \n\nC. A. Wilson-Hodge \nNASA Marshall Space Flight Center, Huntsville, AL 35812 \n\nP. Jenke \nNASA Postdoctoral Program Fellow, NASA Marshall Space Flight Center, Huntsville, AL 35812 \n\nP.N. Bhat, M.S. Briggs, V. Chaplin, V. Connaughton, R. Preece \nUniversity of Alabama in Huntsville, Huntsville, AL 35899 \n\nM.H. Finger \nUSRA, National Space Science and Technology Center, Huntsville, AL 35899 ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0955.pdf" + }, + { + "text": "The VERITAS array of four 12-m diameter imaging atmospheric-Cherenkov telescopes in southern Arizona is \nused to study very high energy (VHE; E>100 GeV) γ-ray emission from astrophysical objects. VERITAS is \ncurrently the most sensitive VHE γ-ray observatory in the world and one of the VERITAS collaboration’s Key \nScience Projects (KSP) is the study of blazars. These active galactic nuclei (AGN) are the most numerous class \nof identified VHE sources, with ∼30 known to emit VHE photons. More than 70 AGN, almost all of which \nare blazars, have been observed with the VERITAS array since 2007, in most cases with the deepest-ever VHE \nexposure. These observations have resulted in the detection of VHE γ-rays from 16 AGN (15 blazars), including \n8 for the first time at these energies. The VERITAS blazar KSP is summarized in this proceeding and selected \nresults are presented. \n0 \n1 \n0 \n2 \n\nn \na \nJ \n**1. Introduction**\n\n5 \n\n] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + }, + { + "text": "III. RESULTS \n\nTable I gives the fluxes and significances averaged \nover all the days from Aug. 12, 2008 (the beginning of \nscience operations) to Dec. 15, 2009, approximately \n490 days. \n\nThe results presented here are preliminary. We \nhave not completed the fine tuning of our algorithms, \nthough the average fluxes are not expected to change \nmuch. Future work will \ninclude using the GBM \nCSPEC data, with its finer energy binning, to exam- \nine the detailed spectra for these sources. \n\nThe Crab (Fig. 2) spectrum in the hard x-ray/low \nenergy gamma-ray region can be described by a bro- \nken power law, with the spectrum steepening at 100 \nkeV and then hardening at 650 keV [7, 8]. While the \nGBM CTIME data do not have the spectral resolution The measured 20 - 50 keV GBM light curves are \ncompared to Swift’s 15 - 50 keV light curves for sev- \n\neConf C091122 ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0955.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n(z = 0.341) detected in the VHE band. In addition, \nVER J0521+211, likely associated with the radio-loud \nAGN RGB J0521.8+2112, was detected by VERTAS \nin ∼4 h of observations in October 2009 [23]. These \nobservations were motivated by its identification as a \n>30 GeV γ-ray source in the public Fermi-LAT data. \nIts VHE flux is 5% of the Crab Nebula flux, placing it \namong the brightest VHE blazars detected in recent \nyears. VERITAS later observed even brighter VHE \nflaring from VER J0521+211 in November 2009 [24], \nleading to deeper VHE observations. ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + }, + { + "text": "source while it is in the hard state, with longer obser- \nvations potentially verifying significant emission above \n300 keV. \nwill use the GBM CSPEC data with their finer energy \nbins to obtain a fit to the spectrum and compare the \npower law index to that measured by Integral. \n\nSWIFT J1753.5-0127 (Fig. 7) is a LMXB with \nthe compact object likely being a black hole. Swift \ndiscovered this source when it observed a large flare \nin July of 2005. The source did not return to qui- \nescence but settled into a low intensity hard state \n[14]. BATSE occultation measurements from 1991- \n2000 showed no significant emission from this source \nabove 25 keV [15]. The GBM results show that this \nsource is still in a hard state, with significant emis- \nsion above 100 keV. We will continue to monitor this \n\nB. Transient Source \n\nThe new transient black hole candidate XTE \nJ1752-223 rose from undetectable on 2009 October \n24 to 511 ± 50 mCrab (12 - 25 keV), 570 ± 70 mCrab \n(25 - 50 keV), 970 ± 100 mCrab (50 - 100 keV), and \n330 ± 100 mCrab (100 - 300 keV) on 2009 November \n2 [2, 16]. The light curve is variable, especially in the ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0955.pdf" + }, + { + "text": "1A VERITAS telescope was relocated during Summer 2009, \nincreasing the array’s sensitivity by a factor ∼1.3. Contemporaneous multi-wavelength (MWL) obser- \n\neConf C091122 ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed3.pdf", + "query": "When in present-day Poland did the first shift away from earlier ancestry occur?", + "target_page": 3, + "target_passage": "in the Middle to Late Bronze Age (1500 bce to 1000 bce), we observe a clear shift away from preceding ancestry originally associated with Corded Ware cultures", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Expansions of Scandinavian-like ancestry**\nWe assembled time transects using available aDNA data across several \ngeographical regions in Europe, and infer their ancestry using a model \nwith the EIA or Roman Iron Age sources previously defined (shown in \nFig. 2a). Our modelling provides direct evidence of individuals with \nancestry originating in northern Germany or Scandinavia appearing \nacross Europe as early as the first century ce (Figs. 2b,c and 3 and Sup- \nplementary Table 3). \n\nIn the region of present-day Poland, our analysis suggests several \nclear shifts in ancestry. First, in the Middle to Late Bronze Age (1500 bce \nto 1000 bce), we observe a clear shift away from preceding ancestry \noriginally associated with Corded Ware cultures55 (Fig. 3a). Second, \nin the first to fifth century ce, individuals associated with Wielbark \nculture5,12 show an additional strong shift away from the preceding \nBronze Age groups, and can only be modelled with a >75% component \nattributed to the EIA Scandinavian Peninsula. Multiple individuals, \nespecially from earlier Wielbark cemeteries, have approximately 100% ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed3.pdf" + }, + { + "text": "medieval individuals (*P*≪ 1 × 10−32). Instead, the majority of individuals \nfrom medieval Poland can be modelled only as a mixture of ancestries \nrelated to Roman Iron Age Lithuania, which is similar to ancestries of \nindividuals from middle to late Bronze Age Poland (44%, 95% confidence \ninterval 36–51%), an ancestry component related to Hungarian Scyth- \nians or Slovakian La Tène individuals (49%, 95% confidence interval \n41–57%) and potentially a minority component of ancestry related to \nSarmatians from the Caucasus (*P*= 0.13) (Fig. 2c). Four out of twelve \nindividuals from medieval Poland, three of whom are from the late \nViking Age6, carried detectable Scandinavian-related ancestry. Some \nof the ancestry detected in individuals from later medieval Poland may \nhave persisted during the late first millennium ce in the cremating \nportion of the population, but regardless, this points to large-scale \nancestry transformation in medieval Poland (Fig. 3a). Future data could \nshed light on the extent to which this reflects the influence of groups \nspeaking Slavic languages in the region. \n\nIn present-day Slovakia, individuals associated with the Iron \nAge La Tène period appear close to Hungarian Scythians in the two \ndimensions of our MDS analysis, and are modelled as a mixture of \ncentral and eastern European ancestry. However, a first-century ce \nburial of a 50–60-year-old woman from Zohor is modelled only with \nScandinavian-related ancestry, providing evidence of ancestry related \nto the Scandinavian EIA appearing southwest of the range of the Wiel- \nbark archaeological complex5,57 (Fig. 3b). Later early medieval individu- \nals from Slovakia have partial Scandinavian-related ancestry, providing \nevidence for the integration between expanding and local groups. ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed3.pdf" + }, + { + "text": "**Fig. 3 | Time transects across six geographical regions in Europe.**\n**a**–**f**, Ancestry change visualized over a time transect spanning from the Bronze \nAge to the present day in Poland (**a**), southeastern Europe (**b**), central Europe \n(**c**), Italy (**d**), Britain and Ireland (**e**) and Scandinavia (**f**). The maps show sample \nlocations of all available ancient genomes with at least 0.5× coverage from these regions (Supplementary Table 1). Their ancestry is shown on the same \nMDS model as in Fig. 2a for each time period. For each geographic region, \nthe early medieval period is highlighted in orange and the area in the MDS \ncorresponding to Scandinavian and central European ancestries is highlighted \nin an orange box. ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed3.pdf" + }, + { + "text": "Ancient genome sequencing has revolutionized our ability to recon- \nstruct expansions, migrations and admixture events in the ancient past \nand understand their impact on human genetic variation today. How- \never, tracing history using genetic ancestry has remained challenging, \nparticularly in historical periods for which the richest comparative \ninformation from history and archaeology often exists. This is because \nancestries in many geographical regions are often so similar as to be \nstatistically indistinguishable with current approaches. One example is \nnorthern and central Europe since the start of the Iron Age around 500 \nbce, a period for which many long-standing questions remain, such as \nthe nature of large-scale patterns of human migration during the fourth \nto sixth centuries ce, their impact on the Mediterranean world and later \npatterns of human mobility during the Viking Age (around 750–1050 ce). \nSeveral recent studies have documented substantial mobility and \ngenetic diversity in these time periods, suggesting stable population \nstructure despite high mobility5, and have revealed genetic variation \nin Viking Age Scandinavia6–8, early medieval England3,9, early medieval \nHungary10,11 and Iron Age and medieval Poland12. However, previous \nstudies mostly used large modern cohorts to study ancestry change \nthrough time and space. This is because the differentiation between \nIron Age groups in central and northern Europe is an order of magnitude \nlower (fixation index (*F*ST) = 0.1–0.7%; Extended Data Fig. 1) than, for \nexample, the more commonly studied hunter-gatherer, early farmer \nand steppe-pastoralist groups that shaped the ancestry landscape of ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed3.pdf" + }, + { + "text": "In southern Germany, the genetic ancestry of individuals from \nearly medieval Bavaria probably associated with the historical \nGermanic-language-speaking Baiuvarii59 cannot be modelled as deriv- \ning ancestry solely from earlier groups in Iron Age central Germany \n(*P*≪ 1 × 10−36). The Baiuvarii probably appeared in the region in the \nfifth century ce59, but their origins remain unresolved. Our current \nbest model indicates a mixture with ancestry derived from EIA Pen- \ninsular Scandinavia and central Europe, suggesting an expansion of \nScandinavian-related ancestry producing a regional ancestry shift \n(Figs. 2c and 3c). \n\nIn Italy, southward expansions of northern and central European ances- \ntries appear by the Late Antiquity (approximately fourth century ce), \nwhere a clear diversification of ancestry can be observed compared \nwith preceding time periods (Fig. 3d). However, no individuals with \nnear 100% Scandinavian ancestry can be observed in the sampling \ndata available so far. \n\nIn Britain, the ancestries of Iron Age and Roman individuals form a \ntight cluster in our MDS analysis (Fig. 3e), shifted relative to available \npreceding Bronze Age individuals from Ireland and Orkney, and adja- \ncent to, but distinct from, available individuals in Iron Age and Roman \ncentral Europe. However, two first- to second-century ce burials from a \nRoman military fortress site in Austria (Klosterneuburg)5 carry ancestry \nthat is currently indistinguishable from Iron Age or Roman popula- \ntions of Britain, to the exclusion of other groups (qpWave cladality \n*P*= 0.11). One option is that they had ancestry from Britain; alternatively, \ncurrently unsampled populations from western continental Europe \ncarried ancestries similar to Iron Age southern Britain. ", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed3.pdf" + }, + { + "text": "These patterns are consistent with northward expansion of ancestry, \npotentially starting before the Viking Age, into the Jutland peninsula \nand Zealand island towards southern Sweden. The geographical ori- \ngin of this ancestry is currently difficult to discern, as the available \nsamples from Iron Age central Europe remain sparse. The timing \nof this expansion is constrained only by the samples available: this \nancestry is not observed in individuals from the Copenhagen area of \nDenmark (around 100 ce–300 ce)6, an individual from the southern tip \nof Sweden (around 500 ce)16, individuals from the Sandby Borg mas- \nsacre site on Öland in present-day Sweden (around 500 ce)7 and 31 indi- \nviduals from the mid-eighth century Salme ship burials in present-day \nEstonia (Extended Data Fig. 9), who probably originated in central \nSweden6. Therefore, this ancestry transformation most likely post- \ndated these individuals in each particular region and mostly occurred \nin the second half of the first millennium ce. \n\nTo assess the full extent of the impact of this ancestry influx into \nScandinavia, we next aimed to understand the ancestry of individu- \nals in Scandinavia during the Viking Age. Previous studies have sug- \ngested that there was a diversity of ancestries in Scandinavia during this \nperiod6,7,65, due to increased maritime mobility, but have not reported \nper-individual ancestry estimates based on preceding ancestry. We \nanalysed each individual’s ancestry using a rotational qpAdm scheme \n(Fig. 4a, Extended Data Fig. 9 and Supplementary Table 4), which \nshowed increased power in distinguishing models when restricted \nto recent coalescences with Twigstats (more than 80% of accepted \none-source models in Twigstats were also accepted one-source models \nusing all SNPs, compared with less than 17% for the inverse). ", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed3.pdf" + }, + { + "text": "**Influx into pre-Viking Age Scandinavia**\nIn EIA Scandinavia (<500 ce), we find evidence for broad genetic homo- \ngeneity. Specifically, individuals from Denmark (100 ce–300 ce) were \nindistinguishable from contemporary people in the Scandinavian Pen- \ninsula (Fig. 2c). However, we observe a clear shift in genetic ancestry \nalready in the eighth century ce (Late Iron Age/early Viking Age) on \nZealand (present-day Denmark) for which a 100% EIA ancestry model \nis rejected (*P*= 1 × 10−17 using Twigstats;*P*= 7.5 × 10−4 without). This \nshift in ancestry persists among later Viking Age groups in Denmark, \nwhere all groups are modelled with varying proportions of ancestry \nrelated to Iron Age continental groups in central Europe (Figs. 3f \nand 4c). A non-parametric MDS of Viking Age individuals suggests \nthat variation between individuals forms a cline spanning from the \nEIA Scandinavian Peninsula individuals to ancestry characteristic of \ncentral Europe (Fig. 4e). The observed shift in ancestry in Denmark \ncannot be confounded by potentially earlier unknown gene flow into \nIron Age source groups in Austria, France and Germany, but such gene \nflow could affect the exact ancestry proportions. ", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed3.pdf" + }, + { + "text": "Interestingly, we detect ancestry from Bronze and Iron Age sources \nfrom Eastern Europe (present-day Lithuania and Poland), concentrated \nin southeastern parts of Sweden, particularly the island of Gotland \n(14 individuals; Fig. 4a). This is consistent with previous genetic \nstudies6,7. We find that this ancestry is enriched in male individuals \n(Extended Data Fig. 7d), suggesting male-biased mobility and/or burial. \nThe closest match tends to be Roman Iron Age Lithuanian genomes \nassociated with Balts, which would be consistent with mobility across \nthe Baltic Sea, but we caution that the geographical representation of \navailable genomes is still limited. \n\n**Online content**\nAny methods, additional references, Nature Portfolio reporting summa- \nries, source data, extended data, supplementary information, acknowl- \nedgements, peer review information; details of author contributions \nand competing interests; and statements of data and code availability \nare available at https://doi.org/10.1038/s41586-024-08275-2. \n\n**Viking Age expansion from Scandinavia**\nTraditionally, historical perspectives on what is now often referred \nto as the Viking diaspora placed an emphasis on the movements and \nsettlements of population groups from various parts of Scandinavia67. \nOur explorative MDS analysis again indicates mixed ancestries related \nto the Scandinavian EIA, with regional differences that point to varied \nlocal admixture (Fig. 4e and Extended Data Fig. 10). ", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed3.pdf" + }, + { + "text": "ancestry related to EIA Scandinavian Peninsula (Fig. 2c). The Wielbark \narchaeological complex has been linked to the later Chernyakhov cul- \nture to the southeast and to early Goths, an historical Germanic group \nthat flourished in the second to fifth centuries ce56. Our modelling \nsupports the idea that some groups that probably spoke Germanic \nlanguages from Scandinavia expanded south across the Baltic into \nthe area between the Oder and Vistula rivers in the early centuries ce, \nalthough whether these expansions can be linked specifically with \nhistorical Goths is still debatable. Moreover, since a considerable \n\nproportion of Wielbark burials during this period were cremations, \nthe possible presence of individuals with other ancestries cannot be \nstrictly rejected if they were exclusively cremated (and are therefore \ninvisible in the aDNA record). \n\nA previous study could not reject continuity in ancestry from the \nWielbark-associated individuals to later medieval individuals from \na similar region12. With the improved power of Twigstats, models of \ncontinuity are strongly rejected, with no one-source model of any pre- \nceding Iron Age or Bronze Age group providing a reasonable fit for the ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed3.pdf" + }, + { + "text": "Many known and unknown historical events have remained below detection thresholds \nof genetic studies because subtle ancestry changes are challenging to reconstruct. \nMethods based on shared haplotypes1,2 and rare variants3,4 improve power but are not \nexplicitly temporal and have not been possible to adopt in unbiased ancestry models. \nHere we develop Twigstats, an approach of time-stratified ancestry analysis that can \nimprove statistical power by an order of magnitude by focusing on coalescences in \nrecent times, while remaining unbiased by population-specific drift. We apply this \nframework to 1,556 available ancient whole genomes from Europe in the historical \nperiod. We are able to model individual-level ancestry using preceding genomes to \nprovide high resolution. During the first half of the first millennium ce, we observe \nat least two different streams of Scandinavian-related ancestry expanding across \nwestern, central and eastern Europe. By contrast, during the second half of the first \nmillennium ce, ancestry patterns suggest the regional disappearance or substantial \nadmixture of these ancestries. In Scandinavia, we document a major ancestry influx \nby approximately 800 ce, when a large proportion of Viking Age individuals carried \nancestry from groups related to central Europe not seen in individuals from the early \nIron Age. Our findings suggest that time-stratified ancestry analysis can provide a \nhigher-resolution lens for genetic history. ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed3.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed3.pdf", + "query": "How many clusters has the Scandinavian peninsula been divided into thanks to Twigstats?", + "target_page": 12, + "target_passage": "This approach results in two clusters in the Scandinavian Penin- sula, approximately separating northern from southern Scandinavia", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Conclusions**\nOur approach, Twigstats, transfers the power advantage of haplotype- \nbased approaches to a fully temporal framework, which is applica- \nble to*f*-statistics and enables previously unavailable unbiased and \ntime-stratified analyses of admixture. We demonstrated that Twigstats \nenables fine-scale quantitative modelling of ancestry proportions, \nrevealing wide-ranging ancestry changes that affect northern and \ncentral Europe during the Iron, Roman and Viking ages. We reveal evi- \ndence of the southward and/or eastward expansion of individuals who \nprobably spoke Germanic languages and who had Scandinavian-related \nancestry in the first half of the first millennium ce. We note that \n‘Scandinavian-related’ in this context relates to the ancient genomes \navailable, and so it is entirely possible that these processes were driven, \nfor example, from regions in northern-central Europe. This could be \nconsistent with the attraction of the greater wealth, which tended to \nbuild up among Rome’s immediate neighbours and may have played \na major role in vectors of migration internal to communities in Europe \nwho lived beyond the Roman frontier52. Later, patterns of gene flow \nseem to have turned northwards, with the spread of Iron Age Central \nEurope-related ancestry into Scandinavia. Overall, our approach can \nbe used for the reconstruction of new high-resolution genetic histories \naround the world. ", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed3.pdf" + }, + { + "text": "Scandinavia \n\n", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed3.pdf" + }, + { + "text": "**Extended Data Fig. 5 | Three examples of applying Twigstats. a**Fine-scale \npopulation structure simulation emulating ref. 39 (see Methods for simulation \ndetails). First two principal components are computed from pairwise outgroup \n*f*3 statistics on the genotypes directly and on Relate trees inferred from the \n50 target individuals. Labels in plots show the average coordinates of members \nof that population. For each panel, we calculate a separation index (SI) as in39, \nwhich we define as the proportion of individuals for which the closest \nindividual (by the Euclidean distance in PC space) is in the same population. \n**b**, Fine-scale genetic structure in Neolithic Europe quantified using an MDS \ncalculated on a symmetric matrix that contains all pairwise outgroup*f*3 \nstatistics (outgroup: YRI) between individuals. These are either calculated \ndirectly on genotypes or calculated using Twigstats on Relate genealogies \nwith a cutoff of 1000 generations. Individuals were selected by filtering based \non Steppe and Western Hunter-gatherer ancestry (Methods).**c**, Admixture \nproportions inferred using qpAdm with three distal sources of Western ", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed3.pdf" + }, + { + "text": "c \n1.00 \nDenmark_EVA(3) Funen_VA(12) \n\ny \nr \nt \ns \ne \nc \nn \na \nd \ne \nt \na \ne \nr \n- \nl \na \nt \nn \ne \nn \ni \nt \nn \no \nC \n\n1 1 2 2 1 \n0.75 \n1.0 \n\nn \no \ni \nt \nr \no \np \no \nr \np \ny \nr \nt \ns \ne \nc \nn \nA \n\n0.5 \n0.50 \nl \n0 \n1 \n3 2 \n3 \n. . \n1.0 \n0.25 \n0.5 \n0 \n0 \n7 \n1 7 \n5 \n1 \n. \n7 \n1 \n. \n1 \n6 \n. . \n\nScandinavian Peninsula Central Europe ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed3.pdf" + }, + { + "text": "**Extended Data Fig. 9 | Ancestry models of Viking Age individuals in**\n**Scandinavia. a**, MDS of each Scandinavian Viking group plotted on top of \npreceding Iron age and Roman individuals.**b**, All accepted qpAdm models using \nTwigstats-1000 for every Scandinavian Viking individual in Denmark, Sweden, \nand Norway, computed in a rotational qpAdm with source groups identical to \nFig. 4. We only retain models with feasible admixture proportions, standard \nerrors of <0.25, and show models with 1 source and a p-value greater than 0.01 \nor otherwise with 2 sources and a p-value greater than 0.01. If several models \nsatisfy p > 0.05, we show all such models, otherwise we select the model with \nthe largest p-value. The -log10 p-values are shown to the left of each model. \nWe combine models involving related sources, if they exist, by averaging their \nrespective admixture proportions, standard errors, and p-values. We plot one \nstandard error. ", + "page_start": 20, + "page_end": 20, + "source_file": "pubmed3.pdf" + }, + { + "text": "These patterns are consistent with northward expansion of ancestry, \npotentially starting before the Viking Age, into the Jutland peninsula \nand Zealand island towards southern Sweden. The geographical ori- \ngin of this ancestry is currently difficult to discern, as the available \nsamples from Iron Age central Europe remain sparse. The timing \nof this expansion is constrained only by the samples available: this \nancestry is not observed in individuals from the Copenhagen area of \nDenmark (around 100 ce–300 ce)6, an individual from the southern tip \nof Sweden (around 500 ce)16, individuals from the Sandby Borg mas- \nsacre site on Öland in present-day Sweden (around 500 ce)7 and 31 indi- \nviduals from the mid-eighth century Salme ship burials in present-day \nEstonia (Extended Data Fig. 9), who probably originated in central \nSweden6. Therefore, this ancestry transformation most likely post- \ndated these individuals in each particular region and mostly occurred \nin the second half of the first millennium ce. \n\nTo assess the full extent of the impact of this ancestry influx into \nScandinavia, we next aimed to understand the ancestry of individu- \nals in Scandinavia during the Viking Age. Previous studies have sug- \ngested that there was a diversity of ancestries in Scandinavia during this \nperiod6,7,65, due to increased maritime mobility, but have not reported \nper-individual ancestry estimates based on preceding ancestry. We \nanalysed each individual’s ancestry using a rotational qpAdm scheme \n(Fig. 4a, Extended Data Fig. 9 and Supplementary Table 4), which \nshowed increased power in distinguishing models when restricted \nto recent coalescences with Twigstats (more than 80% of accepted \none-source models in Twigstats were also accepted one-source models \nusing all SNPs, compared with less than 17% for the inverse). ", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed3.pdf" + }, + { + "text": "We additionally perform non-parametric multidimensional scaling \n(MDS) on outgroup-*f*3 statistics44 computed using Twigstats, the results \nof which do not depend on any modelling assumptions and which show \nincreased resolution compared with conventional outgroup-*f*3 sta- \ntistics (Fig. 2a,b, Extended Data Fig. 6 and Supplementary Table 2). \nEncouragingly, the MDS model supports regional fine-scale genetic \nstructures reflected in our source groups, such as the separation of \npredominantly Norwegian and northern Swedish EIA individuals from \nsouthern Peninsular Scandinavia (Fig. 2a); this relationship is not \ndetected without Twigstats. In this MDS analysis, we note a close affinity \nof wide-ranging individuals from Portugal, France, Germany, Austria \nand Britain. We hypothesize that this corresponds to areas associated \nwith the Celtic-speaking world, and that their close genetic affinity is \ndue to earlier expansions. Sparse sampling limits our understanding \nof the full extent of regional ancestry variation in central Europe and \nsome other regions, but the continental ancestries differentiated in \nthe MDS model suggests that major ancestry variation across Europe \nin this period is relatively well captured. ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed3.pdf" + }, + { + "text": "We investigated regional differences in non-local ancestry across \nScandinavia. In Denmark, 25 out of 53 Viking Age individuals had detect- \nable (*z-*score > 1) central European-related ancestry (CentralEurope. \nIronRoman or Portugal.IronRoman) in their best accepted qpAdm \nmodels. In Sweden 20 out of 62 individuals had detectable central \nEuropean-related ancestry, concentrated almost entirely in southern \nregions (Fig. 4a,d). By contrast, in Norway, this ancestry was observed \nin only 2 out of 24 individuals, indicating a wide-ranging impact of \nincoming ancestry in southern Scandinavia and suggesting more \n\nNature | Vol 637 | 2 January 2025 |**123**", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed3.pdf" + }, + { + "text": "Scandinavian Peninsula EIA \nRegular f3-statistics 0.002 \n\nEngland Diffield Terrace \nDenmark IA \nBritain \n\n0 1 \n\nn \no \ns \nn \ne \nm \nD \n\ni \n\nCentral \nEurope \n\nEarly medieval, \nincluding Wielbark, \nBaiuvarii, \nLongobards, \nEngland earlyMED, \nSlovakia earlyMED \n\nPortugal \n–0.002 \n\nItaly \n\nTwigstats f3-statistics \n–0.004 \n0.002 0.003 –0.002 –0.001 0 0.001 0.004 \nDimension 2 \n\nAnatolia_EBA \nAustria_Klosterneuburg_Roman \nBaiuvari_earlyMED \nBritain.lronRoman \nCentraIEurope.IronRoman(l) \nCentraIEurope.IronRoman(Il) \nCentraIEurope.IronRoman(IIl) \nCordedWare_EBA \nCroatia.IronRoman_oNorthEurope \nDenmark_BA Denmark_EVA \nDenmark_IA \nEngland_earlyMED_highCNE \nEngland_earlyMED_lowCNE \nEngland_earlyMED_midCNE \nEngland.Driffield.Terrace.Scandinavia \nHungary_earlyMED(I) \nHungary_earlyMED(II) \nHungarySlovakia.lronRoman \nIrelandOrkney_BA ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed3.pdf" + }, + { + "text": "individuals form a clade with respect to reference groups. The reason \nwhy this is a principled approach despite the 1000GP groups post-dating \nthe ancient individuals is that if a group of ancient individuals are truly \nhomogeneous, they will be so also with respect to later individuals. \n\n**Code availability**\nTwigstats is freely available under an MIT licence through GitHub \n(https://github.com/leospeidel/twigstats), and detailed documenta- \ntion, as well as example data, is available at https://leospeidel.github. \nio/twigstats/. The code has also been deposited at Zenodo (https:// \nzenodo.org/records/13833120)76. All scripts to reproduce simulations, \nand to run Relate on imputed ancient genomes, and downstream \nanalyses, including computation of*f*-statistics and running qpAdm \nmodels, are available through GitHub (https://github.com/leospeidel/ \ntwigstats_paper). \nWe then define clusters by running UPGMA (unweighted pair group \nmethod with arithmetic mean) on −log10[*P*values] obtained from \nqpwave between all pairs of individuals and cut the resulting dendro- \ngram at a height corresponding to a*P*value of 0.01. We then further \nsubdivide clusters by requiring all samples to be within 500 years of \nthe mean cluster age. ", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed3.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed3.pdf", + "query": "What are the cultures with which the Wielbark culture is associated?", + "target_page": 4, + "target_passage": "linked to the later Chernyakhov cul- ture to the southeast and to early Goths", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "ancestry related to EIA Scandinavian Peninsula (Fig. 2c). The Wielbark \narchaeological complex has been linked to the later Chernyakhov cul- \nture to the southeast and to early Goths, an historical Germanic group \nthat flourished in the second to fifth centuries ce56. Our modelling \nsupports the idea that some groups that probably spoke Germanic \nlanguages from Scandinavia expanded south across the Baltic into \nthe area between the Oder and Vistula rivers in the early centuries ce, \nalthough whether these expansions can be linked specifically with \nhistorical Goths is still debatable. Moreover, since a considerable \n\nproportion of Wielbark burials during this period were cremations, \nthe possible presence of individuals with other ancestries cannot be \nstrictly rejected if they were exclusively cremated (and are therefore \ninvisible in the aDNA record). \n\nA previous study could not reject continuity in ancestry from the \nWielbark-associated individuals to later medieval individuals from \na similar region12. With the improved power of Twigstats, models of \ncontinuity are strongly rejected, with no one-source model of any pre- \nceding Iron Age or Bronze Age group providing a reasonable fit for the ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed3.pdf" + }, + { + "text": "Ireland \nPoland_Wielbark(I) \nPoland_Wielbark(II) \nIsle of Man \nPoland_Wielbark(III) \n\nPolandUkraine_MLBA(I) \nPolandUkraine_MLBA(II) \nOrkney_VA \nPortugal.lronRoman \nRussia_Sarmatian \nSaami \n\nScandinavian_Peninsula_EIA(I) \nScandinavian_Peninsula_EIA(II) \n\nSlovakia_Zohor_Germanic_Roman \nSlovakia.MigrationPeriod \nSlovenia.lronRoman \nOxford_VA Slovenia.Roman.oNorthEurope ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed3.pdf" + }, + { + "text": "\nII \nWielbark, Poland \nI ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed3.pdf" + }, + { + "text": "Poland_Middle_Ages(I) \nPoland_Middle_Ages(II) \nPoland_Wielbark(I) \nPoland_Wielbark(II) \nPoland_Wielbark(III) \nPolandUkraine_MLBA(I) \nPolandUkraine_MLBA(II) \nPortugal.lronRoman \nRussia_Sarmatian \nSaami ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed3.pdf" + }, + { + "text": "**Expansions of Scandinavian-like ancestry**\nWe assembled time transects using available aDNA data across several \ngeographical regions in Europe, and infer their ancestry using a model \nwith the EIA or Roman Iron Age sources previously defined (shown in \nFig. 2a). Our modelling provides direct evidence of individuals with \nancestry originating in northern Germany or Scandinavia appearing \nacross Europe as early as the first century ce (Figs. 2b,c and 3 and Sup- \nplementary Table 3). \n\nIn the region of present-day Poland, our analysis suggests several \nclear shifts in ancestry. First, in the Middle to Late Bronze Age (1500 bce \nto 1000 bce), we observe a clear shift away from preceding ancestry \noriginally associated with Corded Ware cultures55 (Fig. 3a). Second, \nin the first to fifth century ce, individuals associated with Wielbark \nculture5,12 show an additional strong shift away from the preceding \nBronze Age groups, and can only be modelled with a >75% component \nattributed to the EIA Scandinavian Peninsula. Multiple individuals, \nespecially from earlier Wielbark cemeteries, have approximately 100% ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed3.pdf" + }, + { + "text": "3.3 \n2 \n\nIron Age, Denmark \n(first to third century CE) \n\n3 \nFriesland, the Netherlands \n(fifth to sixth century CE) \n\nII I III \n13 \n\n6 \nMedieval Poland (tenth \nto eleventh century CE) \nWielbark, Poland \n(first to third century CE) \n3 \n\nLa Tène, Slovakia \n(first century BCE \nto first century CE) \n\n2 \nBaiuvarii \n(fifth century CE) \n1 \n9 \nZohor, Slovakia \n(first to second \ncentury CE) \nLongobard \n(sixth century CE) \nI II 7 \n\nEarly medieval \nSlovakia \n(third to fifth century CE) \n\n4.7 ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed3.pdf" + }, + { + "text": "Nearby, in present-day Hungary, we observe Scandinavian-related \nancestry components in several burials dating to the sixth century \nce associated with Longobards (Longobard_earlyMED(I))10 (Fig. 2c). \nThis is consistent with the original study10, which reported affinity to \npresent-day groups from northwestern Europe (GBR, CEU and FIN in \nthe 1000 Genomes Project (1000GP))10 but which we can resolve with ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed3.pdf" + }, + { + "text": "**Clustering using qpwave.**To overcome challenges with hand-curating \nsource groups used in qpAdm modelling, we follow ref. 5 and run \nqpwave using Twigstats between pairs of ancient individuals. We use \nHan Chinese individuals from Beijing and five European populations \nfrom the 1000GP as reference groups. This approach tests whether two ", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed3.pdf" + }, + { + "text": "\n\nARTS & \nCULTURE ", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "In southern Germany, the genetic ancestry of individuals from \nearly medieval Bavaria probably associated with the historical \nGermanic-language-speaking Baiuvarii59 cannot be modelled as deriv- \ning ancestry solely from earlier groups in Iron Age central Germany \n(*P*≪ 1 × 10−36). The Baiuvarii probably appeared in the region in the \nfifth century ce59, but their origins remain unresolved. Our current \nbest model indicates a mixture with ancestry derived from EIA Pen- \ninsular Scandinavia and central Europe, suggesting an expansion of \nScandinavian-related ancestry producing a regional ancestry shift \n(Figs. 2c and 3c). \n\nIn Italy, southward expansions of northern and central European ances- \ntries appear by the Late Antiquity (approximately fourth century ce), \nwhere a clear diversification of ancestry can be observed compared \nwith preceding time periods (Fig. 3d). However, no individuals with \nnear 100% Scandinavian ancestry can be observed in the sampling \ndata available so far. \n\nIn Britain, the ancestries of Iron Age and Roman individuals form a \ntight cluster in our MDS analysis (Fig. 3e), shifted relative to available \npreceding Bronze Age individuals from Ireland and Orkney, and adja- \ncent to, but distinct from, available individuals in Iron Age and Roman \ncentral Europe. However, two first- to second-century ce burials from a \nRoman military fortress site in Austria (Klosterneuburg)5 carry ancestry \nthat is currently indistinguishable from Iron Age or Roman popula- \ntions of Britain, to the exclusion of other groups (qpWave cladality \n*P*= 0.11). One option is that they had ancestry from Britain; alternatively, \ncurrently unsampled populations from western continental Europe \ncarried ancestries similar to Iron Age southern Britain. ", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed3.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0806.pdf", + "query": "What do the timescales during which high-amplitude flaring events occur in blazars indicate?", + "target_page": 1, + "target_passage": "that much of the en- ergy is being produced deep within the jet on small, sub-parsec scales", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\n**1. INTRODUCTION**\n\nThe timescales on which high-amplitude flaring \nevents occur in blazars indicate that much of the en- \nergy is being produced deep within the jet on small, \nsub-parsec scales [1, 2]. Understanding if/how emis- \nsion differs between blazar subclasses (i.e., BL Lacs \nobjects and flat-spectrum radio quasars (FSRQs)) \nmay offer important insight into the similarity be- \nfurthermore, can provide con- \ntween blazars and, \nstraints on the formation and acceleration of the jets \nthemselves. \n\n**2. SMA BLAZARS**\n\nThe Submillimeter Array [4] consists of eight 6 m \nantennas located near the summit of Mauna Kea. The \nSMA is used in a variety of baseline configurations \nand typically operates in the 1mm and 850µm win- \ndows, achieving spatial resolution as fine as 0.25” at \n850µm. The sources used as phase calibrators for the \narray are compiled in a database known as the SMA \nCalibrator List2 [5]. Essentially a collection of bright \nobjects (stronger than 750 mJy at 230 GHz and 1 Jy \nat 345 GHz), these sources are monitored regularly, \nboth during science observations and dedicated ob- \nserving tracks. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + }, + { + "text": "We follow the method of Kelly et al. [9], who model \nquasar optical light curves as a continuous time first- \norder autoregressive process (CAR(1)) in order to ex- \ntract characteristic time scales and the amplitude of \nflux variations. Although flaring behavior is not typi- \ncally thought of as an autoregressive process, we find \nthat the light curves are well-fit by the models and \ntherefore adopt the method here to study blazar sub- \nmillimeter light curves. \n\nFigure 3: Characteristic timescale (days) versus \nsubmillimeter luminosity (erg s−1) in the 1mm band for \nall objects. Physically, τ represents a “relaxation \ntimescale”, the timescale beyond which events are no \nlonger correlated. \n\nThe CAR(1) process is described by a stochastic \ndifferential equation [9], \n\n√ \n\n1 \nτ \ndS(t) = S(t) dt + σ dt (cid:15) (t) + b dt, (3) \n\nboth classes extending across a large range in τ . Be- \ncause of the uncertainty for objects with shorter char- \nacteristic timescales, it is hard to draw any definitive \nconclusions about the differences between classes. It \nis important to note that τ does not necessarily rep- \nresent a flaring timescale, which is a behavior that \ntypically operates on a scale of ∼10–100 days and not \non the longer timescales we see in τ . \n\n(4) ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0806.pdf" + }, + { + "text": "• BL Lacs and FSRQs do not exhibit significant \ndifferences in amplitude of submillimeter vari- \nability or characteristic timescale, but our sam- \nple of BL Lacs may be dominated by high- \npeaked BL Lacs (HBLs), which exhibit obser- \nvational similarities with FSRQs. \n\nLacs and FSRQs. One avenue for exploring this dif- \nference is to monitor changing submillimeter energy \nspectral index and the ratio of γ-ray to submillime- \nter luminosity as functions of time. The full mean- \ning of the results of our autoregressive method is not \nyet clear, and will require better-sampled blazar light \ncurves and the comparison between τrest with physical \ntimescales such as the synchrotron cooling timescale. \nThese analyses would allow us to place constraints \non the processes occurring near the base of the jet in \nblazars and further understand the intimate connec- \ntion between them. \n\n• Blazar submillimeter light curves are consistent \nwith being produced by a single process that ac- \ncounts for both high and low states, with char- \nacteristic timescales 10 < τrest < 500 days. \n\n• The blazars detected by Fermi have synchrotron \npeaks at higher frequencies, regardless of sub- \nmillimeter luminosity. ", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0806.pdf" + }, + { + "text": "We present multi-epoch observations from the Submillimeter Array (SMA) for a sample of 171 bright blazars, \n43 of which were detected by Fermi during the first three months of observations. We explore the correlation \nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special \nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de- \ntermined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), \nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate \nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands \nduring the months August–October 2008. The submillimeter light curves are modeled as first-order continuous \nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ- \nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. \nAll of the the light curves are consistent with being produced by a single process that accounts for both low \nand high states, and there is additional evidence that objects may be transitioning between blazar class during \nflaring epochs. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + }, + { + "text": "The motivation for observing blazars in the sub- \nmillimeter is to study behavior close to the central \nengine, where the jet material is presumably still be- \ning accelerated. The separate emission processes that \ncontribute to overall SED may present differently in \nBL Lacs and FSRQs, allowing us to understand the \nsimilarities and differences between blazar types. We \nhave investigated these differences between objects in \nterms of submillimeter behavior and, in conclusion, \nfind that \n\n• The SMA blazars exhibit submillimeter energy \nindexes that follow the spectral se- \nspectral \nquence interpretation of blazars. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0806.pdf" + }, + { + "text": "In general, we find that in the submillimeter, we \nare observing these blazars at or near the peak of the \nsynchrotron component (αS ∼ 0), but that Fermi - \ndetected sources have more negative energy spectral \nindices overall than Fermi -nondetected sources. \nIn \nFigure 4, we see that while the majority of Fermi \nblazars are observed on the rising part of the syn- \nchrotron component (at lower energies than the peak), \nall of the objects have very steeply falling γ-ray energy \nspectral indexes, putting the γ-ray peak at lower en- \nergies than the observed Fermi band. Knowing that \nwe are not observing the synchrotron and γ-ray com- \nponents at analagous points in the spectrum may al- \nlow us to better understand the magnetic field in the \nparsec-scale jet region and the population of external \nphotons that is being upscattered to γ-rays. \n\nThis method yielded some surprising results. \nIn \nFigure 3, we see that the BL Lacs and FSRQs exhibit \nvirtually no difference in characteristic timescale, with ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0806.pdf" + }, + { + "text": "tion of correlated VHE and X-ray flux variability, as \nwell as correlated spectral hardening in both the VHE \nand X-ray bands. The VHE MWL observations were \nperformed in both ”quiescent” and flaring states for \nsome of the observed blazars. For the observed HBL \nobjects, the SEDs can be well described by a simple \nSSC model in both high and low states. However, an \nadditional external Compton component is necessary \nto adequately fit the SEDs of the IBL objects. \n\norating institutions in the construction and operation \nof the instrument. \n\n**References**\n\nThe Fermi-LAT is already having a significant im- \npact on the blazar KSP. In future seasons, the VER- \nITAS blazar discovery program will focus its dis- \ncovery program on hard-spectrum blazars detected \nby Fermi-LAT, and will likely have a greater focus \non high-risk/high-reward objects at larger redshifts \n(0.3 < z < 0.7). \nIn addition, the number of VHE \nblazars studied in pre-planned MWL campaigns will \nincrease as data from the Fermi-LAT will be publicly \navailable. \nIn particular, the extensive pre-planned \nMWL campaigns will focus on objects that are note- \nworthy for the impact their data may have on under- \nstanding the EBL. The simultaneous observations of \nblazars by VERITAS and Fermi-LAT will completely \nresolve the higher-energy SED peak, often for the first \ntime, enabling unprecedented constraints on the un- \nderlying blazar phenomena to be derived. ", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0770.pdf" + }, + { + "text": "[10] report that, during its flaring \nepochs, 3C 454.3 transitions from its typical FSRQ \nstate to a more BL Lac-like state, where the syn- \nchrotron component emits much more strongly com- \npared to the γ-ray component than during its “low \nstate”. 3C 454.3, which is the highest submillime- \nter luminosity FSRQ in our sample, would then shift \ndown and to the right in Figure 5 when it enters a \nflaring period. For the first three months of the Fermi \nmission, 3C 454.3 was not flaring, which may explain \nits present location in Figure 5. The three objects for \nwhich there is a type discrepancy between CGRaBS \nand LBAS are all FSRQs (in CGRaBS) and exhibit \n\nSikora et al. \n\neConf C091122 ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0806.pdf" + }, + { + "text": "In equations 3 and 4, τ is called the “relaxation \ntime” of the process S(t) and is identified by the \nbreak in PX (f ). The power spectrum appears flat \nfor timescales longer than this and falls off as 1/f 2 for \ntimescales shorter than the characteristic timescale of \nthe process. **4. CONNECTION WITH GAMMA-RAYS**\n\nTaking the logarithm of the blazar light curve (in \nJy) to be S(t), we adopt τ (in days) as the character- \nistic timescale of variability, after which the physical \nprocess “forgets” about what has happened at time \nlags of greater than τ . The two other relevant pa- \nrameters, σ and µ = b/a, are the overall amplitude \nof variability and the logarithm of mean value of the \nlight curve, respectively. \n\nIn the routine, we construct an autoregressive \nmodel for the light curves for a minimum of 100,000 \niterations and calculate the value of τ from the break \nin the power spectrum in each instance. Due to the \nlimited number of observations in the 850µm band, \nwe performed this autoregressive analysis only for the \n1mm light curves, which typically have more than 10 \npoints per light curve. ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0806.pdf" + }, + { + "text": "More than 50 VHE blazar candidates were observed \nby VERITAS between September 2007 and June 2009. \nThe total exposure on the 49 non-detected candi- \ndates is ∼305 h live time (average of 6.2 h per can- \ndidate). Approximately 55% of the total exposure is \nsplit amongst the 27 observed HBL. The remainder is \ndivided amongst the 8 IBL (26%), 5 LBL (6%), and 9 \nFSRQ (13%). There are no clear indications of signifi- \ncant VHE γ-ray emission from any of these 49 blazars \n[25]. However, the observed significance distribution is \nclearly skewed towards positive values (see Figure 1). \nA stacking analysis performed on the entire data sam- \nple shows an overall excess of 430 γ-rays, correspond- \ning to a statistical significance of 4.8σ, observed from \nthe directions of the candidate blazars. The IBL and \nHBL targets make up 96% of the observed excess. Ob- \nservations of these objects also comprise ∼80% of the \ntotal exposure. An identical stacked analysis of all \nthe extragalactic non-blazar targets observed, but not \nclearly detected (>5σ), by VERITAS does not show \na significant excess (∼120 h exposure). The stacked \nexcess persists using alternate methods for estimating \nthe background at each blazar location, and with dif- \nferent event selection criteria (e.g. soft cuts optimized \nfor sources with ΓVHE > 4). The distribution of VHE \nflux upper limits is shown in Figure 1. These 49 VHE \nflux upper limits are generally the most-constraining \never reported for these objects. ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.0770.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0806.pdf", + "query": "Where is the Submillimeter Array?", + "target_page": 1, + "target_passage": "near the summit of Mauna Ke", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "A systematic study of the submillimeter properties \nof the entire sample of Fermi blazars has yet to be con- \nducted and is one of the primary goals of our work. We \npresent here preliminary analysis of the submillimeter \nproperties of Fermi blazars detected by the Submil- \n1The Submillimeter Array is a joint project between the \nSmithsonian Astrophysical Observatory and the Academia \nSinica Institute of Astronomy and Astrophysics and is funded \nby the Smithsonian Institution and the Academia Sinica. \n2http://sma1.sma.hawaii.edu/callist/callist.html \n\neConf C091122 ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**Submillimeter Variability and the Gamma-ray Connection in Fermi**\n**Blazars**\n\nA. Strom \nUniv. of Arizona, AZ 85721, USA \nA. Siemiginowska, M. Gurwell, B. Kelly \nCfA, MA 02138, USA ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + }, + { + "text": "limeter Array 1 (SMA) at 1mm and 850µm, including \nan investigation of variable behavior and the deter- \nmination of submillimeter energy spectral indices. In \naddition, we consider the connection to the observed \nγ-ray indices and luminosities. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + }, + { + "text": "We present multi-epoch observations from the Submillimeter Array (SMA) for a sample of 171 bright blazars, \n43 of which were detected by Fermi during the first three months of observations. We explore the correlation \nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special \nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de- \ntermined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), \nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate \nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands \nduring the months August–October 2008. The submillimeter light curves are modeled as first-order continuous \nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ- \nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. \nAll of the the light curves are consistent with being produced by a single process that accounts for both low \nand high states, and there is additional evidence that objects may be transitioning between blazar class during \nflaring epochs. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + }, + { + "text": "Figure 5: Ratio of γ-ray luminosity to submillimeter luminosity in the 1mm band. The location of an object in this \nplot should be directly correlated with its blazar “state”, with FSRQs occupying the upper right and BL Lacs the lower \nleft. Flat-spectrum radio quasar 3C 454.3 is the object with the highest submillimeter luminosity in this plot. ", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0806.pdf" + }, + { + "text": "**2.1. Submillimeter Properties**\n\n**3. VARIABILITY ANALYSIS**\n\nSubmillimeter Luminosities. Since we are pri- \nmarily concerned with comparisons to Fermi observa- \ntions, we note that only 129 of the SMA blazars (23 BL \nLacs and 106 FSRQs) were observed by the SMA in \neither band during the three months August-October \n2008. For these objects, submillimeter luminosities \nare calculated in the standard way: \n\n**3.1. Variability Index**\n\nWe roughly characterize the level of variability of \neach source using the variability index from Hovatta \net al. [8]: \n\n(Fmax − σFmax) − (Fmin + σFmin) \n(Fmax − σFmax) + (Fmin + σFmin) \nνobsFobs \n1 + z \nV = (2) \n\nwhere DL is the luminosity distance, νobs is the fre- \nquency of the observed band, and Fobs is the average Figure 2 shows the distribution for the SMA blazars. \nObjects with V ≤ 0 are typically unsuitable for more \n\neConf C091122 ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0806.pdf" + }, + { + "text": "The motivation for observing blazars in the sub- \nmillimeter is to study behavior close to the central \nengine, where the jet material is presumably still be- \ning accelerated. The separate emission processes that \ncontribute to overall SED may present differently in \nBL Lacs and FSRQs, allowing us to understand the \nsimilarities and differences between blazar types. We \nhave investigated these differences between objects in \nterms of submillimeter behavior and, in conclusion, \nfind that \n\n• The SMA blazars exhibit submillimeter energy \nindexes that follow the spectral se- \nspectral \nquence interpretation of blazars. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0806.pdf" + }, + { + "text": "1A VERITAS telescope was relocated during Summer 2009, \nincreasing the array’s sensitivity by a factor ∼1.3. Contemporaneous multi-wavelength (MWL) obser- \n\neConf C091122 ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + }, + { + "text": "[5] M. A. Gurwell, A. B. Peck, S. R. Hostler, M. R. \nDarrah, and C. A. Katz, in From Z-Machines to \nALMA: (Sub)Millimeter Spectroscopy of Galax- \nies, edited by A. J. Baker, J. Glenn, A. I. Harris, ", + "page_start": 5, + "page_end": 5, + "source_file": "1001.0806.pdf" + }, + { + "text": "Figure 4: The γ-ray index versus submillimeter index plane. The blazars fall more steeply in the γ-rays than in the \nsubmillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full SMA sample, \nwhere the blazars are more distributed around αS ∼ 0. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0806.pdf" + } + ] + }, + { + "references": { + "source_file": "1001.0806.pdf", + "query": "How many blazars were observed by the SMA in either band during the three months August-October 2008?", + "target_page": 2, + "target_passage": "only 129 of the SMA blazars", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "We present multi-epoch observations from the Submillimeter Array (SMA) for a sample of 171 bright blazars, \n43 of which were detected by Fermi during the first three months of observations. We explore the correlation \nbetween their gamma-ray properties and submillimeter observations of their parsec-scale jets, with a special \nemphasis on spectral index in both bands and the variability of the synchrotron component. Subclass is de- \ntermined using a combination of Fermi designation and the Candidate Gamma-Ray Blazar Survey (CGRaBS), \nresulting in 35 BL Lac objects and 136 flat-spectrum radio quasars (FSRQs) in our total sample. We calculate \nsubmillimeter energy spectral indices using contemporaneous observations in the 1 mm and 850 micron bands \nduring the months August–October 2008. The submillimeter light curves are modeled as first-order continuous \nautoregressive processes, from which we derive characteristic timescales. Our blazar sample exhibits no differ- \nences in submillimeter variability amplitude or characteristic timescale as a function of subclass or luminosity. \nAll of the the light curves are consistent with being produced by a single process that accounts for both low \nand high states, and there is additional evidence that objects may be transitioning between blazar class during \nflaring epochs. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + }, + { + "text": "] \nE \nH \n. \nh \np \n- \no \nr \nt \ns \na \n[ \n\n**1. INTRODUCTION**\n\nThe timescales on which high-amplitude flaring \nevents occur in blazars indicate that much of the en- \nergy is being produced deep within the jet on small, \nsub-parsec scales [1, 2]. Understanding if/how emis- \nsion differs between blazar subclasses (i.e., BL Lacs \nobjects and flat-spectrum radio quasars (FSRQs)) \nmay offer important insight into the similarity be- \nfurthermore, can provide con- \ntween blazars and, \nstraints on the formation and acceleration of the jets \nthemselves. \n\n**2. SMA BLAZARS**\n\nThe Submillimeter Array [4] consists of eight 6 m \nantennas located near the summit of Mauna Kea. The \nSMA is used in a variety of baseline configurations \nand typically operates in the 1mm and 850µm win- \ndows, achieving spatial resolution as fine as 0.25” at \n850µm. The sources used as phase calibrators for the \narray are compiled in a database known as the SMA \nCalibrator List2 [5]. Essentially a collection of bright \nobjects (stronger than 750 mJy at 230 GHz and 1 Jy \nat 345 GHz), these sources are monitored regularly, \nboth during science observations and dedicated ob- \nserving tracks. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + }, + { + "text": "**2.1. Submillimeter Properties**\n\n**3. VARIABILITY ANALYSIS**\n\nSubmillimeter Luminosities. Since we are pri- \nmarily concerned with comparisons to Fermi observa- \ntions, we note that only 129 of the SMA blazars (23 BL \nLacs and 106 FSRQs) were observed by the SMA in \neither band during the three months August-October \n2008. For these objects, submillimeter luminosities \nare calculated in the standard way: \n\n**3.1. Variability Index**\n\nWe roughly characterize the level of variability of \neach source using the variability index from Hovatta \net al. [8]: \n\n(Fmax − σFmax) − (Fmin + σFmin) \n(Fmax − σFmax) + (Fmin + σFmin) \nνobsFobs \n1 + z \nV = (2) \n\nwhere DL is the luminosity distance, νobs is the fre- \nquency of the observed band, and Fobs is the average Figure 2 shows the distribution for the SMA blazars. \nObjects with V ≤ 0 are typically unsuitable for more \n\neConf C091122 ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0806.pdf" + }, + { + "text": "The motivation for observing blazars in the sub- \nmillimeter is to study behavior close to the central \nengine, where the jet material is presumably still be- \ning accelerated. The separate emission processes that \ncontribute to overall SED may present differently in \nBL Lacs and FSRQs, allowing us to understand the \nsimilarities and differences between blazar types. We \nhave investigated these differences between objects in \nterms of submillimeter behavior and, in conclusion, \nfind that \n\n• The SMA blazars exhibit submillimeter energy \nindexes that follow the spectral se- \nspectral \nquence interpretation of blazars. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0806.pdf" + }, + { + "text": "flux (in erg cm−2 s−1 Hz−1) over the three month pe- \nriod. We adopt a lambda cold dark matter cosmology \nwith values of H0 = 71 km s−1 Mpc−1, ΩM = 0.27, \nand Λ = 0.73. \n\nWe examined submillimeter light curves for all of \nthe SMA blazars, with observations beginning in ap- \nproximately 2003 (see Figure 1). Typically, the 1mm \nband is much more well-sampled in comparison to the \n850m band, but visual inspection reveals that the reg- \nularity and quality of observations vary greatly from \nsource to source. Many of the objects exhibit non- \nperiodic variability, either in the form of persistent, \nlow-amplitude fluctuations or higher amplitude flar- \ning behavior. \nEnergy Spectral Indices. We derive submillime- \nter spectral energy indices from observations quasi- \nsimultaneous with the Fermi observations. To be con- \nsistent with the use of αγ, we define spectral energy in- \ndex as νFν = ν−αS and calculate αS from the average \nof the energy spectral indices over the corresponding \nthree months. We only calculate αS for the 16 objects \n(8 BL Lacs and 35 FSRQs) with observations at both \n1mm and 850µm during this time frame. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0806.pdf" + }, + { + "text": "Figure 4: The γ-ray index versus submillimeter index plane. The blazars fall more steeply in the γ-rays than in the \nsubmillimeter band, where most are, in fact, rising. This LAT-detected sample contrasts with the full SMA sample, \nwhere the blazars are more distributed around αS ∼ 0. ", + "page_start": 3, + "page_end": 3, + "source_file": "1001.0806.pdf" + }, + { + "text": "limeter Array 1 (SMA) at 1mm and 850µm, including \nan investigation of variable behavior and the deter- \nmination of submillimeter energy spectral indices. In \naddition, we consider the connection to the observed \nγ-ray indices and luminosities. ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0806.pdf" + }, + { + "text": "• BL Lacs and FSRQs do not exhibit significant \ndifferences in amplitude of submillimeter vari- \nability or characteristic timescale, but our sam- \nple of BL Lacs may be dominated by high- \npeaked BL Lacs (HBLs), which exhibit obser- \nvational similarities with FSRQs. \n\nLacs and FSRQs. One avenue for exploring this dif- \nference is to monitor changing submillimeter energy \nspectral index and the ratio of γ-ray to submillime- \nter luminosity as functions of time. The full mean- \ning of the results of our autoregressive method is not \nyet clear, and will require better-sampled blazar light \ncurves and the comparison between τrest with physical \ntimescales such as the synchrotron cooling timescale. \nThese analyses would allow us to place constraints \non the processes occurring near the base of the jet in \nblazars and further understand the intimate connec- \ntion between them. \n\n• Blazar submillimeter light curves are consistent \nwith being produced by a single process that ac- \ncounts for both high and low states, with char- \nacteristic timescales 10 < τrest < 500 days. \n\n• The blazars detected by Fermi have synchrotron \npeaks at higher frequencies, regardless of sub- \nmillimeter luminosity. ", + "page_start": 4, + "page_end": 4, + "source_file": "1001.0806.pdf" + }, + { + "text": "J1751+096) which have conflicting classifications be- \ntween Fermi and CGRaBS. Some blazars found in the \ncalibrator list have been studied extensively (e.g., 3C \n279 and 3C 454.3) but the SMA blazars have not been \nstudied collectively. \n\nFigure 2: Variability index for our sample (top: 1mm, \nbottom: 850µm), with FSRQs as the hatched \ndistribution and BL Lacs as the solid distribution. There \nis no signicant difference in the class distributions in \neither band; the “tail” to the left is populated by objects \nwith errors larger than the intrinsic variability. \n\nForty-four of the objects in our total blazar sample \nwere detected by Fermi and can be found in the cata- \nlog of LAT Bright AGN Sources (LBAS) from Abdo et \nal. [7]. J0050-094 has no redshift in either the LBAS \ncatalog or CGRaBS and is not included in our study. \nOf the 43 remaining sources, 14 are BL Lac objects \nand 29 are FSRQs, with 0.03 ≤ z ≤ 2.19. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.0806.pdf" + }, + { + "text": "2009 Fermi Symposium, Washington, D.C., Nov. 2-5 \n\n**VERITAS Observations of Blazars**\n\nW. Benbow for the VERITAS Collaboration \nHarvard-Smithsonian Center for Astrophysics, F.L. Whipple Observatory, PO Box 6369, Amado, AZ 85645, \nUSA ", + "page_start": 0, + "page_end": 0, + "source_file": "1001.0770.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_MRM_2000.pdf", + "query": "How big is the Mermaid fleet?", + "target_page": 12, + "target_passage": "Mermaid operates a fleet of fifteen (15) tugs, workboats and barges, undertaking all forms of offshore activity", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Mermaid operates a fleet of fifteen (15) tugs, workboats and barges, S E A G O I N G O P E R A T I O N S \n\nundertaking all forms of offshore activity including exploration support, supply, survey and berthing \n\nassist. Lower vessel utilisation during the period allowed an acceleration of scheduled maintenance. \n\nTwo tugs, Mermaid Commando and Mermaid Chieftan received extensive refits. In both cases the \n\nwork increased productivity through enhanced bollard pull and consequent earnings. ", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "The Mermaid slipway will rank second in terms of capacity on the western half of the continent. \n\nTenix, Fremantle 8,000 tonne, Mermaid Dampier 2,700 tonne rising to 4,000 tonne, Darwin Ship \n\nRepair 2,500 tonne. The nearest other facilities are Singapore, Adelaide, Port Moresby or Cairns. ", + "page_start": 20, + "page_end": 20, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "vessels engaged in routine offshore logistics tasks operate fully laden with 7.4 m draft which \n\nmeans there will be very few occasions when the largest vessels in the industry have to make a \n\ntide dependent entry or departure through the Mermaid channel. Further the Mermaid Base will \n\nnot suffer operational disadvantages experienced by the adjacent Woodshed Base or nearby \n\nDamper Public Wharf in terms of entry and departure draft restrictions. ", + "page_start": 14, + "page_end": 14, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "**C. QUAY WALL (BERTH 2)**\n\nThe inner berth, Berth 2 has a minimum depth alongside of 5.0 m allowing unrestricted \n\noperation of all the Mermaid fleet, and the majority of other vessels servicing the offshore oil/gas \n\nindustry and mineral ports. This berth will offer excellent weather protection for small and \n\nmedium size vessels. ", + "page_start": 14, + "page_end": 14, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Mermaid has purchased a very large cyclone rated industrial building \n\n\n\nframe which will be sited beside the slipway and tenanted by Mermaid \n\nengineering and companies which will provide ancillary services \n\nrelated to ship repair. \n\n***The Northwest Shelf is a***\n***world scale offshore oil and***\n***gas exploration province.***", + "page_start": 20, + "page_end": 20, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "During 2000 Mermaid Marine formed a M E R M A I D L A B O U R A N D M A N A G E M E N T L I M I T E D \n\nnew business unit Mermaid Labour and Management Limited. The focus of this unit will be \n\nlabour supply and industrial relations management to the marine, offshore construction industry \n\nand onshore resources projects in the NW of Australia. The Directors and Management of the \n\nnew entity are very experienced, well known and regarded by the industry in general. The \n\ncompany has high expectations for Mermaid Labour and Management Limited. ", + "page_start": 23, + "page_end": 23, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Captain Jim Carver, Mermaid’s founder continues to play a significant role in Mermaid’s operations, \n\npaying particular attention to our business at sea. Under 20 years of Jim’s leadership, Mermaid \n\ndeveloped an enviable reputation as a “can do” company, and in our drive for new engineering \n\nexpertise and professionalism, we have no intention of allowing that attitude to be lost. ", + "page_start": 8, + "page_end": 8, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "**F. ONSHORE LAND RECLAMATION.**\n\nLike our neighbours, much of the Mermaid site is below the prescribed storm surge level, or \n\nneeds some degree of earthworks to maximize its value. Currently 8 of the 17 ha of the area is \n\nsuitable for development in its present state. ", + "page_start": 16, + "page_end": 16, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "In February 2000 Mermaid received approval in principle from the Western Australian Minister \n\nfor the Environment for the development of a supply and engineering base at Dampier (Dampier \n\nBase). Since that time a detailed environmental management system has been produced for final \n\napproval and as a guide to daily environmental management and compliance. Refinements to \n\nthe design have proceeded, together with the preparation of bid packages and negotiations with \n\nBanks for project finance. ", + "page_start": 10, + "page_end": 10, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Regardless of industry trends, Mermaid has a need for a Darwin Base to service and care for \n\nMermaid vessels working in the area. Too often vessels have been demobilised to Dampier at the \n\nconclusion of a contract then being required to return to Darwin within days or weeks for \n\nanother assignment. ", + "page_start": 22, + "page_end": 22, + "source_file": "ASX_MRM_2000.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_MRM_2000.pdf", + "query": "What was the budget for the expansion of Dampier Base?", + "target_page": 14, + "target_passage": "a capital budget of $13m", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Work on Dampier B A S E E X P A N S I O N W O R K S A N D E N V I R O N M E N T A L M A N A G E M E N T \n\nBase expansion commenced on 9 October and will be largely complete by June 2001, involving \n\na capital budget of $13m. ", + "page_start": 13, + "page_end": 13, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "The Dampier Base will now comprise:- \n\n**•**\n**•**\n\nAn “all tides” approach channel to a minimum depth of 6 metres \n\nA wharf offering 7.5 metres depth at low tide, featuring a heavy loadout section to \n\naccommodate modules of up to 1500 tonnes to onshore projects on the Burrup Peninsular \n\nand adjacent mining centres. A subsea pipe reel loading facility will encourage the use of \n\nspool ships in the region for deepwater pipelay. On a project by project basis, pipeline \n\nprotection rock dumping, specialist vessel rig up activities and the like will be facilitated, \n\nas will dry and bulk cargo handling, refuelling, watering and all categories of waste \n\nreception. The joint Commonwealth and WA State Government initiative to establish \n\nan integrated industrial estate at Jervoise Bay (south of Perth) serviced by high wide load \n\ncorridors from Perth’s industrial areas will see the heavy capacity wharf playing a strategic \n\nrole in major capital works in the Pilbara, leading to significant cost savings. ", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "In February 2000 Mermaid received approval in principle from the Western Australian Minister \n\nfor the Environment for the development of a supply and engineering base at Dampier (Dampier \n\nBase). Since that time a detailed environmental management system has been produced for final \n\napproval and as a guide to daily environmental management and compliance. Refinements to \n\nthe design have proceeded, together with the preparation of bid packages and negotiations with \n\nBanks for project finance. ", + "page_start": 10, + "page_end": 10, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "The offshore waters and islands adjacent to Dampier, host in excess of 50% of all D A M P I E R B A S E \n\nexploration and development budgets of Australia’s offshore oil and gas industry. The Burrup \n\nPeninsular where the Base is located is the intended site of major new oil, gas, petrochemical and \n\nindustrial mineral processing plants. The Port of Dampier is Australia’s largest Port as measured by \n\ntonnage, but as identified in the 1997 WA Department of Commerce and Trade report, there \n\nremains an urgent need for additional marine support infrastructure. Mermaid is now well advanced \n\nin our plan to satisfy those needs and onshore work was announced to start on the 9th October 2000. ", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Subsequent to years end, the subscription of a further $5 million from Mr Mark Bradley and Clough \n\nEngineering will see an extremely robust balance sheet, with cash on hand approaching $10 million. \n\nAs construction commences at Dampier, a level of project finance will be arranged providing a \n\ncomfortable mix of debt and equity and allowing the retention of a significant cash balance. ", + "page_start": 10, + "page_end": 10, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "**•**\nA slipway initially capable of receiving vessels up to 2,700 tonnes capacity will handle \n\nmost of the 60 vessels currently working in the region, a considerable number, but one \n\nwhich will rise over coming years. First class engineering facilities have been planned \n\nand highly experienced management recruited. Alternative slipways offering \n\ncomparable capacity are only to be found in Darwin or Fremantle, a sea journey of \n\napproximately 1000 miles from this operational region. Australia has emerged as a \n\ncentre of excellence with respect to vessel repair work, the Dampier facility will both \n\nbenefit from and protect that valuable reputation. \n\n**•**\nRehabilitated land for buildings and storage will finally extend over 17 hectares. The \n\nmajor oilfield services company Halliburton, have been attracted to the base as a \n\ntenant and a $1.1m purpose built building is being constructed for their use. \n\nNegotiations are also proceeding with other groups who recognise the unique \n\nadvantages of operating from this strategically positioned Base. Rental income and \n\nassociated revenues such as plant and labour hire will contribute significantly to the \n\noverall economics of the facility. \n\n**•**\nProtected moorings for cyclone shelter will be established inside the breakwater for \n\nlong term lease to local tug operators. The demand arises from serious vessel and crew \n\nsafety considerations. The Dampier Port Authority are reluctant to see the continued \n\nuse of cyclone moorings in the Harbour, not only for safety reasons, but for \n\nenvironmental concerns as well. Oil spills are not acceptable under any circumstances \n\nand will be avoided whatever the cost. Tug owners share similar concerns, but in \n\naddition they need to remain in a position of readiness for crews and equipment to \n\nresume their important functions immediately following a cyclonic event. The number \n\nof specific purpose spread moorings, detailed on the adjacent plan will total 10 in the \n\nfirst phase of construction, a limit which will be assisted by an ability to remove vessels \n\nup to 100 tonnes from the water by wharf crane for tie down on cradles. ", + "page_start": 12, + "page_end": 12, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "***The foreshore of King Bay will be redeveloped as part of the Mermaid Marine Dampier Base Expansion works.***\n\nleased facilities to seven third party vessels and protection for three of our own vessels using this \n\ntechnique by the cyclone season in 2001. ", + "page_start": 16, + "page_end": 16, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "The development of the Company’s Dampier and Broome E N V I R O N M E N T A L R E G U L A T I O N \n\nbases is subject to the approval of the Western Australian Environmental Protection Authority. ", + "page_start": 33, + "page_end": 33, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Management expects to spend between $300 and $400 in capital per MHC site on an annual basis. As with the apartment portfolio, a portion of \nthe MHC capital is considered maintenance capital and a portion is value enhancing. Management estimates that $100 per unit is maintenance \ncapital, including costs to support the existing infrastructure, and the remaining amount increases the value of the properties, with improved \nroadways, ability to accommodate future expansion, and community enhancements, such as the addition of playgrounds. The cost of most \ncapital projects will be recovered through above guideline increases in the provinces with rent control, leading to increased NOI for the \ninvestment. \n\nFor the year ended December 31, 2013, Killam spent $2.2 million on water and sewer upgrades, an increase of 22.1% over 2012 due to the \ninstallation of several new water systems and upgrades to existing water and sewer infrastructure. This capital work fluctuates from year‑to‑year \nwith only $1.8 million invested in 2012 but $3.1 million in 2011. the high water upgrade costs in 2013 resulted in the per unit mHc spend being \nabove Killam’s expectation of $300 ‑ $400 per year. ", + "page_start": 51, + "page_end": 51, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Killam spent $1,482 per unit for the year ended December 31, 2013, compared to $1,683 per unit for the year ended December 31, 2012. \nApproximately 40% of the capital spend during the year was invested in suite renovations. The increase year‑over‑year was a result of unit \nupgrades to improve quality and increase occupancy, increase yields on properties identified for repositioning, and support the Company’s \ncommitment to increasing unit quality to maximize rental increases. \n\nAs an example, in 2013 the Company has been actively working to reposition Brentwood Apartments, a 45‑year old, 240‑unit, property located in \nHalifax, that was acquired in 2012. The Company identified that significant value could be created at this property by improving the quality of the \nunits and generating increased NOI through higher rents. Unit upgrades have averaged $15,000 per unit and have consisted of new appliances, \nflooring and kitchen and bathroom upgrades. The Company has achieved a corresponding lift in rents of approximately 15% on the 53 units it has \ncompleted to date. Based on a 5‑year project timeline, with 20% of the units renovated each year, the Company expects to see the return on the \ntotal investment improve 145 bps from 6.25% to 7.70%. ", + "page_start": 50, + "page_end": 50, + "source_file": "TSX_KMP_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_MRM_2000.pdf", + "query": "When did Mermaid Marine Service Base in the Port of Broome start?", + "target_page": 22, + "target_passage": "1 February 2000", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Mermaid Marine services base at the Port of Broome (Broome Base) B R O O M E S U P P LY B A S E \n\ncommenced operations on 1 February 2000 when the first ship containing drill pipe for Inpex \n\nBrowse Ltd arrived from Japan. ", + "page_start": 21, + "page_end": 21, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "It is presently expected that at least six \n\n(6) exploration wells will be drilled in the \n\narea during 2001. The Base now employs \n\nas many as ten (10) staff up from the \n\nthree (3) who commenced in February \n\n2000. Excellent management and staff \n\ncompetence are the prime factors, which \n\nhave delivered the smooth start up and \n\n***The Mermaid Broome Supply Base certified Impex, Woodside***\n***and BHP Petroleum exploration program during 2000.*** continued success at Broome. ", + "page_start": 21, + "page_end": 21, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "The offshore waters and islands adjacent to Dampier, host in excess of 50% of all D A M P I E R B A S E \n\nexploration and development budgets of Australia’s offshore oil and gas industry. The Burrup \n\nPeninsular where the Base is located is the intended site of major new oil, gas, petrochemical and \n\nindustrial mineral processing plants. The Port of Dampier is Australia’s largest Port as measured by \n\ntonnage, but as identified in the 1997 WA Department of Commerce and Trade report, there \n\nremains an urgent need for additional marine support infrastructure. Mermaid is now well advanced \n\nin our plan to satisfy those needs and onshore work was announced to start on the 9th October 2000. ", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "In February 2000 Mermaid received approval in principle from the Western Australian Minister \n\nfor the Environment for the development of a supply and engineering base at Dampier (Dampier \n\nBase). Since that time a detailed environmental management system has been produced for final \n\napproval and as a guide to daily environmental management and compliance. Refinements to \n\nthe design have proceeded, together with the preparation of bid packages and negotiations with \n\nBanks for project finance. ", + "page_start": 10, + "page_end": 10, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Perkins Shipping, established in the 1950s is the major coastal shipping service provider in \n\nAustralia’s north, linking Darwin to mining and aboriginal committees from the Kimberly to \n\nGulf of Carpenteria. Additionally Perkins operate services to East Timor, mining operations in \n\nIndonesia, as well as Singapore and East Malaysia. The Perkins and Mermaid businesses are \n\ndifferent, but complementary, offering benefits to both. The arrangement with Perkins will give \n\nMermaid well placed office facilities, open storage and waterfront access. ", + "page_start": 22, + "page_end": 22, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "During 2000 Mermaid Marine formed a M E R M A I D L A B O U R A N D M A N A G E M E N T L I M I T E D \n\nnew business unit Mermaid Labour and Management Limited. The focus of this unit will be \n\nlabour supply and industrial relations management to the marine, offshore construction industry \n\nand onshore resources projects in the NW of Australia. The Directors and Management of the \n\nnew entity are very experienced, well known and regarded by the industry in general. The \n\ncompany has high expectations for Mermaid Labour and Management Limited. ", + "page_start": 23, + "page_end": 23, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "***The foreshore of King Bay will be redeveloped as part of the Mermaid Marine Dampier Base Expansion works.***\n\nleased facilities to seven third party vessels and protection for three of our own vessels using this \n\ntechnique by the cyclone season in 2001. ", + "page_start": 16, + "page_end": 16, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Last year we identified Broome as our next strategic position. No oil and gas work had been \n\nsupported out of Broome for seventeen years and with the valuable cooperation and assistance \n\nof the Broome Port Authority, we secured Inpex, the large Japanese resource company as our first \n\nclient. The base was then established early this year. ", + "page_start": 8, + "page_end": 8, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "Trading for the period commencing 1 July 1999 to 30 June 2000 for Mermaid Marine O V E R V I E W \n\nAustralia Ltd (“Company”) and its controlled entities, experienced a 43% turnover reduction \n\nfrom last year. The result was almost entirely due to a heavy fall in oil prices, which reached their \n\nlow of US$10 in February 1999, leading to the lowest level of offshore activity for many years. \n\nIn September 1999 Mermaid exercised its option to acquire the utility vessel “Mermaid \n\nAchiever” for $3,250,000. Previously the Achiever operated under a bare boat charter. ", + "page_start": 10, + "page_end": 10, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "During the year Mermaid Marine relocated their Corporate Office. Office rental commitments contains \nthe rental payable under the balance of the lease for Mermaid’s former corporate office. This has been \nsublet for the balance of the term of the lease at a rental equal to the rental payable by Mermaid under \nthe lease of $46,250. The new location is committed under a 5 plus 5 year lease term. \n\nSupply base rental commitments represents the lease of the King Bay Supply Base for a term of 21 years \ncommencing 1 January 1999 with an option to renew the term for a further period of 21 years. \n\nThe Lessee is obliged to obtain all necessary approvals by 31 December 2000 for certain development of \nworks (“Development Works”) and to subsequently perform the works within 3 years. \n\nThe Development Works planned include breakwater, dredged basin, cyclone moorings, slipway, quay \nwall and industrial buildings. \n\nIf the Development Works are not completed within the prescribed period, the Lessor has the right \n(unless it is satisfied that the non completion was due principally to matters beyond the Company’s \ncontrol) to vary the Lease by retaking 2.3 hectares at the western extremity of the site. ", + "page_start": 54, + "page_end": 54, + "source_file": "ASX_MRM_2000.pdf" + } + ] + }, + { + "references": { + "source_file": "Word QS.pdf", + "query": "How do I create a new document in Word?", + "target_page": 2, + "target_passage": "Just select File > New", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Create something \n\nBegin with a**Blank document**to get right to work. Or start with a template to save \nyourself time and steps. Just select**File**>**New**, and then select or search for the \ntemplate you want. ", + "page_start": 1, + "page_end": 1, + "source_file": "Word QS.pdf" + }, + { + "text": "**For Your Reference…**\n**For Your Reference…**\nTo***save a new document***: \nTo***enter text***: \n\n1. Click the cell pointer on the desired cell and \nand select**Save As**\n1. Click on the***File Tab***\n2. Locate the storage folder in the***Navigation***\n***pane***\n2. Press \n to \n3. Type a***File name***and click on**[Save]**\n\ntype the required information \n\n, an arrow key or \nconfirm the data entry and to move the cell \npointer to another cell ", + "page_start": 6, + "page_end": 6, + "source_file": "Excel Training Manual 1.pdf" + }, + { + "text": "Unlike old-school user guides, this doc is yours to tailor exactly for your needs. Reading it will \nteach you some basics about Word, but this document isn’t just for reading. It’s for editing too, \nso you can learn by doing. \n\nFor practice using Word features, watch for Try it text in red throughout this document. \n\nTime saver: If you’ve only got a minute \nand you want to see how this works, \nwatch this Video: Welcome to Word. ", + "page_start": 0, + "page_end": 0, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Share your work with others \n\nTo invite others to view or edit your documents, select the**Share**button in the \ntop right corner of the app window. Then, you can choose to share a link to your \ndocument or send invitations directly to specific people. If someone doesn't have \nWord, they can use the free Word for the Web app to edit and comment. ", + "page_start": 3, + "page_end": 3, + "source_file": "Word QS.pdf" + }, + { + "text": "To test the migration from on-premises to the cloud, create another document. Click the \n**Documents**tab (see Figure 7-13 on page 187). Then, click**Insert**to add the document, as \nshown in Figure 7-14. ", + "page_start": 203, + "page_end": 203, + "source_file": "sg248459.pdf" + }, + { + "text": "highlights the text string in the current document. Double-click**Field 1**again. The \ngraphical indexer moves to the next document and highlights the text string. \n\niv. Use the Select window to move forward to each document and display the field. \nThen, return to the first document in the input file. \n\nf. Place the report window back into add mode. \n\n10.Click**Create Indexer Parameters and Fields Report**to create the indexer parameter \n\nreport that the PDF Indexer uses to process the input files that you load into the \napplication. At a minimum, you must have one trigger, one field, and one index. For more \ninformation about the indexing parameters, see*IBM Content Manager OnDemand -*\n*Indexing Reference*, SC19-3354. \n\n11.After you define all of the triggers, fields, and indexes, press Esc to close the report \nwindow. ", + "page_start": 195, + "page_end": 195, + "source_file": "sg246915.pdf" + }, + { + "text": "With this document saved in OneDrive, you can share it with others. They don’t even need Word \nto open it. \n\nTry it: Select Share, and send a link to this document. (keyboard shortcut – Alt+F+Z or Alt+Z+S) \n\nYou can send the link by typing someone’s email address or by copying the link and pasting it \ninto a message or chat. If you want them to read the document but not edit it, set their \npermission to view-only. \n\nIf they don’t have Word, the document will open in their web browser, in Word Online. ", + "page_start": 2, + "page_end": 2, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Word works with Bing to give you access to thousands of pictures you can use in your \ndocuments. \n\nTry it: Hit enter after this line to make a blank line: \n\n1. With your cursor in the blank space above, go to the Insert tab, select Online Pictures, \n\nand then search for something, like puppy clip art. \n\n2. Select the picture you want, and select Insert. ", + "page_start": 2, + "page_end": 2, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Next steps with Word \n\n**See what’s new in Office**\nExplore the new and improved features in Word and the other Office apps. \nVisit**https://go.microsoft.com/fwlink/?linkid=871117**for \nmore information. \n\n**Get free training, tutorials, and videos for Office**\nReady to dig deeper into the capabilities that Word has to offer? Visit \n**https://go.microsoft.com/fwlink/?linkid=871123**to explore our free \ntraining options. \n\n**Send us your feedback**\nLove Word? Got an idea for improvement to share with us? On the**File**menu, \nselect**Feedback**and then follow the prompts to send your suggestions directly to \nthe Word product team. Thank you! ", + "page_start": 3, + "page_end": 3, + "source_file": "Word QS.pdf" + }, + { + "text": "*Continue using the*\n***e***\n\n*previous file with this*\n*exercise, or open the file*\n*E1324 Worksheet*\n*Techniques_6.xlsx...*\n Click on the***Maintenance***\n\n***l***\n***i***\n\n***F***\n***e***\n***m***\n***a***\n***S***\n\nworksheet tab \n\n*We’ll copy this completed*\n*data to another workbook...*\n\n Right-click on the \n\nworksheet tab to display \nthe shortcut menu, then \nclick on***Move or Copy***to \ndisplay the***Move or Copy***\ndialog box \n\n Click on the drop arrow for \n***To book***, then select**(new**\n**book)**\n\n Click on***Create a copy***so \nit appears ticked \n\n*This will create a new*\n*workbook as well as*\n*making a copy of the*\n*worksheet...*\n\n Click on**[OK]**\n\n*A new workbook will be*\n*created and Maintenance*\n*will be the only worksheet*\n*in the workbook…*\n\n Save the new workbook as \n***Maintenance.xlsx***, then \nclose it ", + "page_start": 12, + "page_end": 12, + "source_file": "Excel Training Manual 1.pdf" + } + ] + }, + { + "references": { + "source_file": "Word QS.pdf", + "query": "Where can I find other Microsoft quick start guides?", + "target_page": 4, + "target_passage": "To download our free Quick Start Guides for your other favorite apps, go to https://go.microsoft.com/fwlink/?linkid=2008317.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Next steps with Word \n\n**See what’s new in Office**\nExplore the new and improved features in Word and the other Office apps. \nVisit**https://go.microsoft.com/fwlink/?linkid=871117**for \nmore information. \n\n**Get free training, tutorials, and videos for Office**\nReady to dig deeper into the capabilities that Word has to offer? Visit \n**https://go.microsoft.com/fwlink/?linkid=871123**to explore our free \ntraining options. \n\n**Send us your feedback**\nLove Word? Got an idea for improvement to share with us? On the**File**menu, \nselect**Feedback**and then follow the prompts to send your suggestions directly to \nthe Word product team. Thank you! ", + "page_start": 3, + "page_end": 3, + "source_file": "Word QS.pdf" + }, + { + "text": "**Online resources**\n\nThese websites are also relevant as further information sources: \n\n(cid:2) DB2 11 for z/OS information \n\nhttp://www.ibm.com/software/db2zos/library.html \n\n(cid:2) IBM Content Manager OnDemand production information \n\nhttp://www.ibm.com/software/products/us/en/ondemand \n\n(cid:2) Content Manager OnDemand for i Knowledge Center \n\nhttp://www.ibm.com/support/knowledgecenter/SSB2EG/welcome \n\n(cid:2) Content Manager OnDemand for Multiplatform Knowledge Center \n\nhttp://www.ibm.com/support/knowledgecenter/SSEPCD/welcome ", + "page_start": 433, + "page_end": 433, + "source_file": "sg246915.pdf" + }, + { + "text": "For example, in the Dashboard pane, you can open help information that is related to the \ndashboard-provided information, as shown in Figure 5-19. \n\n\n \n \n \n \n [html]\n
+Comparison90 %.Q, 5exechß
4
#
lR
\n\nFigure 5-19 Example of Dashboard help content \n\nSelecting the Help Contents option redirects you to the Storwize V7000 IBM Knowledge \nCenter. However, it requires internet access from the workstation where the management \nGUI is started. ", + "page_start": 164, + "page_end": 164, + "source_file": "sg247938.pdf" + }, + { + "text": "**Other resources**\n\nThe following publications are also relevant as further information sources: \n\n(cid:2) IBM System Storage Master Console: Installation and User’s Guide, GC30-4090 \n\n(cid:2) IBM System Storage Open Software Family SAN Volume Controller: CIM Agent \nDevelopers Reference, SC26-7545 \n\n(cid:2) IBM System Storage Open Software Family SAN Volume Controller: Command-Line \nInterface User’s Guide, SC26-7544 \n\n(cid:2) IBM System Storage Open Software Family SAN Volume Controller: Configuration Guide, \nSC26-7543 \n\n(cid:2) IBM System Storage Open Software Family SAN Volume Controller: Host Attachment \nGuide, SC26-7563 \n\n(cid:2) IBM System Storage Open Software Family SAN Volume Controller: Installation Guide, \nSC26-7541 \n\n(cid:2) IBM System Storage Open Software Family SAN Volume Controller: Planning Guide, \nGA22-1052 \n\n(cid:2) IBM System Storage Open Software Family SAN Volume Controller: Service Guide, \nSC26-7542 \n\n(cid:2) IBM System Storage SAN Volume Controller - Software Installation and Configuration \nGuide, SC23-6628 \n\n(cid:2) IBM System Storage SAN Volume Controller V6.2.0 - Software Installation and \nConfiguration Guide, GC27-2286 ", + "page_start": 811, + "page_end": 811, + "source_file": "sg247938.pdf" + }, + { + "text": "1. To begin with navigate to or create the SWRLTab. If it doesn’t already exist use \nWindow>Tabs>SWRLTab to create and select it. If you don’t have the SWRLTab under the \nWindow>Tabs menu then use File>Check for plugins and select the SWRLTab plugin. Remember ifyou \ndo this you need to restart Protégé for the plugin to be available. \n\n2. The SWRLTab is divided into two main views and then some buttons on the bottom of the tab that \nrelate to DROOLS. The question of when and how to use DROOLS confuses many new users but there is \na simple answer: don’t use it!11 As you get more experience with SWRL you will start to understand how \nand when DROOLS is used but for beginners the answer is simple. Think of all those DROOLS buttons \nas things for power users only. You don’t need to use them at all. That is why we installed the Pellet \nreasoner in section 4.2. The Pellet reasoner supports SWRL and when you run the reasoner it will also \nautomatically run any SWRL rules you have. See the bibliography for a paper on DROOLS. \n\n3. Click on the New button at the bottom of the top view. The other buttons should be grayed out since \nthey only apply if you have at least one rule written. This will give you a new pop-up window to write \nyour rule. In the Name field at the top call the rule: HotDiscountRule. You can skip the comment but if \nyou want to add a comment it is a good habit to get into and you can write something like: Provide a \nspecial discount for customers who prefer hot pizzas. \n\n4. Now go to the bottom part of the rule window and start writing the rule. To start you want to bind a \nparameter to each instance of the Customer class12. To do this all you need to do is to write: \nCustomer(?c). Note that auto-complete should work in this window but sometimes it may not and you \nmay need to type the complete name. Also, you will see various hints or error messages in the Status field \nas you type which you can mostly ignore for now. E.g., as you type out Customer you will see messages \nlike: Invalid SWRL atom predicate ‘Cus’ until you complete the name of the Customer class. Those \nmessages can help you understand why your rule won’t parse as you develop more rules but for now you \nshould be able to ignore them. \n\n5. Now you want to bind a parameter to the number of Pizzas that each customer has ordered so far. To \ndo that you first add a ^ character. This stands for the logical*and*. I.e., the rule will fire for every set of \nbindings that satisfy*all*of the expressions in the antecedent. To test the number of Pizzas you use the \ndata property numberOfPizzasPurchased. So at this point your rule should look like: Customer(?c) ^ \nnumberOfPizzasPurchased(?c, ?np). \n\n6. Now we want to test the object property hasSpicinessPreference. The first parameter will also be \n?c. I.e., we are iterating through each instance of Customer, binding it to ?c and then testing the values \nof these properties. However, in this case rather than binding the spiciness preference to a parameter we \njust want to test if it is equal to the instance of Spiciness Hot. So we directly reference that instance in \nthe expression resulting in: ^ hasSpicinessPreference(?c, Hot). \n\n7. As the last part of the antecedent we want to test that the Customer has purchased more than 1 Pizza. \nWe can use the SWRL math built-in swrlb:greaterThan. Add ^ swrlb:greaterThan(?np, 1) That is the last ", + "page_start": 73, + "page_end": 73, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "(cid:2) Content Manager OnDemand for z/OS Knowledge Center \n\nhttp://www.ibm.com/support/knowledgecenter/SSQHWE/welcome \n\n(cid:2) Ricoh website for Infoprint product information \n\nhttp://rpp.ricoh-usa.com/ \n\n(cid:2) IBM System i Navigator and IBM Navigator for i information \n\nhttp://www.ibm.com/systems/i/software/navigator/ \n\n(cid:2) IBM Tivoli Storage Manager home page \n\nhttp://www.ibm.com/software/products/en/tivostormana \n\n(cid:2) z/OS information \n\nhttp://www.ibm.com/systems/z/os/zos/ \n\n(cid:2)*Creating PDF Indexing Parameters Using Floating Triggers*\n\nhttp://ibm.co/1FHsXDq \n\n(cid:2)*Understanding the ACIF Input Exit for DB2 Content Manager OnDemand*\n\nhttp://ibm.co/1UUcCT0 ", + "page_start": 434, + "page_end": 434, + "source_file": "sg246915.pdf" + }, + { + "text": "**Other publications**\n\nThese publications are also relevant as further information sources: \n\n(cid:2) Adobe Press,*Adobe Type 1 Font Format,*Addison-Wesley, 1990, ISBN 0201570440 \n\n(cid:2)*DFSMS Object Access Method Planning, Installation, and Storage Administration Guide*\n*for Object Support*, SC35-0426 \n\n(cid:2)*IBM Content Manager OnDemand Messages and Code,*SC19-3356 \n\n(cid:2)*IBM Content Manager OnDemand - Distribution Facility Installation and Reference*, \nSC19-3358 \n\n(cid:2)*IBM Content Manager OnDemand - Web Enablement Kit Implementation Guide*, \nSC19-3353 \n\n(cid:2)*IBM Content Manager OnDemand - Windows Client Customization Guide*, SC19-3357 \n\n(cid:2)*Content Manager OnDemand for i - Planning and Installation Guide*, SC19-2790 ", + "page_start": 432, + "page_end": 432, + "source_file": "sg246915.pdf" + }, + { + "text": "**Getting started with serverless applications**\n\nCore*service starters*will quickly explain the value and technical fundamentals of each service. Each \n\nstarter will also mention advanced topics, so you can start with the essentials, but be aware of \n\ncapabilities to dive into when you need them. \n\nStarters are short reads (less than 2,300 words; 10-15 min) that connect concepts and practical \n\nhands-on use. \n\n**Topics**\n\n• Get started with IAM \n\n• Get started with Lambda \n\n• Get started with API Gateway \n\n• Get started with DynamoDB \n\n• Learn using a workshop ", + "page_start": 39, + "page_end": 39, + "source_file": "serverless-core.pdf" + }, + { + "text": "Rather than a standard bibliography, this section is divided into various categories based on resources that \nwill be valuable for future exploration of the technologies and methods described in this tutorial. \n\n14.1 W3C Documents \nOWL 2 Primer: https://www.w3.org/TR/owl2-primer/ \n\nOWL 2 Specification: https://www.w3.org/TR/owl2-overview/ \n\nSemantic Web Primer for Object-Oriented Software Developers: https://www.w3.org/TR/sw-oosd- \nprimer/ \n\nSPARQL Specification: https://www.w3.org/TR/sparql11-query/ \n\nSWRL Specification and Built-ins: https://www.w3.org/Submission/SWRL/ \n\n14.2 Web Sites, Tools, And Presentations. \nAgile Alliance: https://www.agilealliance.org/agile101/ \n\nCellfie: https://github.com/protegeproject/cellfie-plugin/wiki/Grocery-Tutorial \n\nGartner Hype Cycle: https://www.gartner.com/en/research/methodologies/gartner-hype-cycle \n\nJena: Open Source Java Framework for Semantic Web and Linked Data Applications: \nhttps://jena.apache.org/ \n\nOpen World Assumption (OWA) presentation by Nick Drummond and Rob Shearer: \nhttp://www.cs.man.ac.uk/~drummond/presentations/OWA.pdf ", + "page_start": 89, + "page_end": 89, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "To start one or multiple FlashCopy mappings that do not belong to a consistency group, \ncomplete the following steps: \n\n1. Open the FlashCopy Consistency Groups, or FlashCopy Mappings window. \n\n2. Right-click the FlashCopy mappings that you want to start and select**Start**, as shown in \nFigure 11-59. ", + "page_start": 516, + "page_end": 516, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "Word QS.pdf", + "query": "How to connect to my Microsoft account from Word?", + "target_page": 2, + "target_passage": " Click File > Account to sign in with your Microsoft account", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Access files anywhere \n\nNeed to work on the go and across different devices? Click**File**>**Account**to sign \nin with your Microsoft account and access your recently used files anywhere, on \nany device, through seamless integration between Office, OneDrive, OneDrive for \nBusiness, and SharePoint. ", + "page_start": 1, + "page_end": 1, + "source_file": "Word QS.pdf" + }, + { + "text": "Try it: Select File > Save As, and then select OneDrive and give this document a name. \n\nIf you sign in to Office 365 on another device, this document will be in your list of recent files. \nYou can pick up where you left off… even if you left the document open on the computer you’re \nusing now. ", + "page_start": 1, + "page_end": 1, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "Next steps with Word \n\n**See what’s new in Office**\nExplore the new and improved features in Word and the other Office apps. \nVisit**https://go.microsoft.com/fwlink/?linkid=871117**for \nmore information. \n\n**Get free training, tutorials, and videos for Office**\nReady to dig deeper into the capabilities that Word has to offer? Visit \n**https://go.microsoft.com/fwlink/?linkid=871123**to explore our free \ntraining options. \n\n**Send us your feedback**\nLove Word? Got an idea for improvement to share with us? On the**File**menu, \nselect**Feedback**and then follow the prompts to send your suggestions directly to \nthe Word product team. Thank you! ", + "page_start": 3, + "page_end": 3, + "source_file": "Word QS.pdf" + }, + { + "text": "Share your work with others \n\nTo invite others to view or edit your documents, select the**Share**button in the \ntop right corner of the app window. Then, you can choose to share a link to your \ndocument or send invitations directly to specific people. If someone doesn't have \nWord, they can use the free Word for the Web app to edit and comment. ", + "page_start": 3, + "page_end": 3, + "source_file": "Word QS.pdf" + }, + { + "text": "With this document saved in OneDrive, you can share it with others. They don’t even need Word \nto open it. \n\nTry it: Select Share, and send a link to this document. (keyboard shortcut – Alt+F+Z or Alt+Z+S) \n\nYou can send the link by typing someone’s email address or by copying the link and pasting it \ninto a message or chat. If you want them to read the document but not edit it, set their \npermission to view-only. \n\nIf they don’t have Word, the document will open in their web browser, in Word Online. ", + "page_start": 2, + "page_end": 2, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "The Tell me search box takes you straight to commands and Help in Word. \n\nTry it: Get help: \n\n1. Go to Tell me what you want to do at the top of the window. \n\n2. Type what you want to do. \n\nFor example, type: \n\n Add watermark to quickly get to the watermark command. \n\n Help to go to Word help. \n\n Training to see the list of Word training courses. \n\n What’s new for a list of the most recent updates to Word ", + "page_start": 7, + "page_end": 7, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "**Availability**\n\nThe information in this article is applicable to the following versions of Word. \n\nWord for Windows Version 2408 and later. \n\nWord for Mac Version 16.89 and later. \n\nWord for iOS Version 2.89 and later. \n\nWord for Android Build 16.0.18025.XXXXX or later. \n\nWord for the web Build 16.0.18025.XXXXX or later. \n\nIt is available to customers with Office 2024 or Office LTSC 2024 and to customers with a \n\nMicrosoft 365 subscription on Current Channel or Monthly Enterprise Channel. For \n\ncustomers with a Microsoft 365 subscription on Semi-Annual Enterprise Channel it will \n\nbe available on January 14, 2025. ", + "page_start": 60, + "page_end": 60, + "source_file": "office-pdf.pdf" + }, + { + "text": "Word works with Bing to give you access to thousands of pictures you can use in your \ndocuments. \n\nTry it: Hit enter after this line to make a blank line: \n\n1. With your cursor in the blank space above, go to the Insert tab, select Online Pictures, \n\nand then search for something, like puppy clip art. \n\n2. Select the picture you want, and select Insert. ", + "page_start": 2, + "page_end": 2, + "source_file": "welcome_to_word_template.pdf" + }, + { + "text": "It is available to customers with Office 2024 or Office LTSC 2024 and to customers with a \n\nMicrosoft 365 subscription on Current Channel or Monthly Enterprise Channel. For \n\ncustomers with a Microsoft 365 subscription on Semi-Annual Enterprise Channel it will \n\nbe available on January 14, 2025. ", + "page_start": 48, + "page_end": 48, + "source_file": "office-pdf.pdf" + }, + { + "text": "Complete the following steps to successfully complete the system setup wizard: \n\n1. Log in to system by using the superuser account, as shown in Figure 4-7. Click**Log in**. \n\n**Important:**The default password for the superuser account is passw0rd (with the \nnumber zero and not the capital letter o). ", + "page_start": 114, + "page_end": 114, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HRL_2004.pdf", + "query": "What are the products of Hormel Foods Corporation?", + "target_page": 4, + "target_passage": "meat and other food product", + "chunk_present": { + "presence": true, + "index": 6 + } + }, + "top_chunk": [ + { + "text": "**PART I**\n\n**Item 1.*BUSINESS***\n\n**Available Information**\n\nThe Company makes available, free of charge on its website at*www.hormel.com*, its annual report on Form 10-K, quarterly reports on Form 10-Q, \ncurrent reports on Form 8-K, and amendments to those reports filed or furnished pursuant to Section 13(a) or 15(d) of the Securities Exchange Act of \n1934. These reports are accessible under the \"Investor\" caption of the Company's website and are available as soon as reasonably practicable after such \nmaterial is electronically filed with or furnished to the Securities and Exchange Commission, which is within 24 hours. \n\nThe Company has adopted a Code of Ethical Business Conduct that covers its officers and directors, which is available on the Company's website, free \nof charge, under the caption \"Corporate.\" The Company also adopted Corporate Governance Guidelines, which are available on the Company's website, \nfree of charge, under the caption \"Investor.\" \n\n**(a)*General Development of Business***\n\nHormel Foods Corporation, a Delaware corporation, was founded by George A. Hormel in 1891 in Austin, Minnesota, as George A. Hormel & Company. \nThe Company started as a processor of meat and food products and continues in this line of business. The Company name was changed to Hormel \nFoods Corporation on January 31, 1995. The Company is primarily engaged in the production of a variety of meat and food products and the marketing of \nthose products throughout the United States. Although pork and turkey remain the major raw materials for Hormel products, the Company has \nemphasized for several years the manufacture and distribution of branded, consumer packaged items rather than the commodity fresh meat business. ", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "**LIST OF EXHIBITS**\n\n**HORMEL FOODS CORPORATION**\n\n2.1(1) \n\nAgreement and Plan of Merger and Plan of Reorganization dated January 22, 2001, by and among Hormel, Badger Acquisition \nCorporation, Jerome Foods, Inc. and Jerome K. Jerome. (Incorporated by reference to Hormel's Current Report on Form 8-K \ndated March 9, 2001, File No. 001-02402.) \n\n3.1(1) \nCertificate of Incorporation as amended to date. (Incorporated by reference to Exhibit 3A-1 to Hormel's Annual Report on Form 10- \nK/A for the fiscal year ended October 28, 2000, File No. 001-02402.) ", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "**LIST OF FINANCIAL STATEMENTS AND FINANCIAL STATEMENT SCHEDULES**\n\n**HORMEL FOODS CORPORATION**\n\n**FINANCIAL STATEMENTS**\n\nThe following consolidated financial statements of Hormel Foods Corporation included in the Annual Stockholders' Report for the Registrant to its \nstockholders for the year ended October 25, 2003, are incorporated herein by reference in Item 8 of Part II of this report: \n\n**Consolidated Statements of Financial Position**—October 25, 2003, and October 26, 2002. \n\n**Consolidated Statements of Operations**—Years Ended October 25, 2003, October 26, 2002 and October 27, 2001. \n\n**Consolidated Statements of Changes in Shareholders' Investment**—Years Ended October 25, 2003, October 26, 2002, and October 27, 2001. \n\n**Consolidated Statements of Cash Flows**—Years Ended October 25, 2003, October 26, 2002, and October 27, 2001. \n\n**Notes to Financial Statements**—October 25, 2003. \n\n**Report of Independent Auditors**", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "Use these links to rapidly review the document \nHORMEL FOODS CORPORATION TABLE OF CONTENTS \n\n**ANNUAL REPORT ON FORM 10-K**\n\n**HORMEL FOODS CORPORATION**\n\n**OCTOBER 25, 2003**", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "**SIGNATURES**\n\nPursuant to the requirements of Section 13 or 15(d) of the Securities Exchange Act of 1934, the Registrant has duly caused this report to be signed on its \nbehalf by the undersigned, thereunto duly authorized. \n\n**HORMEL FOODS CORPORATION**\n\nBy: /s/ JOEL W. JOHNSON Date: January 23, 2004 \n\nJOEL W. JOHNSON \nChairman of the Board, \nPresident and Chief Executive Officer \n\nPursuant to the requirements of the Securities Exchange Act of 1934, this report has been signed below by the following persons on behalf of the \nRegistrant and in the capacities and on the dates indicated. Each person whose signature to this report on Form 10-K appears below hereby constitutes \nand appoints each of Michael J. McCoy, Jody H. Feragen and Mark P. Kalvoda as his or her true and lawful attorney-in-fact and agent, with full power of \nsubstitution, to sign on his or her behalf individually and in the capacity stated below and to perform any acts necessary to be done in order to file the \nAnnual Report on Form 10-K and all amendments to this report on Form 10-K, and any and all instruments or documents filed as part of or in connection \nwith this report on Form 10-K or the amendments hereto, and each of the undersigned does hereby ratify and confirm all that said attorney-in-fact and \nagent, or his substitutes, shall do or cause to be done by virtue hereof. ", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "**FORM 10-K**\n\n**ANNUAL REPORT PURSUANT TO SECTION 13 OR 15 (d) OF**\n**THE SECURITIES EXCHANGE ACT OF 1934**\n\n**HORMEL FOODS CORPORATION**\n(Exact name of registrant as specified in its charter) \n\n**DELAWARE**\n(State or other jurisdiction of \nincorporation or organization) **41-0319970**\n(I.R.S. Employer \nIdentification No.) \n\n**55912-3680**\n(Zip Code) **1 HORMEL PLACE AUSTIN, MINNESOTA**\n(Address of principal executive offices) \n\nRegistrant's telephone number, including area code**(507) 437-5611**\n\nSecurities registered pursuant to Section 12 (b) of the Act: \n\n**COMMON STOCK, PAR VALUE $.0586 PER SHARE**\nTitle of Each Class \n**NEW YORK STOCK EXCHANGE**\nName of Each Exchange \nOn Which Registered \n\nSecurities registered pursuant to Section 12 (g) of the Act: ", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "Reporting of revenues from external customers is based on similarity of products, as the same or similar products are sold across multiple distribution \nchannels such as retail, foodservice or international. Revenues reported are based on financial information used to produce the Company's general- \npurpose financial statements. \n\nPerishable meat includes fresh meats, sausages, hams, wieners and bacon (excluding JOTS products.) Nonperishable meat includes canned luncheon \nmeats, shelf stable microwaveable entrees, stews, chilies, hash, meat spreads and other items that do not require refrigeration as well as frozen \nprocessed products. The Poultry category is composed primarily of JOTS products. The Other category primarily consists of nutritional food products and \nsupplements, sugar and sugar substitutes, salt and pepper products, dessert mixes, food packaging (casings for dry sausage), and industrial gelatin \nproducts. The Other category has increased over the past two years primarily due to the following acquisitions: Century Foods International (July 2003), \nDiamond Crystal Brands (December 2002), and Diamond Crystal Brands Nutritional Products (April 2001). \n\nNo new product in fiscal 2003 required a material investment of Company assets. \n\nDomestically, the Company sells its products in all 50 states. Hormel products are sold through Company sales personnel, operating in assigned \nterritories coordinated from district sales offices located in most of the larger U.S. cities, as well as independent brokers and distributors. As of \nOctober 25, 2003, the Company had approximately 600 sales personnel engaged in selling its products. Distribution of products to customers is by \ncommon carrier. ", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "**FINANCIAL STATEMENT SCHEDULES**\n\nThe following consolidated financial statement schedule of Hormel Foods Corporation required pursuant to Item 15(d) is submitted herewith: \n\n**Schedule II—Valuation and Qualifying Accounts and Reserves...F-3**\n\nAll other schedules for which provision is made in the applicable accounting regulation of the Securities and Exchange Commission are not required \nunder the related instructions or are inapplicable, and therefore have been omitted. \n\n**FINANCIAL STATEMENTS AND SCHEDULES OMITTED**\n\nCondensed parent company financial statements of the registrant are omitted pursuant to Rule 5-04(c) of Article 5 of Regulation S-X. ", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "The Company's branding strategy led to the development of a joint venture between Hormel Foods Corporation and Excel Corporation, a wholly owned \nsubsidiary of Cargill Incorporated. This joint venture began marketing and selling nationally branded fresh case ready beef and pork under the existing \nHORMEL ALWAYS TENDER brand name in fiscal year 2003. This 50 percent owned joint venture, named Precept Foods LLC, is based in Austin, Minn. \n\nIn fiscal 2001, the Jennie-O Turkey Store (JOTS) business was formed as a result of merging the Company's existing Jennie-O Foods, Inc. business with \nthe operations of The Turkey Store Company, which was acquired in the second quarter of fiscal 2001. The Turkey Store Company was a turkey \nprocessing business headquartered in Barron, Wisconsin. The merged JOTS operation is currently the largest turkey processor in the world. JOTS ", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "All Hormel segments compete on the basis of price, product quality, brand identification and customer service. Through aggressive marketing and strong \nquality assurance programs, the Company's strategy is to provide higher quality products that possess strong brand recognition, which would then \nsupport higher value perceptions from customers. \n\nThe Company competes using this same strategy in international markets around the world. ", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_HRL_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HRL_2004.pdf", + "query": "Where are Hormel Foods Corporation plants located? ", + "target_page": 5, + "target_passage": "has plants in Austin, Minnesota; Fremont, Nebraska; and Beijing, China", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**PART I**\n\n**Item 1.*BUSINESS***\n\n**Available Information**\n\nThe Company makes available, free of charge on its website at*www.hormel.com*, its annual report on Form 10-K, quarterly reports on Form 10-Q, \ncurrent reports on Form 8-K, and amendments to those reports filed or furnished pursuant to Section 13(a) or 15(d) of the Securities Exchange Act of \n1934. These reports are accessible under the \"Investor\" caption of the Company's website and are available as soon as reasonably practicable after such \nmaterial is electronically filed with or furnished to the Securities and Exchange Commission, which is within 24 hours. \n\nThe Company has adopted a Code of Ethical Business Conduct that covers its officers and directors, which is available on the Company's website, free \nof charge, under the caption \"Corporate.\" The Company also adopted Corporate Governance Guidelines, which are available on the Company's website, \nfree of charge, under the caption \"Investor.\" \n\n**(a)*General Development of Business***\n\nHormel Foods Corporation, a Delaware corporation, was founded by George A. Hormel in 1891 in Austin, Minnesota, as George A. Hormel & Company. \nThe Company started as a processor of meat and food products and continues in this line of business. The Company name was changed to Hormel \nFoods Corporation on January 31, 1995. The Company is primarily engaged in the production of a variety of meat and food products and the marketing of \nthose products throughout the United States. Although pork and turkey remain the major raw materials for Hormel products, the Company has \nemphasized for several years the manufacture and distribution of branded, consumer packaged items rather than the commodity fresh meat business. ", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "**FORM 10-K**\n\n**ANNUAL REPORT PURSUANT TO SECTION 13 OR 15 (d) OF**\n**THE SECURITIES EXCHANGE ACT OF 1934**\n\n**HORMEL FOODS CORPORATION**\n(Exact name of registrant as specified in its charter) \n\n**DELAWARE**\n(State or other jurisdiction of \nincorporation or organization) **41-0319970**\n(I.R.S. Employer \nIdentification No.) \n\n**55912-3680**\n(Zip Code) **1 HORMEL PLACE AUSTIN, MINNESOTA**\n(Address of principal executive offices) \n\nRegistrant's telephone number, including area code**(507) 437-5611**\n\nSecurities registered pursuant to Section 12 (b) of the Act: \n\n**COMMON STOCK, PAR VALUE $.0586 PER SHARE**\nTitle of Each Class \n**NEW YORK STOCK EXCHANGE**\nName of Each Exchange \nOn Which Registered \n\nSecurities registered pursuant to Section 12 (g) of the Act: ", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "**LIST OF EXHIBITS**\n\n**HORMEL FOODS CORPORATION**\n\n2.1(1) \n\nAgreement and Plan of Merger and Plan of Reorganization dated January 22, 2001, by and among Hormel, Badger Acquisition \nCorporation, Jerome Foods, Inc. and Jerome K. Jerome. (Incorporated by reference to Hormel's Current Report on Form 8-K \ndated March 9, 2001, File No. 001-02402.) \n\n3.1(1) \nCertificate of Incorporation as amended to date. (Incorporated by reference to Exhibit 3A-1 to Hormel's Annual Report on Form 10- \nK/A for the fiscal year ended October 28, 2000, File No. 001-02402.) ", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "**LIST OF FINANCIAL STATEMENTS AND FINANCIAL STATEMENT SCHEDULES**\n\n**HORMEL FOODS CORPORATION**\n\n**FINANCIAL STATEMENTS**\n\nThe following consolidated financial statements of Hormel Foods Corporation included in the Annual Stockholders' Report for the Registrant to its \nstockholders for the year ended October 25, 2003, are incorporated herein by reference in Item 8 of Part II of this report: \n\n**Consolidated Statements of Financial Position**—October 25, 2003, and October 26, 2002. \n\n**Consolidated Statements of Operations**—Years Ended October 25, 2003, October 26, 2002 and October 27, 2001. \n\n**Consolidated Statements of Changes in Shareholders' Investment**—Years Ended October 25, 2003, October 26, 2002, and October 27, 2001. \n\n**Consolidated Statements of Cash Flows**—Years Ended October 25, 2003, October 26, 2002, and October 27, 2001. \n\n**Notes to Financial Statements**—October 25, 2003. \n\n**Report of Independent Auditors**", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "The Company's branding strategy led to the development of a joint venture between Hormel Foods Corporation and Excel Corporation, a wholly owned \nsubsidiary of Cargill Incorporated. This joint venture began marketing and selling nationally branded fresh case ready beef and pork under the existing \nHORMEL ALWAYS TENDER brand name in fiscal year 2003. This 50 percent owned joint venture, named Precept Foods LLC, is based in Austin, Minn. \n\nIn fiscal 2001, the Jennie-O Turkey Store (JOTS) business was formed as a result of merging the Company's existing Jennie-O Foods, Inc. business with \nthe operations of The Turkey Store Company, which was acquired in the second quarter of fiscal 2001. The Turkey Store Company was a turkey \nprocessing business headquartered in Barron, Wisconsin. The merged JOTS operation is currently the largest turkey processor in the world. JOTS ", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "Use these links to rapidly review the document \nHORMEL FOODS CORPORATION TABLE OF CONTENTS \n\n**ANNUAL REPORT ON FORM 10-K**\n\n**HORMEL FOODS CORPORATION**\n\n**OCTOBER 25, 2003**", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "**SIGNATURES**\n\nPursuant to the requirements of Section 13 or 15(d) of the Securities Exchange Act of 1934, the Registrant has duly caused this report to be signed on its \nbehalf by the undersigned, thereunto duly authorized. \n\n**HORMEL FOODS CORPORATION**\n\nBy: /s/ JOEL W. JOHNSON Date: January 23, 2004 \n\nJOEL W. JOHNSON \nChairman of the Board, \nPresident and Chief Executive Officer \n\nPursuant to the requirements of the Securities Exchange Act of 1934, this report has been signed below by the following persons on behalf of the \nRegistrant and in the capacities and on the dates indicated. Each person whose signature to this report on Form 10-K appears below hereby constitutes \nand appoints each of Michael J. McCoy, Jody H. Feragen and Mark P. Kalvoda as his or her true and lawful attorney-in-fact and agent, with full power of \nsubstitution, to sign on his or her behalf individually and in the capacity stated below and to perform any acts necessary to be done in order to file the \nAnnual Report on Form 10-K and all amendments to this report on Form 10-K, and any and all instruments or documents filed as part of or in connection \nwith this report on Form 10-K or the amendments hereto, and each of the undersigned does hereby ratify and confirm all that said attorney-in-fact and \nagent, or his substitutes, shall do or cause to be done by virtue hereof. ", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "**FINANCIAL STATEMENT SCHEDULES**\n\nThe following consolidated financial statement schedule of Hormel Foods Corporation required pursuant to Item 15(d) is submitted herewith: \n\n**Schedule II—Valuation and Qualifying Accounts and Reserves...F-3**\n\nAll other schedules for which provision is made in the applicable accounting regulation of the Securities and Exchange Commission are not required \nunder the related instructions or are inapplicable, and therefore have been omitted. \n\n**FINANCIAL STATEMENTS AND SCHEDULES OMITTED**\n\nCondensed parent company financial statements of the registrant are omitted pursuant to Rule 5-04(c) of Article 5 of Regulation S-X. ", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "Logistics, Inc., based in St. Charles, Illinois, operates distribution centers for the Company in Dayton, Ohio, and Osceola, Iowa. \n\nThe Company's turkey slaughter and processing operations are located in Barron, Wisconsin; Faribault, Minnesota; Melrose, Minnesota; Montevideo, \nMinnesota; Pelican Rapids, Minnesota; and Willmar, Minnesota. \n\n**Patents and Trademarks**\n\nThere are numerous patents and trademarks that are important to the Company's business. The Company holds seven foreign and 47 U.S. issued \npatents. Some of the trademarks are registered and some are not. In recognition of the importance of these assets, the Company created a subsidiary, \nHormel Foods, LLC, in 1998 to create, own, maintain and protect most of the Company's trademarks and patents. Some of the more significant owned or \nlicensed trademarks used in the Company's segments are: \n\nHORMEL, ALWAYS TENDER, AMERICAN CLASSICS, AUSTIN BLUES, BLACK LABEL, CARAPELLI, CHI-CHI'S, CURE 81, CUREMASTER, DAN'S \nPRIZE, DIAMOND CRYSTAL, DI LUSSO, DINTY MOORE, DUBUQUE, EL TORITO, FAST 'N EASY, HERB-OX, HERDEZ, HOMELAND, HOUSE OF \nTSANG, JENNIE-O TURKEY STORE, KID'S KITCHEN, LAYOUT, LITTLE SIZZLERS, MARRAKESH EXPRESS, MARY KITCHEN, OLD \nSMOKEHOUSE, PATAK'S, PELOPONNESE, PILLOW PACK, QUICK MEAL, RANGE BRAND, ROSA GRANDE, SANDWICH MAKER, SPAM, STAGG, \nSWEET THING, THICK & EASY and WRANGLERS. ", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "Through HFIC, the Company markets its products in various locations throughout the world. Some of the larger markets include Australia, Canada, \nChina, England, Japan, Mexico and Micronesia. The distribution of export sales to customers is by common carrier, while the China operations own and \noperate their own delivery system. The Company, through HFIC, has licensed companies to manufacture various Hormel products internationally on a \nroyalty basis, with the primary licensees being Tulip International of Denmark and CJ Corp. of South Korea. \n\n**Raw Materials**\n\nThe Company has, for the past several years, been concentrating on processed branded products for consumers with year-round demand to minimize \nthe seasonal variation experienced with commodity type products. Pork continues to be the primary raw material for Company products. Although hog \nproducers are moving toward larger, more efficient year-round confinement operations and supply contracts are becoming increasingly prevalent in the \nindustry, there is still a seasonal variation in the supply of fresh pork materials. The Company's expanding line of processed items has reduced but not \neliminated the sensitivity of Company results to raw material supply and price fluctuations. ", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_HRL_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_HRL_2004.pdf", + "query": "Does Hormel Food Corporation have any material legal proceedings pending?", + "target_page": 8, + "target_passage": "The Company knows of no pending material legal proceedings.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**PART I**\n\n**Item 1.*BUSINESS***\n\n**Available Information**\n\nThe Company makes available, free of charge on its website at*www.hormel.com*, its annual report on Form 10-K, quarterly reports on Form 10-Q, \ncurrent reports on Form 8-K, and amendments to those reports filed or furnished pursuant to Section 13(a) or 15(d) of the Securities Exchange Act of \n1934. These reports are accessible under the \"Investor\" caption of the Company's website and are available as soon as reasonably practicable after such \nmaterial is electronically filed with or furnished to the Securities and Exchange Commission, which is within 24 hours. \n\nThe Company has adopted a Code of Ethical Business Conduct that covers its officers and directors, which is available on the Company's website, free \nof charge, under the caption \"Corporate.\" The Company also adopted Corporate Governance Guidelines, which are available on the Company's website, \nfree of charge, under the caption \"Investor.\" \n\n**(a)*General Development of Business***\n\nHormel Foods Corporation, a Delaware corporation, was founded by George A. Hormel in 1891 in Austin, Minnesota, as George A. Hormel & Company. \nThe Company started as a processor of meat and food products and continues in this line of business. The Company name was changed to Hormel \nFoods Corporation on January 31, 1995. The Company is primarily engaged in the production of a variety of meat and food products and the marketing of \nthose products throughout the United States. Although pork and turkey remain the major raw materials for Hormel products, the Company has \nemphasized for several years the manufacture and distribution of branded, consumer packaged items rather than the commodity fresh meat business. ", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "**SIGNATURES**\n\nPursuant to the requirements of Section 13 or 15(d) of the Securities Exchange Act of 1934, the Registrant has duly caused this report to be signed on its \nbehalf by the undersigned, thereunto duly authorized. \n\n**HORMEL FOODS CORPORATION**\n\nBy: /s/ JOEL W. JOHNSON Date: January 23, 2004 \n\nJOEL W. JOHNSON \nChairman of the Board, \nPresident and Chief Executive Officer \n\nPursuant to the requirements of the Securities Exchange Act of 1934, this report has been signed below by the following persons on behalf of the \nRegistrant and in the capacities and on the dates indicated. Each person whose signature to this report on Form 10-K appears below hereby constitutes \nand appoints each of Michael J. McCoy, Jody H. Feragen and Mark P. Kalvoda as his or her true and lawful attorney-in-fact and agent, with full power of \nsubstitution, to sign on his or her behalf individually and in the capacity stated below and to perform any acts necessary to be done in order to file the \nAnnual Report on Form 10-K and all amendments to this report on Form 10-K, and any and all instruments or documents filed as part of or in connection \nwith this report on Form 10-K or the amendments hereto, and each of the undersigned does hereby ratify and confirm all that said attorney-in-fact and \nagent, or his substitutes, shall do or cause to be done by virtue hereof. ", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "**FORM 10-K**\n\n**ANNUAL REPORT PURSUANT TO SECTION 13 OR 15 (d) OF**\n**THE SECURITIES EXCHANGE ACT OF 1934**\n\n**HORMEL FOODS CORPORATION**\n(Exact name of registrant as specified in its charter) \n\n**DELAWARE**\n(State or other jurisdiction of \nincorporation or organization) **41-0319970**\n(I.R.S. Employer \nIdentification No.) \n\n**55912-3680**\n(Zip Code) **1 HORMEL PLACE AUSTIN, MINNESOTA**\n(Address of principal executive offices) \n\nRegistrant's telephone number, including area code**(507) 437-5611**\n\nSecurities registered pursuant to Section 12 (b) of the Act: \n\n**COMMON STOCK, PAR VALUE $.0586 PER SHARE**\nTitle of Each Class \n**NEW YORK STOCK EXCHANGE**\nName of Each Exchange \nOn Which Registered \n\nSecurities registered pursuant to Section 12 (g) of the Act: ", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "**LIST OF EXHIBITS**\n\n**HORMEL FOODS CORPORATION**\n\n2.1(1) \n\nAgreement and Plan of Merger and Plan of Reorganization dated January 22, 2001, by and among Hormel, Badger Acquisition \nCorporation, Jerome Foods, Inc. and Jerome K. Jerome. (Incorporated by reference to Hormel's Current Report on Form 8-K \ndated March 9, 2001, File No. 001-02402.) \n\n3.1(1) \nCertificate of Incorporation as amended to date. (Incorporated by reference to Exhibit 3A-1 to Hormel's Annual Report on Form 10- \nK/A for the fiscal year ended October 28, 2000, File No. 001-02402.) ", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "**LIST OF FINANCIAL STATEMENTS AND FINANCIAL STATEMENT SCHEDULES**\n\n**HORMEL FOODS CORPORATION**\n\n**FINANCIAL STATEMENTS**\n\nThe following consolidated financial statements of Hormel Foods Corporation included in the Annual Stockholders' Report for the Registrant to its \nstockholders for the year ended October 25, 2003, are incorporated herein by reference in Item 8 of Part II of this report: \n\n**Consolidated Statements of Financial Position**—October 25, 2003, and October 26, 2002. \n\n**Consolidated Statements of Operations**—Years Ended October 25, 2003, October 26, 2002 and October 27, 2001. \n\n**Consolidated Statements of Changes in Shareholders' Investment**—Years Ended October 25, 2003, October 26, 2002, and October 27, 2001. \n\n**Consolidated Statements of Cash Flows**—Years Ended October 25, 2003, October 26, 2002, and October 27, 2001. \n\n**Notes to Financial Statements**—October 25, 2003. \n\n**Report of Independent Auditors**", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "**FINANCIAL STATEMENT SCHEDULES**\n\nThe following consolidated financial statement schedule of Hormel Foods Corporation required pursuant to Item 15(d) is submitted herewith: \n\n**Schedule II—Valuation and Qualifying Accounts and Reserves...F-3**\n\nAll other schedules for which provision is made in the applicable accounting regulation of the Securities and Exchange Commission are not required \nunder the related instructions or are inapplicable, and therefore have been omitted. \n\n**FINANCIAL STATEMENTS AND SCHEDULES OMITTED**\n\nCondensed parent company financial statements of the registrant are omitted pursuant to Rule 5-04(c) of Article 5 of Regulation S-X. ", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "Use these links to rapidly review the document \nHORMEL FOODS CORPORATION TABLE OF CONTENTS \n\n**ANNUAL REPORT ON FORM 10-K**\n\n**HORMEL FOODS CORPORATION**\n\n**OCTOBER 25, 2003**", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "The Company has not been involved in any bankruptcy, receivership or similar proceedings during its history. Substantially all of the assets of the \nCompany have been acquired in the ordinary course of business. \n\nThe Company had no significant change in the type of products produced or services rendered, nor in the markets or methods of distribution since the \nbeginning of the fiscal year. \n\n**(b)*Industry Segment***\n\nThe Company's business is reported in five segments: Grocery Products, Refrigerated Foods, Jennie-O Turkey Store, Specialty Foods, and All Other. \nThe contributions of each segment to net sales to unaffiliated customers and operating profit, and the presentation of certain other financial information by \nsegment are reported in Note K of the Notes to Consolidated Financial Statements and in the Management's Discussion and Analysis of the Annual \nStockholder's Report for the year ended October 25, 2003, incorporated herein by reference. \n\n**(c)*Description of Business***\n\n**Products and Distribution**\n\nThe Company's products primarily consist of meat and other food products. The meat products are sold fresh, frozen, cured, smoked, cooked and \ncanned. The percentages of total revenues contributed by classes of similar products for the last three fiscal years of the Company are as follows: ", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "**(11) Contingencies and Commitments**\n\nIn the normal course of business, the Foundation receives various threats of litigation. In the opinion of \nmanagement, the outcome of the pending lawsuits will not materially affect operations or the financial \nposition of the Foundation. \n\n**(12) Subsequent Events**\n\nThe Foundation has evaluated its subsequent events through October 8, 2024, the date at which the \nconsolidated financial statements were available to be issued, and determined there are no items to \ndisclose. ", + "page_start": 19, + "page_end": 19, + "source_file": "Wikimedia_Foundation_2024_Audited_Financial_Statements.pdf" + }, + { + "text": "The Company's branding strategy led to the development of a joint venture between Hormel Foods Corporation and Excel Corporation, a wholly owned \nsubsidiary of Cargill Incorporated. This joint venture began marketing and selling nationally branded fresh case ready beef and pork under the existing \nHORMEL ALWAYS TENDER brand name in fiscal year 2003. This 50 percent owned joint venture, named Precept Foods LLC, is based in Austin, Minn. \n\nIn fiscal 2001, the Jennie-O Turkey Store (JOTS) business was formed as a result of merging the Company's existing Jennie-O Foods, Inc. business with \nthe operations of The Turkey Store Company, which was acquired in the second quarter of fiscal 2001. The Turkey Store Company was a turkey \nprocessing business headquartered in Barron, Wisconsin. The merged JOTS operation is currently the largest turkey processor in the world. JOTS ", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_HRL_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "Open_Data_Report.pdf", + "query": "What is Mexican Farm Subsidies ?", + "target_page": 9, + "target_passage": "an online tool to analyze how the federal government allocates those subsidies", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "information has not been updated in years, or omits key data like (in the case of budget reports) \n\n*\"descriptions of how the money was spent\"*. \n\nEven with these difficulties, the Latin America Open Data/Civic Information landscape is active \n\nand definitely worthwhile following. The list of interesting Civic Information projects in Latin \n\nAmerica include (from Sasaki's Access to Information: Is Mexico a Model for the Rest of the \n\nWorld?: \n\n• Mexico \n\n• Mexican Farm Subsidies - an online tool to analyze how the federal government \n\nallocates those subsidies \n\n• Compare Your School : compares aggregate test results from any school with the \n\nmunicipal, regional, and national averages \n\n• Rebellion of the Sick built for patients with chronic diseases whose expenses are not \n\ncovered by the government subsidized health coverage. \n\n• Argentina: Public Spending in Bahía analyzes how public funds are used. \n\n• Colombia: Visible Congress monitors the actions of the Colombian congress \n\n• Brazil \n\n• Eleitor 2010 : a website to submit reports of electoral fraud during the Brazil 2010 \n\n*9/34*\n\n*Copyright 2011 LEM, Scuola Superiore Sant'Anna. This work is released under a Creative Commons attribution license (http://creativecommons.org/licenses/by/3.0/)*", + "page_start": 8, + "page_end": 8, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "To support the long-term sustainability of both nature and farming, this strategy will \nwork in tandem with the new**Farm to Fork Strategy**and the**new Common**\n**Agricultural Policy (CAP)**, including by promoting eco-schemes and result-based \npayment schemes. In implementing the Biodiversity and the Farm to Fork Strategies, the \nCommission will closely monitor progress and improvements in terms of food security \nand farmers income. The Commission will ensure that the CAP Strategic plans are \nassessed against robust climate and environmental criteria, and that Member States set \nexplicit national values for the relevant targets set in this strategy, as well as in the Farm \nto Fork Strategy. These plans should lead to sustainable practices such as precision \nagriculture, organic farming, agro-ecology, agro-forestry, low-intensive permanent \ngrassland, and stricter animal welfare standards. ", + "page_start": 7, + "page_end": 7, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "**Higher Handset Subsidies**\nis based substantially on subsidizing the \nOur wireless business model \ncost of subscriber handsets, similar to other North American wireless \ncarriers. This attracts customers and in exchange they commit to a term \nwith us. We also commit to a minimum subsidy with the supplier of \ncertain smartphone devices. \n\nBUSINESS RISKS \n\n**Revenue Expectations from New and Advanced Services**\nWe expect that a substantial portion of our future revenue growth may \ncome from new and advanced services, and we continue to invest \nsignificant capital resources to develop our networks so we can offer \nthese services. It is possible, however, that there may not be sufficient \nconsumer demand, or that we may not anticipate or satisfy demand for \ncertain products and services, or be able to offer or market these new \nproducts and services successfully to subscribers. If we do not attract \nsubscribers to new products and services profitably or keep pace with \nchanging consumer preferences, we could experience slower revenue \ngrowth and increased churn. This could have a materially adverse effect \non our business, results of operations and financial condition. \n\n**National Wireless Tower Policy**\nThe policy affects all parties that plan to install or modify an antenna \nsystem, including PCS, cellular and broadcasting service providers. The \npolicy requires, among other things, that antenna proponents consider \nusing existing antenna structures before proposing new structures and \nthose owners of existing systems respond to requests to share antenna \nsystems. Antenna proponents must \nfollow a defined process for \nnotifying the public and addressing local requirements and concerns. ", + "page_start": 79, + "page_end": 79, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Farmland birds and insects, particularly pollinators, are key indicators of the health of \nagroecosystems and are vital for agricultural production and food security. Their \nalarming decline must be reversed. As set out in the Farm to Fork Strategy, the \nCommission will take action to reduce by**50% the overall use of – and risk from –**\n**chemical pesticides by 2030**and reduce by 50% the use of more hazardous pesticides \nby 2030. This must be supported by the full implementation of the EU Pollinators \ninitiative31. By the end of 2020, the Commission will review the initiative and propose \nadditional measures if necessary. To provide space for wild animals, plants, pollinators \nand natural pest regulators, there is an urgent need to bring back**at least 10% of**\n**agricultural area under high-diversity landscape features**. These include,*inter alia*, \nbuffer strips, rotational or non-rotational fallow land, hedges, non-productive trees, \nterrace walls, and ponds. These help enhance carbon sequestration, prevent soil erosion \nand depletion, filter air and water, and support climate adaptation. In addition, more \nbiodiversity often helps lead to more agricultural production. Member States will need to \ntranslate the 10% EU target to a lower geographical scale to ensure connectivity among \nhabitats, especially through the CAP instruments and CAP Strategic Plans, in line with \nthe Farm to Fork Strategy, and through the implementation of the Habitats Directive. The ", + "page_start": 7, + "page_end": 7, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "Notes: 1. Unit sales in Mexico are included in “North America.” \n2. Sales and Production for Europe and Mexico for each year are on a January to December basis. (In the annual reports for the fiscal years before \n2003, production for Europe and Mexico was on April to March basis.) ", + "page_start": 71, + "page_end": 71, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "1Institute of Environment and Sustainable Development in Agriculture, Chinese Academy of Agricultural Sciences, \nBeijing 100081, China. 2International Maize and Wheat Improvement Center, Texcoco, Mexico. 3Peking University, \nBeijing, China.*email: hqlk2000@163.com \n\n**Scientific Reports**| (2022) 12:17268 | https://doi.org/10.1038/s41598-022-22228-7 1 ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed9.pdf" + }, + { + "text": "Livestock slaughtered by the Company is purchased by Company buyers and commission dealers at sale barns and terminal markets or under long-term \nsupply contracts at locations principally in Minnesota, Illinois, Iowa, Nebraska, Colorado and South Dakota. The cost of livestock and the utilization of the \nCompany's facilities are affected by both the level and the methods of pork production in the United States. The hog production industry has been rapidly \nmoving to very large, vertically integrated, year-round confinement operations operating under long-term supply agreements. This has resulted in fewer \nhogs being available on the spot cash market, which decreases the supply of hogs on the open market and can severely diminish the utilization of \nslaughter facilities and increase the cost of the raw materials they produce. The Company, along with others in the industry, uses long-term supply \ncontracts to manage the effects of this trend and to assure a stable supply of raw materials while minimizing extreme fluctuations in costs over the long- \nterm. This may result in costs for live hogs that are either higher or lower than the spot cash market depending on the relationship of the cash spot \nmarket to contract prices. Contract costs are fully reflected in the Company's reported financial results. In fiscal 2003, the Company purchased 79 percent \nof its hogs under long-term supply contracts. ", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_HRL_2004.pdf" + }, + { + "text": "Second, our sectoral aggregation scheme for GTAP ensures that all the competing and complimenting sectors \nfor maize are present in the most disaggregated form. For example, for maize, other crops compete for inputs of \nproduction and both livestock and households are major users of maize. For regional aggregation, we kept the \ndetails for all the main producing, consuming, and trading regions, for maize. ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed9.pdf" + }, + { + "text": "**Roundtable session: SMBC Food and Agricultural Assessment Loan**\n\nA roundtable session with experts held in August 2011 \nconsidered the role of the new SMBC Food and Agricultural \nAssessment Loan in improving the food supply chain that \nlinks food and fishery producers with food processors and \nconsumers. Opinions were also exchanged on what other \nfuture role the bank might assume in this regard, given \nthe current situation and issues facing the food industry \nand agriculture \nin Japan. \n\n**Key comments of participants**\n\nKatsutoshi Konuma, Section Manager, Social & Environmental Management, Asahi Breweries Ltd. \n“We want to deliver value by creating demand and quality combined with safety, peace \nof mind and trust.” \n\nYasuhiro Nakashima Associate Professor Graduate School of Agricultural and Life Sciences, \nThe University of Tokyo \n“Eating should be something that generates emotion. New potential exists in the world of cuisine.” \nDaisuke Yamamoto, Vice Senior Consultant, Research Department, \nThe Japan Research Institute, Limited \n“As consumer tastes go through a time of great change, I think it is important to \nprioritize ingredients and the attitude of customers toward eating.” \nYoichiro Fukayama, Planning Dept., Deputy Head (with powers of representation) of \nthe Corporate Banking Unit & Middle Market Banking Unit, SMBC \n“An important concept is multilateral dialogue as the number of parties involved in food \nproduction increases throughout the supply chain.” \nModerated by Kenji Sawami, Partner, Ernst & Young ShinNihon LLC ", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "develop an Integrated Nutrient Management Action Plan in 2022. The Farm to Fork \nstrategy will address the reduction in the use and risk of pesticides and support wider \nimplementation of Integrated Pest Management54. As part of this,**the environmental**\n**risk assessment of pesticides will be strengthened**. The pressure from plastics is \nnotably addressed through the implementation of the European Strategy for Plastics55 and \nthe new Circular Economy Action Plan56. \n\nThe Commission will develop a**set of indicators for the progressive reduction of**\n**pollution**, and will establish baselines to help monitor progress. Pressures from marine \nlitter and underwater noise are being addressed under the Marine Strategy Framework \nDirective. \n\n*2.2.10. Addressing invasive alien species*\n\nInvasive alien species can significantly undermine efforts to protect and restore nature. \nBesides inflicting major damage to nature and the economy, many invasive alien species \nalso facilitate the outbreak and spread of infectious diseases, posing a threat to humans \nand wildlife57. The rate of release of invasive alien species has increased in recent years. \nOf the 1,872 species now considered threatened in Europe, 354 are under threat from \ninvasive alien species. Without effective control measures, the rate of invasion and the \nrisks it brings to our nature and health will continue to rise. ", + "page_start": 14, + "page_end": 14, + "source_file": "legal5_eubiodiversity_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "Open_Data_Report.pdf", + "query": "What concerns has open data raised in the insurance sector?", + "target_page": 23, + "target_passage": "insurance companies may charge higher fees for life insurance to those among their customers who... put online a family tree from which it shows that they come from families with an average life expectancy lower than usual", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "**3.6.1. Data alterations and financial sustainability**\n\nSome concerns about the limits of Open Data are about what may happen, or stop to happen,*before*\n\nthey are published online. The most common concerns of this type are (from Open Public Data: \n\nThen What? - Part 1): \n\n1. Opening up PSI causes those data to not be produced anymore, or to be only produced as \n\nprivate property by private corporations, because the public agencies whose job was to \n\nproduce those data, can't sell them anymore. \n\n2. total accessibility of data provides more incentives to tinker with them, at the risk of \n\nreducing trust in institutions and inhibiting decision-making even more than today. \n\nData manipulation is the topic of the next paragraph. Speaking of costs, a point to take into account \n\nis that, once data are open, routinely used and monitored by as many independent users as possible, \n\neven the cost of keeping them up to date may be sensibly reduced: in other words, in the \n\nmedium/long term Open Data may reduce the need to periodically perform complete, that is very \n\nexpensive, studies and surveys to update a whole corpus of data in one run. \n\nBesides, and above all, even if opening data always destroyed any source of income for the public ", + "page_start": 16, + "page_end": 16, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "**3. Emerging trends and issues related to Open**\n**Data**\nOne of the most common activities for Open Data activists in this moment is the creation of \n\ncountry-wide catalogs of all data sources, to facilitate individuation and correlation of independent \n\ndata sets. Normally, all initiatives of this type are announced on the Open Knowledge Foundation \n\nblog and/or its data hub CKAN. Another relevant development is the publication of an Open Data \n\nManual that*\"can be used by anyone but is especially designed for those seeking to open up data,*\n\n*since it discusses why to go open, what open is, and the how to 'Open' Data.\"*Activists in several \n\nEuropean countries have already published local versions of the manual, or equivalent documents. \n\nOn this background, several interesting issues, some of which were anticipated in the Open Data, \n\nOpen Society report, are coming in full light. They are presented, one at a time, in the following \n\nsections of this chapter. ", + "page_start": 10, + "page_end": 10, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "Since one of the topics of this project is the*economic*value of Open Data, it is necessary to add a \n\nsomewhat obvious observation to Frydman's concerns (regardless of their probability). Even if it is \n\ndifficult now to make accurate estimates, such negative developments would surely impact also the \n\ncosts of health services and insurances, not to mention healthcare-related jobs, both in the \n\ncommunities hosting centers of excellence and in those with the worst ones. ", + "page_start": 19, + "page_end": 19, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "digital, attacks to privacy and to civil rights in general can and are coming by so many other sides \n\nthat those from (properly done) Open Data are a really tiny percentage of the total. \n\nThis is a consequence of the fact that data about us end up online from the most different sources \n\n(including ourselves and our acquaintances), and that often it would be very hard to discover, never \n\nmind*prove*, that they've been used against our interest. There have been concerns, for example, that \n\ninsurance companies may charge higher fees for life insurance to those among their customers \n\nwho... put online a family tree from which it shows that they come from families with an average \n\nlife expectancy lower than usual. \n\nAssuming such concerns were real, would it always be possible to spot and prove such abuses of \n\ndata, that weren't even published by any Public Administration? Of course, publishing online \n\ncomplete, official Census data of several generations, in a way that would make such automatic \n\nanalysis possible would be a totally different matter. \n\nGetting rid of all the unjustified concerns about privacy is very simple, at least in theory. All is \n\nneeded to dismiss for good the idea that Open Data is a generalized attack to privacy is to always \n\nremember and explain that: ", + "page_start": 22, + "page_end": 22, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Social and political lands2.1. Wikileaks and the Open Data movement.
.... 52.2. Data Openness in EU
.... 62.3. Open Data in Latin America, Asia and Africa.
.... 8Emerging trends and issues related to Open Data...
. 113.1. Cost of not opening PSI is increasing
... 113.2. Creative, unforeseen uses of local Open Data increase.
... 123.3. Legal issues remain crucial
... 133.4. The price of digitization
... 143.5. The nature of Open Government and the relationship between citizens and Government
... 153.6. Clearer vision of the real risks and limits of Open Data
... 163.6. 1. Data alterations and financial sustainability.
... 173.6. 2. Real impact of data manipulation or misunderstanding.
... 173.6. 3. Unequal access.
... 193.6. 4. Lack of education to data
... 20S. fo. S. Lack of public interest
.... 213.6. 6. Unprepared Public Administrators...
... 223.7. The privacy problem.
... 223.8. Need to better define what is Public Data.
... 23Conclusion : seven Open Data strategy and best pra
. 274.1. Properly define and explain both Open Data and Public Data
... 274.2. Keep political issues separated by economics ones.
... 274.3. Keep past and future separate
... 284.4. Impose proper licensing and streamline procurement.
... 294.5. Educate citizens to understand and use data.
... 304.6. Focus on local, specific issues to raise interest for Open Data.
... 314.7. Involve NGOs, charities and business associations.
... 32
", + "page_start": 1, + "page_end": 1, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "**2.2. Data Openness in EU**\nBoth the interest and the need for data openness at the European Union level remain high. Here, \n\nwithout making any complete analysis, we'll only report and comment a few relevant episodes. \n\nWhile studies continue to point at the political and economical advantages of Open Data, great \n\ninefficiencies and delays still keep the time and cost savings that could be achieved a far goal for \n\nthe European Union. \n\nAll the principles of the Open Declaration (collaboration, transparency, empowerment) have been \n\ndeclared key areas of action of the new EC eGov action plan. Particularly important, as explained ", + "page_start": 5, + "page_end": 5, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "*a research project about openness of*\n*public data in EU local*\n*administration*\n\n*by Marco Fioretti*\n*for the*\n*Laboratory of Economics and Management*\n*of*\n*Scuola Superiore Sant'Anna, Pisa*", + "page_start": 0, + "page_end": 0, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "**3.6. Clearer vision of the real risks and limits of Open Data**\nOpen Data, we already said, is about reuse. The point is, at least when the goal is Open Government \n\nand transparency in politics, reuse by whom? There is no*automatic*cause-effect relationship \n\nbetween Open Data and real transparency and democracy. On the contrary, several problems may \n\noccur, if administrators and citizens don't pay close attention. \n\n\n \n \n \n \n [html]\n
TableTableTableTableTableTableTableTableTable16 / 34Copyright 2011 LEM, Scuola Superiore Sant ’ Ama. TlAssed underlicensereativecomeParameters
", + "page_start": 15, + "page_end": 15, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "**4.6. Focus on local, specific issues to raise interest for Open**\n**Data**\nConsidering the continuous evidence and concerns about scarce interest and preparation of citizens \n\nto use Open Data in their political, economic and professional decisions, one of the final \n\nrecommendations of the Open Data, Open Society report confirms its importance and needs to be \n\nrepeated: it is very effective, if not simply necessary if the goal is to generate a critical mass of \n\ncitizens that demand and use Open Data in the shortest possible time, to practice all the \n\nrecommendations of this report*at the local level*, \n\nMost people encounter their local governments much more often then their national ones. When \n\nworking within a single city or region it is much easier to inform citizens, raise their interest and \n\ninvolve them, because they would be searching*local*solutions to improve*local*services and/or \n\nsave*local*money. There may also be much more opportunities to do so, especially in this period of \n\nfinancial crisis that will see substantial decreases both in credit by financial institutions and in \n\nsubsidies from central governments. Concreteness and, as they say in marketing, \"customer focus\" \n\nmust be the keys for local activists and public employees working on local Open Data: ", + "page_start": 30, + "page_end": 30, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "**3.3. Legal issues remain crucial**\nProper licensing of Public data is essential. The more Open Data activities continue, the clearer this \n\nrule becomes. What distinguishes Open Data from \"mere\" transparency is reuse. Paraphrasing \n\nEaves, until a government get the licensing issue right, Open Data cannot bring all the possible \n\nbenefits in that country. If there are no guarantees that public data can be used without restriction, \n\nvery little happens in practice, and when it happens it may be something against the public interest. \n\nCanadian Company Public Engines Inc, that is paid by local police departments to collect, process \n\nand analyze official crime data, also publishes online, with a proprietary license, anonymized \n\nsummaries of those data. When in 2010 another company, Report See Inc, scraped those data from \n\ntheir website to reuse them, Public Engines sued. \n\nReporting this, D. Eaves rightly points out that*both*companies are right: one is trying to protect its \n\ninvestment, the other is simply trying to reuse what IS public data, by getting it from the ONLY \n\nplace where it's available. This is what happens when public officials leave the ownership of*public*\n\ndata to the third parties hired to collect them. Please note that, in practice, it makes very little ", + "page_start": 12, + "page_end": 12, + "source_file": "Open_Data_Report.pdf" + } + ] + }, + { + "references": { + "source_file": "Open_Data_Report.pdf", + "query": "What are Steinberg's concerns about the government releasing all non-private existing data?", + "target_page": 28, + "target_passage": "The first reasons for Steinberg's concern is that asking for everything as soon as possible would \"stress the system too much, by spreading thin the finite amount of good will, money and political capital\". The second is that many existing old data and data archival systems are, in practice, so uninteresting that it wouldn't make sense to spend resources in opening them", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**4.3. Keep past and future separate**\nFor the same reason why it is important to always distinguishes between political and economical \n\nadvantages (or disadvantages) of Open Data, it is necessary to keep decisions about*future*data \n\n(those that will arrive in the future, due to new contracts, public services and so on) separate from \n\nthose about data that already exist. At the end of 2010, T. Steinberg wrote that the idea that \n\nGovernment should publish everything non-private it can**now**is \"rather dangerous\", and that it \n\nwould be much better to release nothing until someone actually asked for it, and at that point doing \n\nit right, that is with an open license and so on. The first reasons for Steinberg's concern is that \n\nasking for everything as soon as possible would*\"stress the system too much, by spreading thin the*\n\n*finite amount of good will, money and political capital\"*. The second is that many existing old data \n\nand data archival systems are, in practice, so uninteresting that it wouldn't make sense to spend \n\nresources in opening them. \n\nEven if these concerns were always true, it is important to realize that they apply (especially the \n\nsecond) to already existing data, not to future ones. The two classes of data have, or can have, very ", + "page_start": 27, + "page_end": 27, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "difference whether those third parties are private, for-profit corporations or even other Public \n\nAdministrations. Unless, of course, there are national laws already in place that define in advance \n\nwhat is the license of all present and future Public Data,*no matter how they were generated and by*\n\n*whom*, those data can be lost in any moment for society. In all other cases, the legal status of data \n\nwill be either officially closed and locked, or uncertain enough to prevent most or all reuses. In \n\nFebruary 2011, the news came that, even if they weren't the original copyright holders, Public \n\nEngines had been able to put together enough legal claims to convince Report See to give up. \n\nDisputes like this should not happen and would not happen if all contracts regarding collection and \n\nmanagement of PSI clearly specified that all the resulting data either go directly into the public \n\ndomain (after being anonymized if necessary, of course) or remain exclusive property of the ", + "page_start": 12, + "page_end": 12, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "digital, attacks to privacy and to civil rights in general can and are coming by so many other sides \n\nthat those from (properly done) Open Data are a really tiny percentage of the total. \n\nThis is a consequence of the fact that data about us end up online from the most different sources \n\n(including ourselves and our acquaintances), and that often it would be very hard to discover, never \n\nmind*prove*, that they've been used against our interest. There have been concerns, for example, that \n\ninsurance companies may charge higher fees for life insurance to those among their customers \n\nwho... put online a family tree from which it shows that they come from families with an average \n\nlife expectancy lower than usual. \n\nAssuming such concerns were real, would it always be possible to spot and prove such abuses of \n\ndata, that weren't even published by any Public Administration? Of course, publishing online \n\ncomplete, official Census data of several generations, in a way that would make such automatic \n\nanalysis possible would be a totally different matter. \n\nGetting rid of all the unjustified concerns about privacy is very simple, at least in theory. All is \n\nneeded to dismiss for good the idea that Open Data is a generalized attack to privacy is to always \n\nremember and explain that: ", + "page_start": 22, + "page_end": 22, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "more concrete over time is damage control. In a world that produces digital data without \n\ninterruption, uncontrolled and unpredictable data releases are facts of life that are very hard to \n\npredict, practically impossible to avoid and increasingly common. Opening public government data, \n\nthat is providing plenty of officially verified information, becomes therefore also a damage control \n\nsolution, to prevent or at least minimize damages from such uncontrolled releases. Without official \n\nOpen Public Data, individual citizens, political parties or other organizations will start to process \n\nand compare (if they already aren't...) data from unofficial sources anyway, maybe from different \n\ncountries. In such cases, it will be unavoidable not reach sometimes, even in good faith, wrong \n\nconclusions. This is not some theoretical possibility far in the future, as this real world example \n\n(from a comment to an Open Data discussion in an italian blog) proves: \n\n\"*on the*[non italian]*Geonames website you can download geo-referenced data*\n*about... 47000 Italian municipalities. That worries me, because there are only 8094 of*\n*them. Besides, I grabbed a few random data about population, and I can guarantee you*\n*that not one was right. What should be done in such cases?*", + "page_start": 4, + "page_end": 4, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "really relevant because, as we've already explained, what Wikileaks did is intrinsically different \n\nfrom Open Data. So far, negative or at least controversial reactions by manipulation and \n\nmisunderstanding of Open Data haven't happened to such a scale to justify not opening PSI. \n\nThis said, let's look at some recent example of misunderstanding and/or manipulation based on \n\n(sometimes open) public digital data. \n\nNicolas Kayser-Bril mentioned a digital map of all the religious places in Russia, that shows \n\n[also]*\"mosques that are no longer in use, so as to convey the idea that Muslims were invading*\n\n*Russia.\"*\n\nIn September 2010 the Italian National Institute of Geophysics and Vulcanology officially declared \n\nin September 2010 that they were evaluating whether to stop publishing online Italy's seismic data, \n\nas they had been doing for years. The reason was that, following the March 2009 earthquake in \n\nItaly, the data were being used to*\"come to conclusions without any basis at all\"*, both by the press, \n\nto sell more, and by local politicians trying to hide the lack of preventive measures, like enforcing \n\nanti seismic construction codes. \n\nStill in Italy, Daniele Belleri runs a Milan crime mapping blog called \"Il giro della Nera\", making a ", + "page_start": 17, + "page_end": 17, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "**3.6.1. Data alterations and financial sustainability**\n\nSome concerns about the limits of Open Data are about what may happen, or stop to happen,*before*\n\nthey are published online. The most common concerns of this type are (from Open Public Data: \n\nThen What? - Part 1): \n\n1. Opening up PSI causes those data to not be produced anymore, or to be only produced as \n\nprivate property by private corporations, because the public agencies whose job was to \n\nproduce those data, can't sell them anymore. \n\n2. total accessibility of data provides more incentives to tinker with them, at the risk of \n\nreducing trust in institutions and inhibiting decision-making even more than today. \n\nData manipulation is the topic of the next paragraph. Speaking of costs, a point to take into account \n\nis that, once data are open, routinely used and monitored by as many independent users as possible, \n\neven the cost of keeping them up to date may be sensibly reduced: in other words, in the \n\nmedium/long term Open Data may reduce the need to periodically perform complete, that is very \n\nexpensive, studies and surveys to update a whole corpus of data in one run. \n\nBesides, and above all, even if opening data always destroyed any source of income for the public ", + "page_start": 16, + "page_end": 16, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "**Risks and harm**\n\n**Privacy and copyright**\n\nMachine learning algorithms require large amounts of data. The techniques used to acquire this data have \nraised concerns about privacy, surveillance and copyright. \n\nAI-powered devices and services, such as virtual assistants and IoT products, continuously collect \npersonal information, raising concerns about intrusive data gathering and unauthorized access by third \nparties. The loss of privacy is further exacerbated by AI's ability to process and combine vast amounts of \ndata, potentially leading to a surveillance society where individual activities are constantly monitored and \nanalyzed without adequate safeguards or transparency. \n\nSensitive user data collected may include online activity records, geolocation data, video or audio.[187] \nFor example, in order to build speech recognition algorithms, Amazon has recorded millions of private \nconversations and allowed temporary workers to listen to and transcribe some of them.[188] Opinions \nabout this widespread surveillance range from those who see it as a necessary evil to those for whom it is \nclearly unethical and a violation of the right to privacy.[189] \n\nAI developers argue that this is the only way to deliver valuable applications. and have developed several \ntechniques that attempt to preserve privacy while still obtaining the data, such as data aggregation, de- \nidentification and differential privacy.[190] Since 2016, some privacy experts, such as Cynthia Dwork, \nhave begun to view privacy in terms of fairness. Brian Christian wrote that experts have pivoted \"from \nthe question of 'what they know' to the question of 'what they're doing with it'.\"[191] ", + "page_start": 12, + "page_end": 12, + "source_file": "wikipedia3.pdf" + }, + { + "text": "existent. \n\nAbove all, unlike the content of most Wikileaks documents, Open Data are almost always data that \n\nshould surely be open, unlike wartime military reports, and that almost never contain any personal \n\ninformation. In summary, whatever the conclusions about Wikileaks are, they could not be \n\nconclusions against Open Data, because there are too many differences between the two \n\nmovements. ", + "page_start": 5, + "page_end": 5, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "existing] problem that is somewhere else. \n\nRegardless of the real probability of data alterations before they are published, the major problem \n\nhappens after. We already mentioned in the first report the fact that, while correct interpretation of \n\npublic data from*the majority of average citizens*is absolutely critical, the current situation, even in \n\ncountries with (theoretical) high alphabetization and Internet access rates, is one in which most \n\npeople still lack the skills needed for such analysis. Therefore, there surely is space for both \n\nintentional manipulation of PSI and for misunderstanding it. After the publication of the first report, \n\nwe've encountered several examples of this danger, which are reported in the rest of this paragraph. \n\nBefore describing those cases, and in spite of them, it is necessary to point out one thing. While the \n\nimpact on the general public (in terms of raising interest and enhancing participation) on the Open \n\nData activity of 2010 is been, in many cases and as of today, still minimal, it is also true that there \n\nhas been no big increase in demagogy, more or less manipulated scandals and conflictual discussion \n\ncaused by Open Data. There has certainly been something of this in the Cablegate but that's not ", + "page_start": 17, + "page_end": 17, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "1. Most Open Data have nothing personal to begin with (examples: digital maps, budgets, air \n\npollution measurements....) \n\n2. The majority of data that are directly related to individuals (e.g. things like names and \n\naddress of people with specific diseases, or who were victims of some crime) have no reason \n\nto be published,**nor there is any actual demand for them by Open Data advocates**\n\n3. Exceptions that limit privacy for specific cases and categories of people (e.g. candidates to \n\npublic offices, Government and Parliament members etc...) already exist in many countries \n\n4. Very often, in practice, Open Data struggles only happen about*when and how*to make \n\navailable in the most effective way for society information that was*already*recognized as \n\npublic.*What*to declare public, hence open, is indeed a serious issue (more on this in the next \n\nparagraph) but is a separate one. ", + "page_start": 22, + "page_end": 22, + "source_file": "Open_Data_Report.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed4.pdf", + "query": "How did serum estradiol and progesterone levels change during pregnancy?", + "target_page": 2, + "target_passage": "Serum hormone concentrations increased significantly over the course of pregnancy and dropped precipitously postpartum", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "In contrast, GMV within regions of the default mode (subnetwork \nC), limbic (subnetworks A and B) and visual peripheral networks buck \nthe global trend by slightly increasing (for example, temporal poles), \nremaining constant (for example, orbitofrontal cortex) or reducing at \na much slower rate (for example, extrastriate cortex) than total GMV \n(Fig. 2a,b and Supplementary Tables 1 and 2). CT changes in these \nregions exhibit similar patterns (Supplementary Fig. 3 and Supple- \nmentary Tables 4 and 5). \n\n**Results**\n**Serological evaluations**\nSerological evaluations captured canonical hormone fluctuations \ncharacteristic of the prenatal, perinatal and postnatal periods (Fig. 1b). \nSerum hormone concentrations increased significantly over the course \nof pregnancy and dropped precipitously postpartum (preconcep- \ntion, estradiol (E) = 3.42 pg ml−1 and progesterone (P) = 0.84 ng ml−1; \n3 weeks preparturition, E = 12,400 pg ml−1 and P = 103 ng ml−1; 3 months \npostparturition, E = 11.50 pg ml−1 and P = 0.04 ng ml−1). ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed4.pdf" + }, + { + "text": "Worldwide, nearly 85% of women experience one or more pregnancies \nin their lifetime1, with 140 million women becoming pregnant each \nyear. Over an approximately 40-week gestational window, the maternal \nbody undergoes profound physiological adaptations to support the \ndevelopment of the fetus, including increases in plasma volume, meta- \nbolic rate, oxygen consumption and immune regulation2. These rapid \nadaptations are initiated by 100-fold to 1,000-fold increases in hormone \nproduction, including estrogen and progesterone. These neuromodu- \nlatory hormones also drive significant reorganization of the central \nnervous system. Evidence from animal models and human studies con- \nverge on pregnancy as a period of remarkable neuroplasticity3–10 (see \nref. 10 for one of the earliest known observations). Gestational increases \nin steroid hormone synthesis drive neurogenesis, dendritic spine \ngrowth, microglial proliferation, myelination and astrocyte remodeling \n(for review, see ref. 11). These cellular changes are pronounced in brain \ncircuits that promote maternal behavior. For example, Ammari et al. \nrecently discovered that steroid hormones can fine-tune the response \nproperties of galanin neurons in the rodent medial preoptic area of \nthe hypothalamus (mPOA), leading to enhanced sensitivity in dams \nto sensory cues from newborn pups12. ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed4.pdf" + }, + { + "text": "50 \nWeeks since conception \n\ncolors denote pregnancy stage. The participant underwent IVF to achieve \npregnancy, allowing for precise mapping of ovulation, conception and gestation \nweek.**d**, Summary (that is, total) of brain measures throughout the experiment. \nGeneralized additive models revealed GMV, CT and total brain volume decreased \nthroughout pregnancy (see Methods for validation with cubic regression), with \na slight recovery postpartum. Global QA, lateral ventricle and CSF volumes \ndisplayed nonlinear increases across gestation, with a notable rise in the second \nand third trimesters before dropping sharply postpartum. Shaded regions \nrepresent 95% confidence bands; solid lines indicate model fit; dashed line \nindicates parturition. **Fig. 1 | Precision imaging reveals neuroanatomical changes throughout**\n**gestation. a**, Standard medical demarcations for pregnancy stages (that is, \ntrimesters) by gestation week (the image is created with BioRender.com). \n**b**, Steroid hormones increased significantly throughout pregnancy and dropped \nprecipitously postpartum, as is characteristic of the prenatal and postnatal \nperiods.**c**, A healthy 38-year-old primiparous woman underwent 26 scanning \nsessions from 3 weeks preconception through 2 years postpartum. Scans were \ndistributed throughout preconception (four scans), first trimester (four scans), \nsecond trimester (six scans), third trimester (five scans) and postpartum \n(seven scans); tick marks indicate when major measures were collected and ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed4.pdf" + }, + { + "text": "Similar precision imaging studies have captured dynamic brain \nreorganization across other neuroendocrine transitions, such as the \nmenstrual cycle (see review in ref. 28), underscoring the powerful \nrole steroid hormones have in shaping the mammalian brain29. Endo- \ncrine changes across pregnancy dwarf those that occur across the \nmenstrual cycle, which highlights the critical need to map the brain’s \nresponse to this unique hormonal state. Broad physiological changes \noccur in tandem with the rise in steroid hormones, including changes \nin body mass composition, water retention, immune function and The neuroanatomical changes that unfold during matrescence \nmay have broad implications for understanding individual differences \nin parental behavior13,24,30,31, vulnerability to mental health disorders32,33 \nand patterns of brain aging18,19,34–36. Decreases in GMV may reflect \n‘fine-tuning’ of the brain by neuromodulatory hormones in prepara- \ntion for parenthood26. For example, in rodents, steroid hormones \npromote parental behavior by remodeling specific neural circuits in the \nmedial preoptic area of the hypothalamus. These behavioral adapta- \ntions are critical to the dam’s ability to meet the demands of caring for ", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed4.pdf" + }, + { + "text": "outstanding questions. This study and corresponding open-access \ndataset offer neuroscientists a detailed map of the human brain across \ngestation, a resource for which a wide range of previously unattainable \nneurobiological questions can now be explored. \n\nor neuron number, synaptic density and myelination (for review on \nthe latter, see ref. 4). Future studies of the relationship between fluid \ndynamics and volumetric changes will help clarify the factors that drive \nglobal neural changes during pregnancy; such insights will have broad \nimplications for maternal health (for example, neurological effects tied \nto pre-eclampsia or edema). \n\nOur findings from this precision imaging study show that preg- \nnancy is characterized by reductions in GMV, cortical thinning and \nenhanced white matter microstructural integrity that unfold week by \nweek. These changes were also tied to the significant rise in steroid hor- \nmone concentrations over pregnancy. Some of these changes persist \nat 2 years postpartum (for example, global reductions in GMV and CT), \nwhile others, including markers of white matter integrity, appear to be \ntransient. Ventricular expansion and contraction parallel these cortical \nchanges. These widespread patterns, and the notable increase in CSF \nvolume across gestation, could reflect increased water retention and \nsubsequent compression of cortical tissue. However, the persistence \nof these changes at 2 years postpartum and regional variation in GMV, \nCT and QA, hint at cellular underpinnings, such as alterations in glia ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed4.pdf" + }, + { + "text": "**References**\n1. World Health Organization. Maternal, newborn, child and \nadolescent health and ageing. platform.who.int/data/ \nmaternal-newborn-child-adolescent-ageing (2022). \n\n2. Thornburg, K. L., Bagby, S. P. & Giraud, G. D.*Knobil and Neill’s*\n*Physiology of Reproduction*pp. 1927–1955 (Elsevier, 2015). \n3. Brunton, P. J. & Russell, J. A. The expectant brain: adapting for \nmotherhood.*Nat. Rev. Neurosci.***9**, 11–25 (2008). \n4. Gregg, C. Pregnancy, prolactin and white matter regeneration. \n*J. Neurol. Sci.***285**, 22–27 (2009). \n5. Haim, A. et al. A survey of neuroimmune changes in pregnant \n\nand postpartum female rats.*Brain Behav. Immun.***59**, \n67–78 (2017). \n6. Barrière, D. A. et al. Brain orchestration of pregnancy and \n\nmaternal behavior in mice: a longitudinal morphometric study. \n*NeuroImage***230**, 117776 (2021). ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed4.pdf" + }, + { + "text": "**White matter microstructure changes tied to gestation**\nIn contrast to decreasing global GMV, correlational tractography of \nwhite matter, which tests for linear trends in the data, revealed increas- \ning microstructural integrity across the whole brain during gestation \n(Fig. 4a), concomitant with the rise in 17β-estradiol and progesterone \n(all*q*< 0.001; Supplementary Fig. 9). Tracts displaying robust corre- \nlations with gestational week included the corpus callosum, arcuate \nfasciculus, inferior fronto-occipital fasciculus and inferior longitudinal \nfasciculus (Fig. 4b), as well as the cingulum bundle, middle and superior \nlongitudinal fasciculus, corticostriatal, corticospinal and corticopon- \ntine tracts (see Supplementary Table 9 for complete list). \n\n**Comparing brain changes across pregnancy against controls**\nWe then compared the changes in GMV across gestation to that of typi- \ncal variability over time, derived from eight densely-sampled controls23. \nThe GMV changes we see across pregnancy far exceed normative brain \nvariability (Supplementary Fig. 11). On average, change in cortical GMV \nwas nearly three times higher than controls scanned over a similar \nduration (Supplementary Fig. 11a,b). This extends to MTL subfields, \nwherein change in volume was three to four times greater across gesta- \ntion than normative brain variability (Supplementary Fig. 11c,d). We \ncontextualized these findings further by comparing gestational GMV \nchange against our participant’s preconception brain volumes; average \nGMV change during pregnancy was six times (cortical) and three times \n(MTL) higher than the variability observed between baseline sessions. ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed4.pdf" + }, + { + "text": "b Sex steroid hormones \n12,500 \n\n17β-estradiol \nProgesterone \n\n1 \n– \nl \n\nm \ng \np \nl \n\no \nd \na \nr \nt \ns \ne \n- \nβ \n7 \n1 \n\ni ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed4.pdf" + }, + { + "text": "**Neuroanatomical changes observed over the**\n**course of a human pregnancy**\n\n\n \n \n \n \n [html]Laura Pritschet ® 1 : 1 ; Caitlin M. Taylor Φ1 ; Daniela Cossio Φ2 ; Lackung Examination\n
Received : 23 August 2023
Accepted : 29 July 2024
Hannah Grotzingar ', Evan Layher ', Elizabeth R. Chrastii Φ3 & Egaly β, Ilecabody Spaking
Published online : 16 September 2024
||| Check for updates
", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed4.pdf" + }, + { + "text": "This precision imaging study mapped neuroanatomical changes \nacross pregnancy in a single individual, precluding our ability to gen- \neralize to the broader population. To benchmark our findings, we com- \npared the magnitude of GMV changes observed throughout pregnancy \nagainst data from nonpregnant individuals sampled over a similar time \ncourse. Doing so provided compelling evidence that pregnancy-related \nneuroanatomical shifts far exceed normative day-to-day brain variabil- \nity and measurement error. Evidence suggests that white matter micro- \nstructure remains fairly stable over a six-month period42, but more \nstudies are needed to compare the degree of white matter changes \nobserved during pregnancy to normative change over time. Further, \nsampling larger cohorts of women will generate much-needed norma- \ntive models of brain change (akin to ref. 43) throughout pregnancy to \nestablish what constitutes a typical degree of neuroanatomical change \nexpected during gestation and postpartum recovery. \n12. Ammari, R. et al. Hormone-mediated neural remodeling \n\norchestrates parenting onset during pregnancy.*Science***382**, \n76–81 (2023). \n\n13. Hoekzema, E. et al. Pregnancy leads to long-lasting changes in \nhuman brain structure.*Nat. Neurosci.***20**, 287–296 (2017). \n14. Hoekzema, E. et al. Mapping the effects of pregnancy on ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed4.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed4.pdf", + "query": "Which cortical sub-networks were particularly sensitive to pregnancy?", + "target_page": 2, + "target_passage": "Several sensory and attention subnetworks were particu- larly sensitive to gestation, including the control (subnetwork B), sali- ence ventral attention (subnetwork A), dorsal attention (subnetwork B), default (subnetwork A) and somatomotor (subnetworks A and B) networks", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Cortical volume and thickness changes tied to gestation**\nWe then narrowed the aperture to capture changes unfolding within \ngestation itself (baseline—36 weeks pregnant, 19 scans). Relationships \nbetween summary brain metrics were evident over the gestational \nperiod as follows: total brain volume, GMV and CT were positively asso- \nciated with one another, whereas lateral ventricles, CSF and global QA \ndemonstrated negative relationships with GMV (Supplementary Fig. 1). \nChanges in GMV were near-ubiquitous across the cortical mantle \n(Fig. 2a). Most large-scale brain networks exhibited decreases in GMV \n(Fig. 2b and Supplementary Table 1); indeed, 80% of the 400 regions of \ninterest (ROI) demonstrated negative relationships between GMV and \ngestation week (Fig. 2a and Supplementary Table 2). Together, these \nresults provide evidence of a global decrease in cortical volume across \npregnancy. Several sensory and attention subnetworks were particu- \nlarly sensitive to gestation, including the control (subnetwork B), sali- \nence/ventral attention (subnetwork A), dorsal attention (subnetwork \nB), default (subnetwork A) and somatomotor (subnetworks A and B) \nnetworks (Supplementary Table 1). Regions driving these network-level \nchanges include the bilateral inferior parietal lobe, postcentral gyri, \ninsulae, prefrontal cortex, posterior cingulate and somatosensory \ncortex (Fig. 2c, Supplementary Table 2 and validation of findings using \nalternate pipeline in Supplementary Tables 1 and 3). These regions and ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed4.pdf" + }, + { + "text": "This precision imaging study mapped neuroanatomical changes \nacross pregnancy in a single individual, precluding our ability to gen- \neralize to the broader population. To benchmark our findings, we com- \npared the magnitude of GMV changes observed throughout pregnancy \nagainst data from nonpregnant individuals sampled over a similar time \ncourse. Doing so provided compelling evidence that pregnancy-related \nneuroanatomical shifts far exceed normative day-to-day brain variabil- \nity and measurement error. Evidence suggests that white matter micro- \nstructure remains fairly stable over a six-month period42, but more \nstudies are needed to compare the degree of white matter changes \nobserved during pregnancy to normative change over time. Further, \nsampling larger cohorts of women will generate much-needed norma- \ntive models of brain change (akin to ref. 43) throughout pregnancy to \nestablish what constitutes a typical degree of neuroanatomical change \nexpected during gestation and postpartum recovery. \n12. Ammari, R. et al. Hormone-mediated neural remodeling \n\norchestrates parenting onset during pregnancy.*Science***382**, \n76–81 (2023). \n\n13. Hoekzema, E. et al. Pregnancy leads to long-lasting changes in \nhuman brain structure.*Nat. Neurosci.***20**, 287–296 (2017). \n14. Hoekzema, E. et al. Mapping the effects of pregnancy on ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed4.pdf" + }, + { + "text": "resting state brain activity, white matter microstructure, neural \nmetabolite concentrations and grey matter architecture.*Nat.*\n*Commun.***13**, 6931 (2022). \n\n15. Martínez-García, M., Paternina-Die, M., Desco, M., Vilarroya, O. \n& Carmona, S. Characterizing the brain structural adaptations \nacross the motherhood transition.*Front. Glob. Womens Health***2**, \n742775 (2021). \n16. Spalek, K. et al. Pregnancy renders anatomical changes in \n\nhypothalamic substructures of the human brain that relate to \naspects of maternal behavior.*Psychoneuroendocrinology***164**, \n107021 (2024). \n17. Martínez-García, M. et al. Do pregnancy-induced brain changes \n\nreverse? The brain of a mother six years after parturition.*Brain Sci.*\n**11**, 168 (2021b). \n18. De Lange, A.-M. G. et al. Population-based neuroimaging reveals \n\ntraces of childbirth in the maternal brain.*Proc. Natl Acad. Sci. USA*\n**116**, 22341–22346 (2019). ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed4.pdf" + }, + { + "text": "Although studied to a lesser degree, ties between maternal \nbehavior and white matter microstructure (particularly connectiv- \nity between temporal and occipital lobes) have been noted31. Here we \nreveal pronounced GMV changes in regions within sensory, attention \nand default mode networks over the gestational window. In paral- \nlel, we observed increased anisotropy in white matter tracts that \nfacilitate communication between emotional and visual processing \nhubs37–39, including the inferior longitudinal fasciculus and inferior \nfronto-occipital fasciculus. Pinpointing the synchrony of gray and \nwhite matter changes that unfold in the maternal brain could be \nkey to understanding the behavioral adaptions that emerge during \nand after pregnancy, such as honing the brain’s visual and auditory \nresponses to infant cues and eliciting maternal behavior. Research \ninto other major transition periods supports this idea. For instance, \nadolescence is a dynamic period characterized by region-specific, \nnonlinear decreases in GMV and increases in WMV, maturational \nbrain changes that are tied to gains in executive function and social \ncognition40. For both adolescence41 and matrescence, the consider- \nable rise in steroid hormone production appears to remodel the brain \n(see ref. 25 for comparative analysis), promoting a suite of behaviors \nadaptive to that life stage. How specific neural changes give rise to \nspecific behavioral adaptations has yet to be fully explored with \nrespect to human pregnancy. ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed4.pdf" + }, + { + "text": "50 \nWeeks since conception \n\ncolors denote pregnancy stage. The participant underwent IVF to achieve \npregnancy, allowing for precise mapping of ovulation, conception and gestation \nweek.**d**, Summary (that is, total) of brain measures throughout the experiment. \nGeneralized additive models revealed GMV, CT and total brain volume decreased \nthroughout pregnancy (see Methods for validation with cubic regression), with \na slight recovery postpartum. Global QA, lateral ventricle and CSF volumes \ndisplayed nonlinear increases across gestation, with a notable rise in the second \nand third trimesters before dropping sharply postpartum. Shaded regions \nrepresent 95% confidence bands; solid lines indicate model fit; dashed line \nindicates parturition. **Fig. 1 | Precision imaging reveals neuroanatomical changes throughout**\n**gestation. a**, Standard medical demarcations for pregnancy stages (that is, \ntrimesters) by gestation week (the image is created with BioRender.com). \n**b**, Steroid hormones increased significantly throughout pregnancy and dropped \nprecipitously postpartum, as is characteristic of the prenatal and postnatal \nperiods.**c**, A healthy 38-year-old primiparous woman underwent 26 scanning \nsessions from 3 weeks preconception through 2 years postpartum. Scans were \ndistributed throughout preconception (four scans), first trimester (four scans), \nsecond trimester (six scans), third trimester (five scans) and postpartum \n(seven scans); tick marks indicate when major measures were collected and ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed4.pdf" + }, + { + "text": "In humans, reductions in gray matter volume (GMV) have \nbeen observed postpartum13–16, particularly in regions central to \ntheory-of-mind processing13. These GMV changes persist at 6 years \npostpartum17 and are traceable decades later18,19, underscoring the \npermanence of this major remodeling event. And yet the changes that \noccur within the maternal brain during gestation itself are virtually \nunknown (see ref. 20 for early neuroimaging insight). A recent study by \nPaternina-Die et al. offers intriguing clues21. Women were scanned once \nin the third trimester and again in the postpartum period, revealing a \nreduction of cortical volume observable in the late pregnancy scan. \nThese findings suggest that pregnancy is a highly dynamic period for \nneural remodeling, yet neuroscientists lack a detailed map of how the \nhuman brain changes throughout the gestational period. \n\nHere we conducted a precision imaging study of pregnancy in \nwhich a healthy 38-year-old primiparous woman underwent 26 mag- \nnetic resonance imaging (MRI) scans and venipuncture beginning \n3 weeks preconception through 2 years postpartum. We observed \nwidespread reductions in cortical GMV and cortical thickness (CT) \noccurring in step with advancing gestational week and the dramatic \nrise in sex hormone production. Remodeling was also evident within ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed4.pdf" + }, + { + "text": "Gray Matter Volume & Cortical Thickness: \nWe first computed Pearson’s product-moment correlation matrices between the following variables (n = 19 pregnancy \nscans): gestation week, estradiol, progesterone, total GMV, and the 17 network-level average GMV values. We then ran a \nmultivariate regression analysis predicting ROI-level GMV changes by gestation week. To identify which regions were \nchanging at a rate different from the global decrease, we then re-ran the analyses to include total GMV as a variable of non- \ninterest in the regression model. A similar statistical approach was taken for T1w-derived subcortical volume estimates. We \nran a multivariate regression analysis predicting GMV changes over gestation in 28 regions-of-interest by gestation week \n(FDR-corrected at q < 0.05). \n\nT2-weighted MTL scans: \nTo evaluate the relationship between gestation week and medial temporal lobe (MTL) subregion volume over pregnancy (n = \n7 bilateral subregions; n = 18 MTL scans), we used a combination of linear and non-linear models based on individual \nsubregion data patterns. Models were compared for best fit with each subregion via AIC from the GLM output (as described ", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed4.pdf" + }, + { + "text": "**Fig. 2 | Cortical GMV showed widespread change through gestation and**\n**postpartum. a**, Multivariate regression analyses reveal largely negative \nrelationships between gestation week and regional GMV, with only a minority \nof regions unaffected or increasing over the gestational window (baseline—36 \nweeks). All associations presented here were corrected for multiple comparisons \n(FDR at*q*< 0.05; nonsignificant values set to zero for interpretability).**b**, Average \nnetwork change was calculated by estimating GMV percent change from baseline \n(initial) to 36 weeks gestation (final). Attention and control networks appear \nmost affected.**c**, Six representative regions, classified by major subnetworks, \nthat exhibit pronounced GMV change across gestation. For each panel, we \ndisplay a scatterplot between average GMV of the ROIs and gestation week \n(left; gestation sessions only, 19 scans), and summary GMV of ROIs by pregnancy \nstage across the whole study (right; gestation and postpartum sessions, 26 scans). Shaded regions in scatterplots represent a 95% confidence interval. Each \nboxplot represents IQR for each stage, with a horizontal line representing the \nmedian value. The whiskers indicate variability outside (±1.5) of this range. \nOutside values are >1.5× and <3× IQR beyond either end of the box. All statistical \ntests were corrected for multiple comparisons (FDR at*q*< 0.05) and values \nwere*z*scored and transformed to have a mean of zero and s.d. of one for easier \ncomparison across regions. Please note that the data values shown here are raw \n(see Supplementary Tables 1 and 2 and Supplementary Data 1 for exhaustive list). \nBrain visualizations created with R package ggseg48. IQR, interquartile range; \nLat, lateral; Med, medial; DMN, default mode network; VisPeri, visual peripheral \nnetwork; SomMot, somatomotor network; VisCent, visual central network; Cont, \ncontrol network; TempPar, temporal parietal network; DorsAttn, dorsal attention \nnetwork; SalVentAttn, salience/ventral attention network. ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed4.pdf" + }, + { + "text": "Gestation Gestation + postpartum Gestation \n\n) \nd \ne \nr \ne \nt \nn \ne \nc \no \nr \ne \nz \n( ) \nd \ne \nr \ne \nt \nn \ne \nc \no \nr \ne \nz \n( \n\n2 \n\n1 \n\n0 \n\n–1 –1 –1 \n\nV \nM \nG \ng \nv \nA V \nM \nG \ng \nv \nA \n–2 –2 –2 \n\n0 10 \n20 \nWeek \n0 10 \n20 \nWeek \n30 Pre 1st \n2nd \nStage \n3rd Post \n\nMedial frontal \nSalience ventral attention network A Inferior parietal \nControl network B ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed4.pdf" + }, + { + "text": "**Fig. 3 | Subcortical GMV changed throughout gestation. a**, Multivariate \nregression analyses revealed largely negative relationships between gestation \nweek and subcortical GMV regions over pregnancy, including bilateral thalamus, \ncaudate, hippocampus, ventral diencephalon (encompassing hypothalamus, \nsubstantia nigra, mammillary body and red nucleus) and left caudate. Lateral \nventricles displayed the only positive relationships with gestation week \n(also depicted in Fig. 1d). The whole-brain subcortical GMV estimates shown \nhere were derived via FreeSurfer and ‘aseg’ subcortical segmentation. FDR- \ncorrected at*q*< 0.05. Inset, right ventral diencephalon displayed the strongest \nnegative association with gestation (left; baseline—36 weeks, 19 scans) and did \nnot return to baseline postpartum (right; gestation and postpartum, 26 scans). \n**b**, The participant’s hippocampus and surrounding cortex were segmented \ninto seven bilateral subregions. Quadratic (CA1, CA2/CA3) and linear regression \nanalyses (PHC) revealed subfields were negatively associated with gestation \nweek (baseline—36 weeks, 18 scans) and did not return to baseline postpartum \n(gestation and postpartum, 25 scans). Shaded regions in scatterplots represent \na 95% confidence interval. Each boxplot represents IQR for each stage, with a \nhorizontal line representing the median value. The whiskers indicate variability \noutside (±1.5) of this range. Outside values are >1.5× and <3× IQR beyond either \nend of the box. FDR-corrected at*q*< 0.05. For**a**and**b**, nonsignificant regions \nwere set to zero for interpretability. See Supplementary Fig. 6 for complete \nlabeling of regions in both segmentations. Brain visualizations created with R \npackage ggseg48*.*DC, diencephalon. ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed4.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed4.pdf", + "query": "What may reflect the decrease in GMV during pregnancy?", + "target_page": 6, + "target_passage": " Decreases in GMV may reflect ‘fine-tuning’ of the brain by neuromodulatory hormones in prepara- tion for parenthood", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "In contrast, GMV within regions of the default mode (subnetwork \nC), limbic (subnetworks A and B) and visual peripheral networks buck \nthe global trend by slightly increasing (for example, temporal poles), \nremaining constant (for example, orbitofrontal cortex) or reducing at \na much slower rate (for example, extrastriate cortex) than total GMV \n(Fig. 2a,b and Supplementary Tables 1 and 2). CT changes in these \nregions exhibit similar patterns (Supplementary Fig. 3 and Supple- \nmentary Tables 4 and 5). \n\n**Results**\n**Serological evaluations**\nSerological evaluations captured canonical hormone fluctuations \ncharacteristic of the prenatal, perinatal and postnatal periods (Fig. 1b). \nSerum hormone concentrations increased significantly over the course \nof pregnancy and dropped precipitously postpartum (preconcep- \ntion, estradiol (E) = 3.42 pg ml−1 and progesterone (P) = 0.84 ng ml−1; \n3 weeks preparturition, E = 12,400 pg ml−1 and P = 103 ng ml−1; 3 months \npostparturition, E = 11.50 pg ml−1 and P = 0.04 ng ml−1). ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed4.pdf" + }, + { + "text": "**Fig. 2 | Cortical GMV showed widespread change through gestation and**\n**postpartum. a**, Multivariate regression analyses reveal largely negative \nrelationships between gestation week and regional GMV, with only a minority \nof regions unaffected or increasing over the gestational window (baseline—36 \nweeks). All associations presented here were corrected for multiple comparisons \n(FDR at*q*< 0.05; nonsignificant values set to zero for interpretability).**b**, Average \nnetwork change was calculated by estimating GMV percent change from baseline \n(initial) to 36 weeks gestation (final). Attention and control networks appear \nmost affected.**c**, Six representative regions, classified by major subnetworks, \nthat exhibit pronounced GMV change across gestation. For each panel, we \ndisplay a scatterplot between average GMV of the ROIs and gestation week \n(left; gestation sessions only, 19 scans), and summary GMV of ROIs by pregnancy \nstage across the whole study (right; gestation and postpartum sessions, 26 scans). Shaded regions in scatterplots represent a 95% confidence interval. Each \nboxplot represents IQR for each stage, with a horizontal line representing the \nmedian value. The whiskers indicate variability outside (±1.5) of this range. \nOutside values are >1.5× and <3× IQR beyond either end of the box. All statistical \ntests were corrected for multiple comparisons (FDR at*q*< 0.05) and values \nwere*z*scored and transformed to have a mean of zero and s.d. of one for easier \ncomparison across regions. Please note that the data values shown here are raw \n(see Supplementary Tables 1 and 2 and Supplementary Data 1 for exhaustive list). \nBrain visualizations created with R package ggseg48. IQR, interquartile range; \nLat, lateral; Med, medial; DMN, default mode network; VisPeri, visual peripheral \nnetwork; SomMot, somatomotor network; VisCent, visual central network; Cont, \ncontrol network; TempPar, temporal parietal network; DorsAttn, dorsal attention \nnetwork; SalVentAttn, salience/ventral attention network. ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed4.pdf" + }, + { + "text": "**Fig. 3 | Subcortical GMV changed throughout gestation. a**, Multivariate \nregression analyses revealed largely negative relationships between gestation \nweek and subcortical GMV regions over pregnancy, including bilateral thalamus, \ncaudate, hippocampus, ventral diencephalon (encompassing hypothalamus, \nsubstantia nigra, mammillary body and red nucleus) and left caudate. Lateral \nventricles displayed the only positive relationships with gestation week \n(also depicted in Fig. 1d). The whole-brain subcortical GMV estimates shown \nhere were derived via FreeSurfer and ‘aseg’ subcortical segmentation. FDR- \ncorrected at*q*< 0.05. Inset, right ventral diencephalon displayed the strongest \nnegative association with gestation (left; baseline—36 weeks, 19 scans) and did \nnot return to baseline postpartum (right; gestation and postpartum, 26 scans). \n**b**, The participant’s hippocampus and surrounding cortex were segmented \ninto seven bilateral subregions. Quadratic (CA1, CA2/CA3) and linear regression \nanalyses (PHC) revealed subfields were negatively associated with gestation \nweek (baseline—36 weeks, 18 scans) and did not return to baseline postpartum \n(gestation and postpartum, 25 scans). Shaded regions in scatterplots represent \na 95% confidence interval. Each boxplot represents IQR for each stage, with a \nhorizontal line representing the median value. The whiskers indicate variability \noutside (±1.5) of this range. Outside values are >1.5× and <3× IQR beyond either \nend of the box. FDR-corrected at*q*< 0.05. For**a**and**b**, nonsignificant regions \nwere set to zero for interpretability. See Supplementary Fig. 6 for complete \nlabeling of regions in both segmentations. Brain visualizations created with R \npackage ggseg48*.*DC, diencephalon. ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed4.pdf" + }, + { + "text": "**Subcortical GMV changes tied to gestation**\nConsistent with the broader cortical reductions in GMV, several subcor- \ntical regions significantly reduced in volume across gestation (Fig. 3a, \nleft). This included bilateral ventral diencephalon (right hemisphere \nvalues shown in Fig. 3a, right; encompasses hypothalamus, substantia \nnigra, mammillary body, lateral geniculate nucleus and red nucleus \namong others22), caudate, hippocampus and thalamus, along with left \nputamen and brain stem (Supplementary Table 6,*q*< 0.05). ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed4.pdf" + }, + { + "text": "**White matter microstructure changes tied to gestation**\nIn contrast to decreasing global GMV, correlational tractography of \nwhite matter, which tests for linear trends in the data, revealed increas- \ning microstructural integrity across the whole brain during gestation \n(Fig. 4a), concomitant with the rise in 17β-estradiol and progesterone \n(all*q*< 0.001; Supplementary Fig. 9). Tracts displaying robust corre- \nlations with gestational week included the corpus callosum, arcuate \nfasciculus, inferior fronto-occipital fasciculus and inferior longitudinal \nfasciculus (Fig. 4b), as well as the cingulum bundle, middle and superior \nlongitudinal fasciculus, corticostriatal, corticospinal and corticopon- \ntine tracts (see Supplementary Table 9 for complete list). \n\n**Comparing brain changes across pregnancy against controls**\nWe then compared the changes in GMV across gestation to that of typi- \ncal variability over time, derived from eight densely-sampled controls23. \nThe GMV changes we see across pregnancy far exceed normative brain \nvariability (Supplementary Fig. 11). On average, change in cortical GMV \nwas nearly three times higher than controls scanned over a similar \nduration (Supplementary Fig. 11a,b). This extends to MTL subfields, \nwherein change in volume was three to four times greater across gesta- \ntion than normative brain variability (Supplementary Fig. 11c,d). We \ncontextualized these findings further by comparing gestational GMV \nchange against our participant’s preconception brain volumes; average \nGMV change during pregnancy was six times (cortical) and three times \n(MTL) higher than the variability observed between baseline sessions. ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed4.pdf" + }, + { + "text": "Gray Matter Volume & Cortical Thickness: \nWe first computed Pearson’s product-moment correlation matrices between the following variables (n = 19 pregnancy \nscans): gestation week, estradiol, progesterone, total GMV, and the 17 network-level average GMV values. We then ran a \nmultivariate regression analysis predicting ROI-level GMV changes by gestation week. To identify which regions were \nchanging at a rate different from the global decrease, we then re-ran the analyses to include total GMV as a variable of non- \ninterest in the regression model. A similar statistical approach was taken for T1w-derived subcortical volume estimates. We \nran a multivariate regression analysis predicting GMV changes over gestation in 28 regions-of-interest by gestation week \n(FDR-corrected at q < 0.05). \n\nT2-weighted MTL scans: \nTo evaluate the relationship between gestation week and medial temporal lobe (MTL) subregion volume over pregnancy (n = \n7 bilateral subregions; n = 18 MTL scans), we used a combination of linear and non-linear models based on individual \nsubregion data patterns. Models were compared for best fit with each subregion via AIC from the GLM output (as described ", + "page_start": 16, + "page_end": 16, + "source_file": "pubmed4.pdf" + }, + { + "text": "outstanding questions. This study and corresponding open-access \ndataset offer neuroscientists a detailed map of the human brain across \ngestation, a resource for which a wide range of previously unattainable \nneurobiological questions can now be explored. \n\nor neuron number, synaptic density and myelination (for review on \nthe latter, see ref. 4). Future studies of the relationship between fluid \ndynamics and volumetric changes will help clarify the factors that drive \nglobal neural changes during pregnancy; such insights will have broad \nimplications for maternal health (for example, neurological effects tied \nto pre-eclampsia or edema). \n\nOur findings from this precision imaging study show that preg- \nnancy is characterized by reductions in GMV, cortical thinning and \nenhanced white matter microstructural integrity that unfold week by \nweek. These changes were also tied to the significant rise in steroid hor- \nmone concentrations over pregnancy. Some of these changes persist \nat 2 years postpartum (for example, global reductions in GMV and CT), \nwhile others, including markers of white matter integrity, appear to be \ntransient. Ventricular expansion and contraction parallel these cortical \nchanges. These widespread patterns, and the notable increase in CSF \nvolume across gestation, could reflect increased water retention and \nsubsequent compression of cortical tissue. However, the persistence \nof these changes at 2 years postpartum and regional variation in GMV, \nCT and QA, hint at cellular underpinnings, such as alterations in glia ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed4.pdf" + }, + { + "text": "**Cortical volume and thickness changes tied to gestation**\nWe then narrowed the aperture to capture changes unfolding within \ngestation itself (baseline—36 weeks pregnant, 19 scans). Relationships \nbetween summary brain metrics were evident over the gestational \nperiod as follows: total brain volume, GMV and CT were positively asso- \nciated with one another, whereas lateral ventricles, CSF and global QA \ndemonstrated negative relationships with GMV (Supplementary Fig. 1). \nChanges in GMV were near-ubiquitous across the cortical mantle \n(Fig. 2a). Most large-scale brain networks exhibited decreases in GMV \n(Fig. 2b and Supplementary Table 1); indeed, 80% of the 400 regions of \ninterest (ROI) demonstrated negative relationships between GMV and \ngestation week (Fig. 2a and Supplementary Table 2). Together, these \nresults provide evidence of a global decrease in cortical volume across \npregnancy. Several sensory and attention subnetworks were particu- \nlarly sensitive to gestation, including the control (subnetwork B), sali- \nence/ventral attention (subnetwork A), dorsal attention (subnetwork \nB), default (subnetwork A) and somatomotor (subnetworks A and B) \nnetworks (Supplementary Table 1). Regions driving these network-level \nchanges include the bilateral inferior parietal lobe, postcentral gyri, \ninsulae, prefrontal cortex, posterior cingulate and somatosensory \ncortex (Fig. 2c, Supplementary Table 2 and validation of findings using \nalternate pipeline in Supplementary Tables 1 and 3). These regions and ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed4.pdf" + }, + { + "text": "50 \nWeeks since conception \n\ncolors denote pregnancy stage. The participant underwent IVF to achieve \npregnancy, allowing for precise mapping of ovulation, conception and gestation \nweek.**d**, Summary (that is, total) of brain measures throughout the experiment. \nGeneralized additive models revealed GMV, CT and total brain volume decreased \nthroughout pregnancy (see Methods for validation with cubic regression), with \na slight recovery postpartum. Global QA, lateral ventricle and CSF volumes \ndisplayed nonlinear increases across gestation, with a notable rise in the second \nand third trimesters before dropping sharply postpartum. Shaded regions \nrepresent 95% confidence bands; solid lines indicate model fit; dashed line \nindicates parturition. **Fig. 1 | Precision imaging reveals neuroanatomical changes throughout**\n**gestation. a**, Standard medical demarcations for pregnancy stages (that is, \ntrimesters) by gestation week (the image is created with BioRender.com). \n**b**, Steroid hormones increased significantly throughout pregnancy and dropped \nprecipitously postpartum, as is characteristic of the prenatal and postnatal \nperiods.**c**, A healthy 38-year-old primiparous woman underwent 26 scanning \nsessions from 3 weeks preconception through 2 years postpartum. Scans were \ndistributed throughout preconception (four scans), first trimester (four scans), \nsecond trimester (six scans), third trimester (five scans) and postpartum \n(seven scans); tick marks indicate when major measures were collected and ", + "page_start": 2, + "page_end": 2, + "source_file": "pubmed4.pdf" + }, + { + "text": "sleep patterns11. These factors could have a role in the brain changes \nobserved here, with some driving neurobiological changes and others, \nlike water retention, potentially affecting MRI-based measurements. \nNote that, although cortical reductions in GMV over gestation were \nstable across analyses, accounting for QC measures influenced the \nmagnitude and location of these results. These metrics all fell within \nthe standard range, but there may be meaningful reductions in signal \nthat accompany volumetric reductions (for example, increased CSF \nand decreased GM)—a methodological nuance that goes beyond the \nscope of this resource study. Ultimately, identifying the shared and \nunique contributions of these factors to the neuroanatomical changes \nthat unfold across gestation warrants further investigation. Deeply \nphenotyping a large and diverse cohort of women across pregnancy will \nopen up new avenues of exploration, for example, allowing research- \ners to link blood-based proteomic signatures to pregnancy outcomes; \ndeploying wearable devices to monitor changes in sleep, cognition and \nmood; and probing the broader social and environmental determinants \nof maternal health27. overlook the full range of changes that unfold within the gestational \nwindow, and underrepresent the brain’s metamorphosis during preg- \nnancy. Furthermore, although observed changes were largely global, \nsome regions displayed notable stability (for example, extrastriate cor- \ntex). The subcortical region that displayed the strongest relationship \nwith gestation week was the ventral diencephalon, which encompasses \nthe hypothalamus and subsequent medial preoptic area and paraven- \ntricular nucleus—structures critical for inducing maternal behavior12,16. \nThe hippocampus exhibited a reduction in volume across gestation, \nand with higher spatial resolution, this reduction was revealed to be \ndriven by changes in CA1 and CA2/CA3 subfield volumes, while other \nhippocampal subfields remained stable. Adjacent PHC within the \nMTL also exhibited volume reduction across gestation. While our hip- \npocampal findings are consistent with pre/post studies of pregnancy13, \nthe precision lens applied within gestation revealed the nonlinear \nnature of this reduction. Recapitulating and clarifying these region- \nally specific patterns of volume change throughout the MTL merits \nfurther investigation. ", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed4.pdf" + } + ] + }, + { + "references": { + "source_file": "6126797.pdf", + "query": "How to light up my sports smart watch?", + "target_page": 2, + "target_passage": "Up button: Short press to light up or turn off the screen", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Up button:**\n\nShort press to light up or turn off the screen; one press to go back the dial interface; long press to \nreactivate the watch. \n\n**Button down:**\n\nShort press to enter multi-sport mode. \nIn addition, when the watch is in the off-screen state, you can light up the screen by pressing any \nbuttons. \n\n**Charging instructions:**\n\nWireless charging, as shown in the picture below. ", + "page_start": 1, + "page_end": 1, + "source_file": "6126797.pdf" + }, + { + "text": "Sports smart watch \nUser Manual \nDT3 Mate \n\n", + "page_start": 0, + "page_end": 0, + "source_file": "6126797.pdf" + }, + { + "text": "**1.1 Shortcut function:**\n\n1) Swipe to the left till you find the \"+\" icon, click the icon to add part of the functions in the \nshortcut. \n2) Scroll down the screen when the watch is in the dial interface, you can find Bluetooth \nconnection status, time, power, brightness adjustment and other functions. ", + "page_start": 1, + "page_end": 1, + "source_file": "6126797.pdf" + }, + { + "text": "Bind the smartwatch to the app WearPro, you can control the music to start/pause/play previous \nsong/play next song of your phone. \nBind the audio/calling Bluetooth of the smartwatch also, the music will be broadcast on the \nsmartwatch. \n\n**2.2 Sleep**\n\nSleep monitoring time period: from 18:00 at night to 10:00 the next day, the data will be \ngenerated by the watch. After connecting to the APP, the sleep data on the watch can be \nsynchronized to the APP for you to check. \n\n**2.3 stopwatch**\n\nClick the stopwatch to enter the timing interface, and you can record the time once. \n\n**2.4 Weather**\n\nAfter the smartwatch is connected to the app and the data is synchronized, tap Weather on the \nwatch to display the weather information for the day. \n\n**2.5 Find mobile phone**\n\nAfter the watch is bound to the app WearPro, tap this function to find the mobile phone, and the \nmobile phone will vibrate or emit a ringtone. \n\n**2.6 Meteorology**\n\nClick on “Meteorology” on the watch to display the ultraviolet (UV) and air pressure conditions of \nthe day. ", + "page_start": 4, + "page_end": 4, + "source_file": "6126797.pdf" + }, + { + "text": "3) Swipe to the right when the watch is in the dial interface, you can find time/date/week/the latest \nmessage (enter to view multiple messages)/some of the recently used menu functions, and turn on \nor off audio Bluetooth for calls. \n4) Swipe up the screen when the watch is in the dial interface to enter the menu interface, and \nscroll up and down to find the corresponding function. \n5) Long press the watch face interface and swipe to right or left to switch the watch face, select \none of them and set it with one-click. \n\n**1.2 App notification**\n\n1) When the watch is bound to the APP, and you allow the watch to display notifications on the \nwatch, the new messages received in your mobile phone will be pushed to the watch, and a total of \n10 messages can be saved. The messages received after 10 messages will be overwritten one by \none. \n2) Swipe to the bottom to click the delete icon to clear all message records. \n\n**1.3 Drop-down menu**\n\nScroll down the screen when the watch is in the dial interface to enter the drop-down menu \ninterface. \n1) Bluetooth connection status; time; power left; \n2) About, where you can check the firmware version of watch and the address of the Bluetooth \n3) Setting, where you can enter it to set part of the functions; \n4) Brightness adjustment; where you can adjust the brightness of the screen; \n5) Alipay. Download the app Alipay in your mobile phone and bind it with your watch to realize \noffline payment. ", + "page_start": 2, + "page_end": 2, + "source_file": "6126797.pdf" + }, + { + "text": "Enable the SMS notification in the app. When one or more SMS messages are received on the \nmobile phone, the watch will receive one or more SMS reminders at the same time. \n1.5.3. Other application message notifications: \nTurn on the corresponding application message notification in the app, such as WeChat, QQ, \nOutlook, Facebook and other applications. When the mobile phone receives one/multiple \napplication message notifications, the watch will receive one/multiple corresponding message \nreminders at the same time. \n\n**1.6 Frequently used contacts**\n\nThe watch binds to the app, and you allow the watch to access to the phone book of your mobile \nphone, then you can synchronize you contacts of your mobile phone to the smartwatch. \n\n**1.7 Fitness data**\n\nFitness data is turned on by default. When you enter the fitness data interface, scroll up the \nscreen, the smartwatch will display the current data of steps, distance, and calories. The data will \nbe wiped out at 00:00 every day in the morning. \n\n**1.8 Sports modes**(walking, running, cycling, rope skipping, badminton, \n\nbasketball, football) \n\n1.8.1 Select the corresponding exercise mode, click the “Start” button on the screen to start the \nexercise; click the “Start” button again to pause the recording of the exercise; click the “End” \nbutton to end the recording, and save to the data. \n1.8.2 The data can only be saved when the recording of the exercise is more than 1 minute; If the \nrecording time is less than 1 minute, the smartwatch will remind you that the data is too little to be \nsaved. ", + "page_start": 3, + "page_end": 3, + "source_file": "6126797.pdf" + }, + { + "text": "**2.7 Massager**\n\nTap the green button to start the massage, and the watch is in a vibrating state, tap the red button \nto end the massage state. \n\n**3.0 Menu style**\n\nThere are a variety of menu styles for users to choose. \n\n**3.1 Settings**\n\n1) You can select the watch language on the settings of the watch, or the watch language can be \nsynchronized with your mobile phone language after the watch successfully binds to the APP. \n2) Switch the watch face, swipe to the right to view the next watch face, select a watch face, and \nclick it to set the watch face. \n3) Set screen time; a variety of screen time lengths can be selected. \n4) Vibration intensity; set reminder vibration intensity. \n5) Password; a 4-digit password can be set (if you forget the password, please enter 8762 to \ndecrypt the previous password). \n6) Restore factory settings; click √ to enable the factory reset, and click X to cancel the factory \nreset. ", + "page_start": 4, + "page_end": 4, + "source_file": "6126797.pdf" + }, + { + "text": "**1.9 Heart rate**\n\nAfter you wearing the smartwatch correctly, you can measure heart rate when you enter the \nheart rate function. If you don’t wear the smartwatch properly, it will remind you to wear firmly \nfor the measurement. \n\n**1.10 ECG**\n\nAfter you wearing the smartwatch correctly, and enter the ECG function(you need to turn on the \nECG interface in the app, you can have single measurement at a time. The data of ECG will be \nsaved in the mobile phone. This function should be used with the app. \n\n**2.0 My QR code**\n\nConnect the watch to the APP, find My QR Code in the APP, select WeChat/QQ/Alipay and other \n\"Receive money QR code\" to sync to the watch (Please follow the instructions of the app to \noperate the function). ", + "page_start": 3, + "page_end": 3, + "source_file": "6126797.pdf" + }, + { + "text": "**7. Do not disturb mode**\n\nIn the APP, tap “Device” > “More” > “Do not disturb mode”, set the start to end time, such as \n12:00 to 14:00, then you won’t receive phone calls and apps notifications on the watch during this \nperiod. \n\n**8. Daily alarm clock**\n\nIn the APP in the APP Device>More, set the start and the end time, the alarm can be set only once \nor repeatedly on the date (week) setting, and the alarm can be turned on/off. \n\n**9. Sedentary reminder**\n\nSet the start and the end time of the sedentary reminder, and the time interval (minutes) in the \nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting. \nWhen the sedentary time is reached, the watch will vibrate and display a sedentary icon on the \nscreen. \n\n**10. Drink water reminder**\n\nSet the reminder frequency (minutes) and the time period of the start and the end in a day in the \nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting \nand selecting the date (week) of the water reminder. When the time of drink water reminder is \nreached, the watch will vibrate and there will be a water icon on the screen. ", + "page_start": 6, + "page_end": 6, + "source_file": "6126797.pdf" + }, + { + "text": "**11. Dial push**\n\n11.1.Push an existing watch face \nBind the watch and the app, open the app, tap Device > Watch face push, the watch will restart \nand bind the APP automatically after the synchronization of the watch face. \n11.2. Customize the watch face \nBind the watch and the app, open the app, tap Device > Watch face push, the first several watch \nfaces marked with “custom watch faces” are customizable. The watch will restart and bind the \nAPP automatically after the synchronization of the watch face. ", + "page_start": 6, + "page_end": 6, + "source_file": "6126797.pdf" + } + ] + }, + { + "references": { + "source_file": "6126797.pdf", + "query": "Is my sports smartwatch's fitness data turned on or off by default?", + "target_page": 4, + "target_passage": "Fitness data is turned on by default.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Enable the SMS notification in the app. When one or more SMS messages are received on the \nmobile phone, the watch will receive one or more SMS reminders at the same time. \n1.5.3. Other application message notifications: \nTurn on the corresponding application message notification in the app, such as WeChat, QQ, \nOutlook, Facebook and other applications. When the mobile phone receives one/multiple \napplication message notifications, the watch will receive one/multiple corresponding message \nreminders at the same time. \n\n**1.6 Frequently used contacts**\n\nThe watch binds to the app, and you allow the watch to access to the phone book of your mobile \nphone, then you can synchronize you contacts of your mobile phone to the smartwatch. \n\n**1.7 Fitness data**\n\nFitness data is turned on by default. When you enter the fitness data interface, scroll up the \nscreen, the smartwatch will display the current data of steps, distance, and calories. The data will \nbe wiped out at 00:00 every day in the morning. \n\n**1.8 Sports modes**(walking, running, cycling, rope skipping, badminton, \n\nbasketball, football) \n\n1.8.1 Select the corresponding exercise mode, click the “Start” button on the screen to start the \nexercise; click the “Start” button again to pause the recording of the exercise; click the “End” \nbutton to end the recording, and save to the data. \n1.8.2 The data can only be saved when the recording of the exercise is more than 1 minute; If the \nrecording time is less than 1 minute, the smartwatch will remind you that the data is too little to be \nsaved. ", + "page_start": 3, + "page_end": 3, + "source_file": "6126797.pdf" + }, + { + "text": "Sports smart watch \nUser Manual \nDT3 Mate \n\n", + "page_start": 0, + "page_end": 0, + "source_file": "6126797.pdf" + }, + { + "text": "smart watch, and click \"Forget this device\". The “About” of the watch has an “Unbind” \n\nbutton, click it to unbind or do it in the APP. For the safety of users’ data, the watch will implement a \n\nfactory reset after that. ", + "page_start": 7, + "page_end": 7, + "source_file": "6126797.pdf" + }, + { + "text": "The version of the watch is displayed on “Firmware upgrade” in the column of “Device”, and \n\nusers can decide to whether upgrade the firmware version. \n\n**13. Unbind**\n\nIn the \"Device\" column of WearPro, scroll down to the \"Unbind\" and click to unbind the APP. The \niSO users need to go to the Bluetooth settings of the phone, select the Bluetooth name of the ", + "page_start": 7, + "page_end": 7, + "source_file": "6126797.pdf" + }, + { + "text": "Bind the smartwatch to the app WearPro, you can control the music to start/pause/play previous \nsong/play next song of your phone. \nBind the audio/calling Bluetooth of the smartwatch also, the music will be broadcast on the \nsmartwatch. \n\n**2.2 Sleep**\n\nSleep monitoring time period: from 18:00 at night to 10:00 the next day, the data will be \ngenerated by the watch. After connecting to the APP, the sleep data on the watch can be \nsynchronized to the APP for you to check. \n\n**2.3 stopwatch**\n\nClick the stopwatch to enter the timing interface, and you can record the time once. \n\n**2.4 Weather**\n\nAfter the smartwatch is connected to the app and the data is synchronized, tap Weather on the \nwatch to display the weather information for the day. \n\n**2.5 Find mobile phone**\n\nAfter the watch is bound to the app WearPro, tap this function to find the mobile phone, and the \nmobile phone will vibrate or emit a ringtone. \n\n**2.6 Meteorology**\n\nClick on “Meteorology” on the watch to display the ultraviolet (UV) and air pressure conditions of \nthe day. ", + "page_start": 4, + "page_end": 4, + "source_file": "6126797.pdf" + }, + { + "text": "2.1 Unconnected to the APP state: \n\nAfter the watch is turned on, the Bluetooth will be in the state of being searched. After open the \nAPK/APP, go to Devices > Add Device > click to start searching, select and click the \ncorresponding watch device name, and the watch will be successfully bound to the app. ", + "page_start": 5, + "page_end": 5, + "source_file": "6126797.pdf" + }, + { + "text": "**Up button:**\n\nShort press to light up or turn off the screen; one press to go back the dial interface; long press to \nreactivate the watch. \n\n**Button down:**\n\nShort press to enter multi-sport mode. \nIn addition, when the watch is in the off-screen state, you can light up the screen by pressing any \nbuttons. \n\n**Charging instructions:**\n\nWireless charging, as shown in the picture below. ", + "page_start": 1, + "page_end": 1, + "source_file": "6126797.pdf" + }, + { + "text": "3) Swipe to the right when the watch is in the dial interface, you can find time/date/week/the latest \nmessage (enter to view multiple messages)/some of the recently used menu functions, and turn on \nor off audio Bluetooth for calls. \n4) Swipe up the screen when the watch is in the dial interface to enter the menu interface, and \nscroll up and down to find the corresponding function. \n5) Long press the watch face interface and swipe to right or left to switch the watch face, select \none of them and set it with one-click. \n\n**1.2 App notification**\n\n1) When the watch is bound to the APP, and you allow the watch to display notifications on the \nwatch, the new messages received in your mobile phone will be pushed to the watch, and a total of \n10 messages can be saved. The messages received after 10 messages will be overwritten one by \none. \n2) Swipe to the bottom to click the delete icon to clear all message records. \n\n**1.3 Drop-down menu**\n\nScroll down the screen when the watch is in the dial interface to enter the drop-down menu \ninterface. \n1) Bluetooth connection status; time; power left; \n2) About, where you can check the firmware version of watch and the address of the Bluetooth \n3) Setting, where you can enter it to set part of the functions; \n4) Brightness adjustment; where you can adjust the brightness of the screen; \n5) Alipay. Download the app Alipay in your mobile phone and bind it with your watch to realize \noffline payment. ", + "page_start": 2, + "page_end": 2, + "source_file": "6126797.pdf" + }, + { + "text": "**1.9 Heart rate**\n\nAfter you wearing the smartwatch correctly, you can measure heart rate when you enter the \nheart rate function. If you don’t wear the smartwatch properly, it will remind you to wear firmly \nfor the measurement. \n\n**1.10 ECG**\n\nAfter you wearing the smartwatch correctly, and enter the ECG function(you need to turn on the \nECG interface in the app, you can have single measurement at a time. The data of ECG will be \nsaved in the mobile phone. This function should be used with the app. \n\n**2.0 My QR code**\n\nConnect the watch to the APP, find My QR Code in the APP, select WeChat/QQ/Alipay and other \n\"Receive money QR code\" to sync to the watch (Please follow the instructions of the app to \noperate the function). ", + "page_start": 3, + "page_end": 3, + "source_file": "6126797.pdf" + }, + { + "text": "**2.7 Massager**\n\nTap the green button to start the massage, and the watch is in a vibrating state, tap the red button \nto end the massage state. \n\n**3.0 Menu style**\n\nThere are a variety of menu styles for users to choose. \n\n**3.1 Settings**\n\n1) You can select the watch language on the settings of the watch, or the watch language can be \nsynchronized with your mobile phone language after the watch successfully binds to the APP. \n2) Switch the watch face, swipe to the right to view the next watch face, select a watch face, and \nclick it to set the watch face. \n3) Set screen time; a variety of screen time lengths can be selected. \n4) Vibration intensity; set reminder vibration intensity. \n5) Password; a 4-digit password can be set (if you forget the password, please enter 8762 to \ndecrypt the previous password). \n6) Restore factory settings; click √ to enable the factory reset, and click X to cancel the factory \nreset. ", + "page_start": 4, + "page_end": 4, + "source_file": "6126797.pdf" + } + ] + }, + { + "references": { + "source_file": "6126797.pdf", + "query": "When does my Sport smartwatch start and stop monitoring sleep?", + "target_page": 5, + "target_passage": "Sleep monitoring time period: from 18:00 at night to 10:00 the next day", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Bind the smartwatch to the app WearPro, you can control the music to start/pause/play previous \nsong/play next song of your phone. \nBind the audio/calling Bluetooth of the smartwatch also, the music will be broadcast on the \nsmartwatch. \n\n**2.2 Sleep**\n\nSleep monitoring time period: from 18:00 at night to 10:00 the next day, the data will be \ngenerated by the watch. After connecting to the APP, the sleep data on the watch can be \nsynchronized to the APP for you to check. \n\n**2.3 stopwatch**\n\nClick the stopwatch to enter the timing interface, and you can record the time once. \n\n**2.4 Weather**\n\nAfter the smartwatch is connected to the app and the data is synchronized, tap Weather on the \nwatch to display the weather information for the day. \n\n**2.5 Find mobile phone**\n\nAfter the watch is bound to the app WearPro, tap this function to find the mobile phone, and the \nmobile phone will vibrate or emit a ringtone. \n\n**2.6 Meteorology**\n\nClick on “Meteorology” on the watch to display the ultraviolet (UV) and air pressure conditions of \nthe day. ", + "page_start": 4, + "page_end": 4, + "source_file": "6126797.pdf" + }, + { + "text": "Enable the SMS notification in the app. When one or more SMS messages are received on the \nmobile phone, the watch will receive one or more SMS reminders at the same time. \n1.5.3. Other application message notifications: \nTurn on the corresponding application message notification in the app, such as WeChat, QQ, \nOutlook, Facebook and other applications. When the mobile phone receives one/multiple \napplication message notifications, the watch will receive one/multiple corresponding message \nreminders at the same time. \n\n**1.6 Frequently used contacts**\n\nThe watch binds to the app, and you allow the watch to access to the phone book of your mobile \nphone, then you can synchronize you contacts of your mobile phone to the smartwatch. \n\n**1.7 Fitness data**\n\nFitness data is turned on by default. When you enter the fitness data interface, scroll up the \nscreen, the smartwatch will display the current data of steps, distance, and calories. The data will \nbe wiped out at 00:00 every day in the morning. \n\n**1.8 Sports modes**(walking, running, cycling, rope skipping, badminton, \n\nbasketball, football) \n\n1.8.1 Select the corresponding exercise mode, click the “Start” button on the screen to start the \nexercise; click the “Start” button again to pause the recording of the exercise; click the “End” \nbutton to end the recording, and save to the data. \n1.8.2 The data can only be saved when the recording of the exercise is more than 1 minute; If the \nrecording time is less than 1 minute, the smartwatch will remind you that the data is too little to be \nsaved. ", + "page_start": 3, + "page_end": 3, + "source_file": "6126797.pdf" + }, + { + "text": "Sports smart watch \nUser Manual \nDT3 Mate \n\n", + "page_start": 0, + "page_end": 0, + "source_file": "6126797.pdf" + }, + { + "text": "**7. Do not disturb mode**\n\nIn the APP, tap “Device” > “More” > “Do not disturb mode”, set the start to end time, such as \n12:00 to 14:00, then you won’t receive phone calls and apps notifications on the watch during this \nperiod. \n\n**8. Daily alarm clock**\n\nIn the APP in the APP Device>More, set the start and the end time, the alarm can be set only once \nor repeatedly on the date (week) setting, and the alarm can be turned on/off. \n\n**9. Sedentary reminder**\n\nSet the start and the end time of the sedentary reminder, and the time interval (minutes) in the \nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting. \nWhen the sedentary time is reached, the watch will vibrate and display a sedentary icon on the \nscreen. \n\n**10. Drink water reminder**\n\nSet the reminder frequency (minutes) and the time period of the start and the end in a day in the \nAPP. You can set the reminder for once or to repeat regularly by entering the repeating setting \nand selecting the date (week) of the water reminder. When the time of drink water reminder is \nreached, the watch will vibrate and there will be a water icon on the screen. ", + "page_start": 6, + "page_end": 6, + "source_file": "6126797.pdf" + }, + { + "text": "**Up button:**\n\nShort press to light up or turn off the screen; one press to go back the dial interface; long press to \nreactivate the watch. \n\n**Button down:**\n\nShort press to enter multi-sport mode. \nIn addition, when the watch is in the off-screen state, you can light up the screen by pressing any \nbuttons. \n\n**Charging instructions:**\n\nWireless charging, as shown in the picture below. ", + "page_start": 1, + "page_end": 1, + "source_file": "6126797.pdf" + }, + { + "text": "smart watch, and click \"Forget this device\". The “About” of the watch has an “Unbind” \n\nbutton, click it to unbind or do it in the APP. For the safety of users’ data, the watch will implement a \n\nfactory reset after that. ", + "page_start": 7, + "page_end": 7, + "source_file": "6126797.pdf" + }, + { + "text": "2.1 Unconnected to the APP state: \n\nAfter the watch is turned on, the Bluetooth will be in the state of being searched. After open the \nAPK/APP, go to Devices > Add Device > click to start searching, select and click the \ncorresponding watch device name, and the watch will be successfully bound to the app. ", + "page_start": 5, + "page_end": 5, + "source_file": "6126797.pdf" + }, + { + "text": "**1.9 Heart rate**\n\nAfter you wearing the smartwatch correctly, you can measure heart rate when you enter the \nheart rate function. If you don’t wear the smartwatch properly, it will remind you to wear firmly \nfor the measurement. \n\n**1.10 ECG**\n\nAfter you wearing the smartwatch correctly, and enter the ECG function(you need to turn on the \nECG interface in the app, you can have single measurement at a time. The data of ECG will be \nsaved in the mobile phone. This function should be used with the app. \n\n**2.0 My QR code**\n\nConnect the watch to the APP, find My QR Code in the APP, select WeChat/QQ/Alipay and other \n\"Receive money QR code\" to sync to the watch (Please follow the instructions of the app to \noperate the function). ", + "page_start": 3, + "page_end": 3, + "source_file": "6126797.pdf" + }, + { + "text": "**2.7 Massager**\n\nTap the green button to start the massage, and the watch is in a vibrating state, tap the red button \nto end the massage state. \n\n**3.0 Menu style**\n\nThere are a variety of menu styles for users to choose. \n\n**3.1 Settings**\n\n1) You can select the watch language on the settings of the watch, or the watch language can be \nsynchronized with your mobile phone language after the watch successfully binds to the APP. \n2) Switch the watch face, swipe to the right to view the next watch face, select a watch face, and \nclick it to set the watch face. \n3) Set screen time; a variety of screen time lengths can be selected. \n4) Vibration intensity; set reminder vibration intensity. \n5) Password; a 4-digit password can be set (if you forget the password, please enter 8762 to \ndecrypt the previous password). \n6) Restore factory settings; click √ to enable the factory reset, and click X to cancel the factory \nreset. ", + "page_start": 4, + "page_end": 4, + "source_file": "6126797.pdf" + }, + { + "text": "3) Swipe to the right when the watch is in the dial interface, you can find time/date/week/the latest \nmessage (enter to view multiple messages)/some of the recently used menu functions, and turn on \nor off audio Bluetooth for calls. \n4) Swipe up the screen when the watch is in the dial interface to enter the menu interface, and \nscroll up and down to find the corresponding function. \n5) Long press the watch face interface and swipe to right or left to switch the watch face, select \none of them and set it with one-click. \n\n**1.2 App notification**\n\n1) When the watch is bound to the APP, and you allow the watch to display notifications on the \nwatch, the new messages received in your mobile phone will be pushed to the watch, and a total of \n10 messages can be saved. The messages received after 10 messages will be overwritten one by \none. \n2) Swipe to the bottom to click the delete icon to clear all message records. \n\n**1.3 Drop-down menu**\n\nScroll down the screen when the watch is in the dial interface to enter the drop-down menu \ninterface. \n1) Bluetooth connection status; time; power left; \n2) About, where you can check the firmware version of watch and the address of the Bluetooth \n3) Setting, where you can enter it to set part of the functions; \n4) Brightness adjustment; where you can adjust the brightness of the screen; \n5) Alipay. Download the app Alipay in your mobile phone and bind it with your watch to realize \noffline payment. ", + "page_start": 2, + "page_end": 2, + "source_file": "6126797.pdf" + } + ] + }, + { + "references": { + "source_file": "OTC_NSANY_2004.pdf", + "query": "Have the operating profits in Japan for Nissan gone up or down in 2004?", + "target_page": 5, + "target_passage": "operating profits in Japan came to ¥341.1 billion, a decrease of 3.2 percent compared to last year", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**The recovery story is complete**\n\nFiscal 2004 was a tough year, full of both anticipated and unexpected risks, but Nissan lived up \n\nto all the challenges. We had a record year in revenues, operating profit, net income, sales \n\nvolume and production. \n\n**Sales performance**\n\nGlobal sales came to 3,388,000 units, which exceeded our forecast of 3,380,000 units. This \n\nrecord level represents an increase of 10.8 percent, or 331,000 units, over fiscal 2003, and is \n\n281,000 units more than the previous record level set in 1990. In fiscal 2004, we released nine \n\nall-new models globally. \n\nAlong with record sales, we achieved a global production record. Nissan’s manufacturing \n\nplants turned out 3,378,000 units, or 293,000 units more than the previous record. \n\n**Financial performance**\n\n• Consolidated net revenues came to 8 trillion ¥576.3 billion, up 15.4 percent from last year. \n\n• Consolidated operating profit improved by 4.4 percent to a record ¥861.2 billion. As a \n\npercentage of net revenue, our operating profit margin came to 10.0 percent. \n\n• Net income reached ¥512.3 billion, an increase of ¥8.6 billion. ", + "page_start": 7, + "page_end": 7, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**Share Performance in Fiscal 2004**\n\nNissan’s share price began at ¥1,143 at the beginning \n\nof fiscal 2004 and ended the fiscal year at ¥1,099, \n\ngenerating a negative return of 3.85 percent. Total \n\nshareholder return (TSR) was -1.67 percent, while the \n\ndividend yield came to 2.18 percent (¥24 per share dividend, \n\ndivided by the ¥1,099 closing price). Adverse movements \n\nin foreign exchange rates and commodity price hikes \n\nadversely affected Nissan’s profitability, which was reflected \n\nin the share price. In addition, specific events relating \n\ndirectly to the company also had a negative impact. Later in \n\nthis report, corporate officers will explain what actions \n\nNissan has undertaken to ensure better performance. \n\n**Payout Policy**\n\nNissan announced its NISSAN Value-Up three-year dividend \n\npolicy, covering the period from fiscal 2005 to fiscal 2007, at \n\nthe annual general meeting of shareholders on June 23, \n\n2004. Nissan proposes a long-term dividend policy to \n\nprovide more visibility and improve transparency into the \n\nways in which Nissan rewards its shareholders. Nissan \n\nbelieves that a long-term dividend policy reduces uncertainty \n\nfor investors who already own or are considering acquiring \n\nNissan stock. ", + "page_start": 16, + "page_end": 16, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "NISSAN REPORTED A RECORD YEAR IN TERMS OF REVENUES, OPERATING INCOME, NET INCOME, \n\nSALES AND PRODUCTION VOLUME IN FISCAL 2004. NISSAN ACHIEVED TWO OF ITS THREE COMMITMENTS \n\nFOR NISSAN 180: AN 8 PERCENT OPERATING PROFIT MARGIN AND ZERO NET AUTOMOTIVE DEBT. \n\nTHE REMAINING COMMITMENT IS THE ACHIEVEMENT OF ONE MILLION ADDITIONAL UNIT SALES. ", + "page_start": 13, + "page_end": 13, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "DESPITE NISSAN’S RECORD OPERATING RESULT IN FISCAL 2004, ITS STOCK PERFORMANCE RETURN WAS \n\nNEGATIVE AND LOWER THAN THE TOPIX INDEX. THE INVESTOR RELATIONS TEAM WAS STRENGTHENED \n\nAT THE START OF FISCAL 2005 TO BETTER ADDRESS THE NEEDS OF INVESTORS AND ENHANCE THEIR \n\nUNDERSTANDING OF NISSAN’S PERFORMANCE. INVESTORS WILL NOW BE ABLE TO GAIN A MORE IN-DEPTH \n\nVIEW OF THE COMPANY’S OPERATIONS AND PERFORMANCE INDICATORS. ", + "page_start": 16, + "page_end": 16, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "“Nissan’s performance in \n\nJapan in 2004 was solid. \n\nProfit rose 1.4 percent and \n\nour market share went up \n\n0.4 percent to 14.6 percent. \n\nLaunching six new models in \n\nthe second half boosted our \n\nresults dramatically: we \n\nregistered a 1.1 percent \n\nincrease in market share \n\nK A Z U H I K O T O I D A \nSenior Vice President \nover the previous period. \n\nAnd for the first time in 19 \n\nyears we had four cars—the Tiida, Note, March and \n\nCube—in the top ten. \n\nOur steady growth has continued into 2005, \n\npowered by positive customer response to both the \n\nMurano and Tiida. These are the kinds of attractive, \n\nunique products that have an immediate impact on \n\nconsumers. We’ve also strengthened our position \n\nin the important small car market, and plan to \n\naugment that with the launch of the Otti, an OEM \n\nproject with Mitsubishi, and the Moco, an OEM \n\nproduct with Suzuki. While we do need to raise our \n\ngame in the SUV market, our overall coverage has \n\nimproved recently. ", + "page_start": 61, + "page_end": 61, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**Looking to the New Fiscal Year**\n\nNissan will continue to grow in fiscal 2005. Even assuming a relatively flat total industry volume \n\nof 61 million units globally, Nissan’s sales are forecast to come to 3,618,000 units, a 6.8 percent \n\nincrease over the prior year. \n\nWorldwide, we will launch six all-new models—five in Japan, one in Europe—leading to \n\ntwenty regional product events. \n\n**Our sales objectives**\n\n• Japan: 933,000 units, a 10 percent increase over last year \n\n• U.S.: 1,047,000 units, an increase of 3.3 percent \n\n• Europe: 550,000 units, a 1.1 percent increase over last year \n\n• General Overseas Markets: 1,088,000 units, a 10.7 percent increase \n\n**Our financial outlook**\n\nAny new fiscal year brings risks and opportunities, and 2005 brings very high levels of \n\nuncertainty and risks—volatility in exchange rates, higher interest rates, higher commodity prices, \n\nhigher energy prices, higher incentives and uncertainty about growth in the U.S. and Japan. The \n\nopportunity is in following through on the NISSAN Value-Up plan quickly and effectively. ", + "page_start": 9, + "page_end": 9, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Nissan Motor Co, Ltd. and Consolidated Subsidiaries Fiscal years 2004.2003 and 2002
Millions of yen2004.31.202003Me. 31.20042002Met 31.2008
Net sales¥ 8.576.277¥ 7.429.219¥ 6.828.588
Cost of sales ( N = 166 #< 11 )6.351.2695.310.1724.872.324
Gross profit2.225.0082.119.0471.956.264
Selling, general and administrative expenses ( Notes 6ond 11 )1.363.8481.294.1921.219.034
Operating income861.160824.855737.230
Other income ( expenses ):Interest income14.93410.321
7.566Interest expense( 26.656 )( 27.290 )
( 25.060 )Equity in earnings of unconsolidatedsubsidiaries and affiliates36.790
11.62311.395Other, net ( Note 12 )( 92.995 )
( 83.012 )( 36.507 )( 67.927 )( 88.358 )
( 42.606 )Income before income taxes andminority interests793.233
736.497694.624Income taxes ( Nete 15 ):Current
179.226137.745113.185Deferred
78.83781.29585.513258.063
219.040198.698Minority interests( 22.889 )
( 13.790 )( 761 )Net income ( Note 18 )¥ 512.281
¥ 503.667¥495.165
", + "page_start": 75, + "page_end": 75, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**NISSAN Value-Up: Sustaining Performance**\n\nNissan’s position today is much different than it was six years ago or even three years ago. In \n\n1999, we were in crisis, and the Nissan Revival Plan was needed to revive our company and \n\nbuild a future. In April 2002, when NISSAN 180 began, we wanted to complete the revival \n\nprocess, with an emphasis on profitable growth. \n\nE \nC \nN \nA \nM \nR \nO \nF \nR \nE \nP \n\nNISSAN Value-Up is about sustaining performance. About taking all the gains we have \n\nmade in connecting with our customers, in growing volumes, in creating value, in earning profits, \n\nin improving management— and then building upon these gains. \n\nWith NISSAN Value-Up, you will not see a radical break from NISSAN 180. This plan is \n\nevolutionary, not revolutionary. We will take the core elements that got us to this point—namely, \n\nmore revenue, less cost, more quality and speed, and maximized Alliance benefit with Renault— \n\nand build upon them. \n\nNISSAN Value-Up has three critical commitments: \nProfit: Nissan will maintain the top level of operating profit margin among global automakers \n\nfor each of the three years of the plan. \n\nVolume: Nissan will achieve global sales of 4.2 million units measured in fiscal 2008. \nROIC: Nissan will achieve a 20 percent ROIC on average over the course of the plan, based \n\non the new formula that excludes cash on hand from the denominator. \n\nNISSAN Value-Up will oversee 28 new models, resulting in the start of production of 70 \n\nmodels worldwide, over two dozen more than the 44 production starts during NISSAN 180. Of \n\nthe 28 new models, 18 will be replacements for existing models and 10 will be completely new \n\n“conquest” models. We will enter more new segments, and we will introduce six models that will \n\ndelight customers by being completely innovative in their concept and benefits. ", + "page_start": 11, + "page_end": 11, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Due to changes in government regulations, information on risks \ninvolved in business operations has been disclosed in the \nYukashoken-Houkokusho for the year ended March 31,2005 \nas follows: \nand that the outcome may be significantly different from that anticipated. \nAs a result, any such verdict or settlement could adversely affect Nissan’s \nfinancial position and operating results. \n\nGovernment Regulations \nThe automobile industry worldwide is influenced by a broad spectrum of \nregulations governing the emission levels of exhaust fumes, fuel economy \nguidelines, noise level limitations and safety standards, and Nissan expects \nthese regulations to become increasingly stringent. In order to ensure \ncompliance, it may be necessary for Nissan to make significant ongoing \ninvestments in these areas which would have an impact on its financial \nposition and results of operations. \n\nEconomic Factors \nThe demand for products manufactured by Nissan is affected by the \neconomic conditions in each country or market in which they are offered \nfor sale. Nissan conducts its operations all over the world and, in particular, \nin the major markets of North America, Europe, and Asia, to say nothing of \nJapan. While Nissan strives to develop a comprehensive and integrated \nprojection of the global economic outlook, any greater-than-anticipated \ndownturn in one of these markets may have a significant effect on Nissan \nfinancial position and results of operations. \n\nInternational Activities and Overseas Expansion \nNissan’s manufacturing and marketing activities outside Japan are \nconducted in the United States, in Europe, and in the developing and \nemerging markets of Asia. Nissan forecasts and evaluates a wide variety of \nrisks inherent in doing business in such overseas markets including the \nfollowing factors, each of which entails a greater-than-anticipated level of \nrisk: ", + "page_start": 72, + "page_end": 72, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**Automotive Debt:**\n\nDespite higher levels incurred for capital expenditures and \n\nR&D, cash generated from operating activities in the \n\nautomotive division eliminated net automotive debt. Nissan \n\nheld a ¥205.8 billion yen net cash position at the close of \n\nfiscal 2004 in this division. \n\n**Rating**\n\nRegarding Nissan’s long-term credit rating, R&I upgraded \n\nNissan from A- to A on May 11, 2005. S&P upgraded their \n\nrating from BBB to BBB+ on July 20, 2004, and Moody’s \n\nupgraded from Baa3 to Baa1 on January 29, 2004. \n\n**Investment Policy**\n\nCapital expenditures increased by ¥50.2 billion to ¥477.5 \n\nbillion, representing 5.6 percent of net revenue. This \n\nincrease included the Canton plant expansion. R&D \n\nexpenditures increased by ¥43.8 billion to ¥398.1 billion. \n\nThis increase went to fund new technologies and product \n\ndevelopment. Our R&D resources are focused on projects \n\nthat add value to our customers and that will deliver an \n\nexpected return, in both the short and long term. ", + "page_start": 15, + "page_end": 15, + "source_file": "OTC_NSANY_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "Microscope Manual.pdf", + "query": "How can CEDAR Oil be used with the AY11236 microscope?", + "target_page": 10, + "target_passage": "1. Drop some cedar oil on to the top of the 100x objective when the 100x objective is being used. NOTE: To maintain a good quality image, rotate the turret right and left several times to eliminate bubbles in the cedar oil. 2. After finishing the observation, wipe off the cedar oil. 3. Do not use the 40x objective until you have wiped off all of the cedar oil.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Spare 6V20W Halogen Bulb \n1 \n\n1 Lens Cleaning Tissue \n\n1 Cedar Oil \n\n1 1A Fuse (spare) \n\n1 Specification \n\nInspection Certificate 1 \n\nPacking List 1 \n\n**OPERATION**\n\nNote: For oil immersion, please use the index of refraction 1.515 oil \n**Eyepiece Specifications**\n\n1. Remove all components from package. Identify all parts before \n assembling instrument. \n2. Attach 4x, 10x and 40x objectives by screwing into revolving \n turret. Tighten and secure to maximum finger pressure only. \n3. Place the specimen on the stage and secure with spring clips. \n NOTE: The cover glass must face upward (the thinner glass is \n the cover glass), otherwise when the 40x objective is used the \n specimen cannot be observed. Observation is best when the \n thickness of the cover glass is 0.1-1.1mm and the cover glass \n is 0.17mm. \n4. Plug power cord into an electrical outlet. Turn microscope \n lamp ON. \n5. Observe the specimen using the lowest magnification objective \n first. The 10x objective provides a larger field of view making it \n easier to search the specimen. \n\n**Classification Magnification**\n**Field of View (FOV)**\n**Diameter**\n\nPlain Field \nEyepiece \n10x 18mm ", + "page_start": 8, + "page_end": 8, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**Fig. 1 - Objective Parts**\n\n10. If the image is in focus with the 10x objective, you can select \n other objectives and observe the specimen even if the fine \n adjustment knob has not been used by using the following \n method (See Fig. 1): \nAperture of \nDiaphragm \n\n1. Unscrew the 40x or 100x objective and remove from \n turret. \n2. Remove the mark sleeve. \n3. Turn the ring on the objective to adjust its parfocal \n distance. \n4. Re-insert the objective and compare with the 10x. \n5. Adjust until the 40x and 100x objectives image is clear. \n\n**Fig. 2 - Condenser Diaphram Aperture**\n\n**TROUBLESHOOTING**\n\n**USING THE CEDAR OIL**\n\n1. Drop some cedar oil on to the top of the 100x objective when the \n 100x objective is being used. NOTE: To maintain a good quality \n image, rotate the turret right and left several times to eliminate \n bubbles in the cedar oil. \n2. After finishing the observation, wipe off the cedar oil. \n3. Do not use the 40x objective until you have wiped off all of the \n cedar oil. ", + "page_start": 9, + "page_end": 9, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**OPERATION (cont.)**\n\n**Model AY11240** **Model AY11238**\n\n7. To clearly see the outline of the \n specimen, rotate the coarse \n adjustment knob and lower \n the barrel to the space limiter. \n8. Rotate the fine adjustment knob \n until the image is in sharp focus. \n When using other objectives, rotate \n the fine focus adjustment until the \n image is in focus. 6. To clearly see the outline of the \n specimen, rotate the coarse \n adjustment knob and lower \n the barrel to the space limiter. \n7. Rotate the fine adjustment knob \n until the image is in sharp focus. \n When using other objectives, rotate \n the fine focus adjustment until the \n image is in focus. \n\nFocus \nKnob \nEyepiece \nVertical \nPole Eyepiece \n\nDiopter \nAdjustment \n\nPrism \nCap \n\nFocus \nKnob \n\nLens \nHousing \n\nOblique \nIlluminator \nIllumination \nControls \nRotary \nCase \n\n1. To obtain the best contrast for observing, match the hole size to \n the objective that is being used to view the specimen. \n2. Each hole has a corresponding number from 1 to 5. 1 is the \n smallest hole; 5 is the largest hole. \n Use the following guidelines to match the hole number to the \n objective that you have selected: \n 40x objective: Use #5 hole \n 10x objective: Use #4 or #3 hole \n 4x objective: Use #2 or #1 hole \n\nLens \nSpring \nClips \nSpring \nClips \nStage \nStage \n\n**Model AY11232**", + "page_start": 3, + "page_end": 3, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "BARSKA Model AY11236 is a fixed power compound microscope. \nIt is constructed with two optical paths at the same angle. It is \nequipped with transmitted illumination. By using this instrument, \nthe user can observe specimens at magnification from 40x to \n1000x by selecting the desired objective lens. Coarse and fine \nfocus adjustments provide accuracy and image detail. The rotating \nhead allows the user to position the eyepieces for maximum \nviewing comfort and easy access to all adjustment knobs. ", + "page_start": 7, + "page_end": 7, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**Model AY11230**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Tighten the knob on the stand to \n prevent the elevator from sliding \n down. \n3. Fix the binocular body on the stand \n with the tightening screw. \n4. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment Knobs \n change the oblique or transmitted light \n independently. The transmitted \n illuminator fluorescent lamp cannot be \n adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting of \n the sample. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment knobs \n change the oblique or transmitted \n light independently. The transmitted \n illuminator fluorescent lamp cannot \n be adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting \n of the sample. \n\n**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece. ", + "page_start": 6, + "page_end": 6, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**MODEL AY11240/AY11238**\n\nEyepiece \n\nEyepiece Monocular Tube \n\nEyepiece \nSet Screw \n\nRotating Head \n\nStage Height \nLimit Adjustment \nBarrel \n\nRevolving \nTurret \n\nCoarse \nAdjustment \nKnob \nStand \nRevolving Turret \n\nObjectives \n\nObjectives \nSpring \nClips \nCoarse \nAdjustment \nKnob Fine \nAdjustment \nKnob \nSpring Clips \n\n**IMPORTANT NOTES**\nStage \nStand \n\n5-Hole \nDiaphragm \nand Condenser \nFine \nAdjustment \nKnob \nStage \n\nCongratulations on your purchase of this high quality BARSKA \nmicroscope. With proper care, this microscope will provide many \nyears of use. Please read the following instructions before \noperating this instrument. \n1. Do not attempt to disassemble the instrument. This product has \n been carefully assembled at the factory and should only be \n examined by a factory-trained technician. \n2. This instrument should only be used in an environment with an \n indoor temperature range of 32oF to 104oF. \n3. Do not use this instrument in an environment with a lot of dust. \n**Cover the instrument when not in use.**\n4. Do not subject the instrument to shock. \n\n5-Hole \nDiaphragm \nand Condenser \nConcave \nMirror \nPower \nCord Lamp \n\nLamp \nOn/Off \nSwitch \n\n**Model AY11240** **Model AY11238**\n\n**MICROSCOPE USAGE**", + "page_start": 1, + "page_end": 1, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**Model AY11228**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Tighten the knob on the stand to \n prevent the elevator from sliding \n down. \n3. Fix the binocular body on the stand \n with the tightening screw. \n4. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment Knobs \n change the oblique or transmitted light \n independently. The transmitted \n illuminator fluorescent lamp cannot be \n adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting of \n the sample. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment knobs \n change the oblique or transmitted \n light independently. The transmitted \n illuminator fluorescent lamp cannot \n be adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting \n of the sample. \n\n**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece. ", + "page_start": 4, + "page_end": 4, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**OPERATION**\n\n**Model AY11234**\n**Optical Specifications - Model AY11234**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**", + "page_start": 6, + "page_end": 6, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**OPERATION**\n\n**Model AY11232**\n**Optical Specifications - Model AY11232**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**", + "page_start": 4, + "page_end": 4, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
ProblemPossible CauseSolution
1. Image not clear.1. Specimen is in incorrect2. Lans is dirty. 2. Lans is dirty. 3. Coldar oil first placed on metastasis of biomersion objective. 4. Butbles in Credar oilS. Codar oil on 40x objective. 6. Sris diaphragm open too wide.1. Re - position specimen. 2. Clean lens. 3. Put a drop of Cedar oil on proportions. 4. Rotate turnet several times by the compared to eliminate bubbles. 5. Clean 40x sbjective. 6. Reduce size of iris diaphragm.
2. Poor illumination.1. Condenser position is incorrect. 2. Lens is dirty. 3. Specimen is not placed level.1. Re - position condenser. 2. Clean lens. 3. Re - position specimen so it is level.
3. Illumination not bright.1. Iris diaphragm opening too small. 2. Position of condenser too low. 3. Lens is dirty.1. Open iris diaphragm wider. 2. Raise condenser. 3. Clean lens.
4. Cannot focus at high magnification.1. Specimen is in incorrect position.1. Re - position specimen.
5. Objective lenses touch specimen.1. Stage is too high.1. Re - position stage.
", + "page_start": 9, + "page_end": 9, + "source_file": "Microscope Manual.pdf" + } + ] + }, + { + "references": { + "source_file": "Microscope Manual.pdf", + "query": "For the AY11230 microscope, what is the interpupillary adjustment?", + "target_page": 7, + "target_passage": "Model AY11230 1. Interpupillary Adjustment: 55mm - 75mm", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Model AY11230**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: 60mm \n4. Elevator Adjustment Range: 110mm \n5. Right Diopter Adjustment Range: +4 to -6 dopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique illumination: 12V 10W Halogen Lamp \n\n**Model AY11234**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: >50mm \n4. Elevator Adjustment Range: 110mm \n5. Diopter Adjustment Range: +/- 5 diopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique Illumination: 12V 10W Halogen Lamp \n Transmitted Illumination: 12V 10W Halogen Lamp \n\n**Optical Specifications - Model AY11230**\n\n\n \n \n \n \n [html]\n
Total MagnificationObjective | MagnificationEyepiece Magnification & Field Diameter ( mm )Working Distance
20x, 40x2x, 4xWide Field 10x, 20mm90mm
", + "page_start": 6, + "page_end": 6, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**Model AY11230**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Tighten the knob on the stand to \n prevent the elevator from sliding \n down. \n3. Fix the binocular body on the stand \n with the tightening screw. \n4. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment Knobs \n change the oblique or transmitted light \n independently. The transmitted \n illuminator fluorescent lamp cannot be \n adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting of \n the sample. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment knobs \n change the oblique or transmitted \n light independently. The transmitted \n illuminator fluorescent lamp cannot \n be adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting \n of the sample. \n\n**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece. ", + "page_start": 6, + "page_end": 6, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**Model AY11228**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: 60mm \n4. Elevator Adjustment Range: 110mm \n5. Right Diopter Adjustment Range: +4 to -6 dopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique illumination: 12V 10W Halogen Lamp \n\n**Model AY11232**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: >50mm \n4. Elevator Adjustment Range: 110mm \n5. Diopter Adjustment Range: +/- 5 diopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique Illumination: 12V 10W Halogen Lamp \n Transmitted Illumination: 12V 10W Halogen Lamp \n\n**Optical Specifications - Model AY11228**\n\n\n \n \n \n \n [html]\n
Total MagnificationObjective | MagnificationEyepiece Magnification & Field Diameter ( mm )Working Distance
20x, 40x2x, 4xWide Field 10 ×, 20mm90mm
", + "page_start": 4, + "page_end": 4, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**Model AY11228**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Tighten the knob on the stand to \n prevent the elevator from sliding \n down. \n3. Fix the binocular body on the stand \n with the tightening screw. \n4. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment Knobs \n change the oblique or transmitted light \n independently. The transmitted \n illuminator fluorescent lamp cannot be \n adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting of \n the sample. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment knobs \n change the oblique or transmitted \n light independently. The transmitted \n illuminator fluorescent lamp cannot \n be adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting \n of the sample. \n\n**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece. ", + "page_start": 4, + "page_end": 4, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**OPERATION (cont.)**\n\n6. Adjust the interpupillary distance by using the eyepiece \n interpupillary slide adjustment. \n7. Observe using the right eyepiece adjusting the coarse and fine \n focus and adjust the diopter ring until image is clear and sharp. \n8. Observe with the left eyepiece and adjust the diopter ring until \n image is clear and sharp. \n9. Rotate the fine focus adjustment when using other objectives. \n NOTE: This instrument is equipped with patent objectives so \n the precision or parfocalization is very high. \n\n**ADJUSTING THE CONDENSER APERTURE**\n\n1. The numerical aperture of the condenser should match the \n numerical aperture of the objective being used. \n2. To make sure that the objectives are imaging properly \n (especially the 40x and 100x), follow this procedure: \n\n1. Take off the eyepiece. \n2. Look through the eyepiece. \n 3. The smallest circle or light that you can see is the \n\n eyepiece's exit pupil. \n4. Adjust the aperture of the iris diaphragm in the \n condenser to 70% or 80% for the best contrast for \n observation (See Fig. 2.). \n\nAdjustable \nRing Tightening \nRing Mark \nSleeve Front \nSleeve \n\nExit Pupil \nof Objective ", + "page_start": 9, + "page_end": 9, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**OPERATION (cont.)**\n\n**Model AY11240** **Model AY11238**\n\n7. To clearly see the outline of the \n specimen, rotate the coarse \n adjustment knob and lower \n the barrel to the space limiter. \n8. Rotate the fine adjustment knob \n until the image is in sharp focus. \n When using other objectives, rotate \n the fine focus adjustment until the \n image is in focus. 6. To clearly see the outline of the \n specimen, rotate the coarse \n adjustment knob and lower \n the barrel to the space limiter. \n7. Rotate the fine adjustment knob \n until the image is in sharp focus. \n When using other objectives, rotate \n the fine focus adjustment until the \n image is in focus. \n\nFocus \nKnob \nEyepiece \nVertical \nPole Eyepiece \n\nDiopter \nAdjustment \n\nPrism \nCap \n\nFocus \nKnob \n\nLens \nHousing \n\nOblique \nIlluminator \nIllumination \nControls \nRotary \nCase \n\n1. To obtain the best contrast for observing, match the hole size to \n the objective that is being used to view the specimen. \n2. Each hole has a corresponding number from 1 to 5. 1 is the \n smallest hole; 5 is the largest hole. \n Use the following guidelines to match the hole number to the \n objective that you have selected: \n 40x objective: Use #5 hole \n 10x objective: Use #4 or #3 hole \n 4x objective: Use #2 or #1 hole \n\nLens \nSpring \nClips \nSpring \nClips \nStage \nStage \n\n**Model AY11232**", + "page_start": 3, + "page_end": 3, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**MODEL AY11230/AY11234**\n\n**Model AY11228**\nVertical \nTube Vertical \nTube \nDiopter \nAdjustment \nDiopter \nAdjustment Eyepiece \nEyepiece \n\nPrism \nCap \n\nPrism \nCap \nFocus \nKnob \n\nMagnification \nAdjustment \nKnob \n\nRotary \nCase \nFocus \nKnob \nLens \nHousing \n\nOblique \nIlluminator \nLens \n\nTightening \nKnob Oblique \nIlluminator \nSpring \nClips \n\nSpring \nClips \nStage \nIllumination \nControls \nStage ", + "page_start": 5, + "page_end": 5, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "Diopter \nAdjustment \n\n", + "page_start": 3, + "page_end": 3, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**MODEL AY11240/AY11238**\n\nEyepiece \n\nEyepiece Monocular Tube \n\nEyepiece \nSet Screw \n\nRotating Head \n\nStage Height \nLimit Adjustment \nBarrel \n\nRevolving \nTurret \n\nCoarse \nAdjustment \nKnob \nStand \nRevolving Turret \n\nObjectives \n\nObjectives \nSpring \nClips \nCoarse \nAdjustment \nKnob Fine \nAdjustment \nKnob \nSpring Clips \n\n**IMPORTANT NOTES**\nStage \nStand \n\n5-Hole \nDiaphragm \nand Condenser \nFine \nAdjustment \nKnob \nStage \n\nCongratulations on your purchase of this high quality BARSKA \nmicroscope. With proper care, this microscope will provide many \nyears of use. Please read the following instructions before \noperating this instrument. \n1. Do not attempt to disassemble the instrument. This product has \n been carefully assembled at the factory and should only be \n examined by a factory-trained technician. \n2. This instrument should only be used in an environment with an \n indoor temperature range of 32oF to 104oF. \n3. Do not use this instrument in an environment with a lot of dust. \n**Cover the instrument when not in use.**\n4. Do not subject the instrument to shock. \n\n5-Hole \nDiaphragm \nand Condenser \nConcave \nMirror \nPower \nCord Lamp \n\nLamp \nOn/Off \nSwitch \n\n**Model AY11240** **Model AY11238**\n\n**MICROSCOPE USAGE**", + "page_start": 1, + "page_end": 1, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**COARSE KNOB ADJUSTMENT - Model AY11240**\n**MICROSCOPE USAGE**\n\n1. The coarse adjustment knob has an adjustable heavy-light nut \n (See Fig.1). \n2. To adjust the knob loosen or tighten the nut. \n NOTE: Adjusting the nut too tight will make focusing difficult. \n Adjusting the nut too loose will cause the tube to slide. \n\nBARSKA Model AY11228 and Model AY11232 are designed for \nbiological studies such as specimen examination. They can also \nbe used for examining bacteria and for general clinical and medical \nstudies. Simple design and use is especially useful for school \nclassroom instruction. ", + "page_start": 3, + "page_end": 3, + "source_file": "Microscope Manual.pdf" + } + ] + }, + { + "references": { + "source_file": "Microscope Manual.pdf", + "query": "The illumination of my AY11236 microscope is not very strong, what can I do to solve this?", + "target_page": 10, + "target_passage": "1. Open iris diaphragm wider. 2. Raise condenser. 3. Clean lens.", + "chunk_present": { + "presence": true, + "index": 6 + } + }, + "top_chunk": [ + { + "text": "**Model AY11230**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Tighten the knob on the stand to \n prevent the elevator from sliding \n down. \n3. Fix the binocular body on the stand \n with the tightening screw. \n4. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment Knobs \n change the oblique or transmitted light \n independently. The transmitted \n illuminator fluorescent lamp cannot be \n adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting of \n the sample. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment knobs \n change the oblique or transmitted \n light independently. The transmitted \n illuminator fluorescent lamp cannot \n be adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting \n of the sample. \n\n**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece. ", + "page_start": 6, + "page_end": 6, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**Model AY11228**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Tighten the knob on the stand to \n prevent the elevator from sliding \n down. \n3. Fix the binocular body on the stand \n with the tightening screw. \n4. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment Knobs \n change the oblique or transmitted light \n independently. The transmitted \n illuminator fluorescent lamp cannot be \n adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting of \n the sample. \n\n1. Depending on microscope use, select \n oblique or transmitted illumination. \n2. The Brightness Adjustment knobs \n change the oblique or transmitted \n light independently. The transmitted \n illuminator fluorescent lamp cannot \n be adjusted. \n3. The angle of the oblique lamp can be \n adjusted to ensure optimum lighting \n of the sample. \n\n**CHANGING THE INTERPUPILLARY**\n**DISTANCE**\n1. The distance between the observer's \n pupils is the interpupillary distance. \n2. To adjust the interpupillary distance \n rotate the prism caps until both eyes \n coincide with the image in the \n eyepiece. ", + "page_start": 4, + "page_end": 4, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**Model AY11238**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Attach 4x, 10x and 40x objectives \n to revolving turret. 3. Place the \n specimen on the stage and \n secure with spring clips. NOTE: The \n cover glass must face upward (the \n thinner glass is the cover glass), \n otherwise when the 40x objective is \n used the specimen cannot be \n observed. Observation is best when \n the thickness of the cover glass is \n 0.1-1.1mm and the cover glass is \n 0.17mm. \n4. Plug power cord into an electrical \n outlet. Turn microscope \n lamp ON. \n5. Observe the specimen using the \n lowest magnification objective \n first. The 4x objective provides a \n larger field of view to search \n specimen. ", + "page_start": 2, + "page_end": 2, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**OPERATION**\n\n**Model AY11234**\n**Optical Specifications - Model AY11234**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**", + "page_start": 6, + "page_end": 6, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**OPERATION (cont.)**\n\n**Model AY11240** **Model AY11238**\n\n7. To clearly see the outline of the \n specimen, rotate the coarse \n adjustment knob and lower \n the barrel to the space limiter. \n8. Rotate the fine adjustment knob \n until the image is in sharp focus. \n When using other objectives, rotate \n the fine focus adjustment until the \n image is in focus. 6. To clearly see the outline of the \n specimen, rotate the coarse \n adjustment knob and lower \n the barrel to the space limiter. \n7. Rotate the fine adjustment knob \n until the image is in sharp focus. \n When using other objectives, rotate \n the fine focus adjustment until the \n image is in focus. \n\nFocus \nKnob \nEyepiece \nVertical \nPole Eyepiece \n\nDiopter \nAdjustment \n\nPrism \nCap \n\nFocus \nKnob \n\nLens \nHousing \n\nOblique \nIlluminator \nIllumination \nControls \nRotary \nCase \n\n1. To obtain the best contrast for observing, match the hole size to \n the objective that is being used to view the specimen. \n2. Each hole has a corresponding number from 1 to 5. 1 is the \n smallest hole; 5 is the largest hole. \n Use the following guidelines to match the hole number to the \n objective that you have selected: \n 40x objective: Use #5 hole \n 10x objective: Use #4 or #3 hole \n 4x objective: Use #2 or #1 hole \n\nLens \nSpring \nClips \nSpring \nClips \nStage \nStage \n\n**Model AY11232**", + "page_start": 3, + "page_end": 3, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "Spare 6V20W Halogen Bulb \n1 \n\n1 Lens Cleaning Tissue \n\n1 Cedar Oil \n\n1 1A Fuse (spare) \n\n1 Specification \n\nInspection Certificate 1 \n\nPacking List 1 \n\n**OPERATION**\n\nNote: For oil immersion, please use the index of refraction 1.515 oil \n**Eyepiece Specifications**\n\n1. Remove all components from package. Identify all parts before \n assembling instrument. \n2. Attach 4x, 10x and 40x objectives by screwing into revolving \n turret. Tighten and secure to maximum finger pressure only. \n3. Place the specimen on the stage and secure with spring clips. \n NOTE: The cover glass must face upward (the thinner glass is \n the cover glass), otherwise when the 40x objective is used the \n specimen cannot be observed. Observation is best when the \n thickness of the cover glass is 0.1-1.1mm and the cover glass \n is 0.17mm. \n4. Plug power cord into an electrical outlet. Turn microscope \n lamp ON. \n5. Observe the specimen using the lowest magnification objective \n first. The 10x objective provides a larger field of view making it \n easier to search the specimen. \n\n**Classification Magnification**\n**Field of View (FOV)**\n**Diameter**\n\nPlain Field \nEyepiece \n10x 18mm ", + "page_start": 8, + "page_end": 8, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
ProblemPossible CauseSolution
1. Image not clear.1. Specimen is in incorrect2. Lans is dirty. 2. Lans is dirty. 3. Coldar oil first placed on metastasis of biomersion objective. 4. Butbles in Credar oilS. Codar oil on 40x objective. 6. Sris diaphragm open too wide.1. Re - position specimen. 2. Clean lens. 3. Put a drop of Cedar oil on proportions. 4. Rotate turnet several times by the compared to eliminate bubbles. 5. Clean 40x sbjective. 6. Reduce size of iris diaphragm.
2. Poor illumination.1. Condenser position is incorrect. 2. Lens is dirty. 3. Specimen is not placed level.1. Re - position condenser. 2. Clean lens. 3. Re - position specimen so it is level.
3. Illumination not bright.1. Iris diaphragm opening too small. 2. Position of condenser too low. 3. Lens is dirty.1. Open iris diaphragm wider. 2. Raise condenser. 3. Clean lens.
4. Cannot focus at high magnification.1. Specimen is in incorrect position.1. Re - position specimen.
5. Objective lenses touch specimen.1. Stage is too high.1. Re - position stage.
", + "page_start": 9, + "page_end": 9, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "**OPERATION**\n\n**Model AY11232**\n**Optical Specifications - Model AY11232**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**", + "page_start": 4, + "page_end": 4, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "A.H. Cooper et al.·165 (2024) 2863–2876 \n2866 \n\nimage \nand 640-nm diode lasers. Full thickness, tiled, confocal \nstacks with a 2- to 3-mm interval \nin the Z-axis were obtained \nthrough a 203 dry lens (0.8 NA) with the confocal aperture set to 1 \nAiry unit or less. All image capture was performed using Zen Blue \nEdition software (Carl Zeiss Microscopy GmbH, Jena, Germany), \nand analyses were performed using Zen Blue or FIJI.45 \n\n2.5. Image analysis ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed2.pdf" + }, + { + "text": "**Model AY11230**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: 60mm \n4. Elevator Adjustment Range: 110mm \n5. Right Diopter Adjustment Range: +4 to -6 dopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique illumination: 12V 10W Halogen Lamp \n\n**Model AY11234**\n1. Interpupillary Adjustment: 55mm - 75mm \n2. Working Stage Diameter: 95mm \n3. Focus Knob Adjustment Range: >50mm \n4. Elevator Adjustment Range: 110mm \n5. Diopter Adjustment Range: +/- 5 diopters \n6. Illumination: \n Input Voltage: 110V AC or 220V \n Output: Oblique Illumination: 12V 10W Halogen Lamp \n Transmitted Illumination: 12V 10W Halogen Lamp \n\n**Optical Specifications - Model AY11230**\n\n\n \n \n \n \n [html]\n
Total MagnificationObjective | MagnificationEyepiece Magnification & Field Diameter ( mm )Working Distance
20x, 40x2x, 4xWide Field 10x, 20mm90mm
", + "page_start": 6, + "page_end": 6, + "source_file": "Microscope Manual.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia3.pdf", + "query": "What event marks the beginning of the field of artificial intelligence?", + "target_page": 22, + "target_passage": "The field of AI research was founded at a workshop at Dartmouth College in 1956.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**History**\n\nThe study of mechanical or \"formal\" reasoning began with philosophers and mathematicians in antiquity. \nThe study of logic led directly to Alan Turing's theory of computation, which suggested that a machine, \nby shuffling symbols as simple as \"0\" and \"1\", could simulate any conceivable form of mathematical \nreasoning.[319][320] This, along with concurrent discoveries in cybernetics, information theory and \nneurobiology, led researchers to consider the possibility of building an \"electronic brain\".[r] They \ndeveloped several areas of research that would become part of AI,[322] such as McCullouch and Pitts \ndesign for \"artificial neurons\" in 1943,[115] and Turing's influential 1950 paper 'Computing Machinery \nand Intelligence', which introduced the Turing test and showed that \"machine intelligence\" was \nplausible.[323][320] \n\nThe field of AI research was founded at a workshop at Dartmouth College in 1956.[s][6] The attendees \nbecame the leaders of AI research in the 1960s.[t] They and their students produced programs that the \npress described as \"astonishing\":[u] computers were learning checkers strategies, solving word problems \nin algebra, proving logical theorems and speaking English.[v][7] Artificial intelligence laboratories were \nset up at a number of British and U.S. universities in the latter 1950s and early 1960s.[320] ", + "page_start": 21, + "page_end": 21, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Artificial intelligence was founded as an academic discipline in 1956,[6] and the field went through \nmultiple cycles of optimism throughout its history,[7][8] followed by periods of disappointment and loss of \nfunding, known as AI winters.[9][10] Funding and interest vastly increased after 2012 when deep learning \noutperformed previous AI techniques.[11] This growth accelerated further after 2017 with the transformer \narchitecture,[12] and by the early 2020s many billions of dollars were being invested in AI and the field \nexperienced rapid ongoing progress in what has become known as the AI boom. The emergence of \nadvanced generative AI in the midst of the AI boom and its ability to create and modify content exposed \nseveral unintended consequences and harms in the present and raised concerns about the risks of AI and \nits long-term effects in the future, prompting discussions about regulatory policies to ensure the safety \nand benefits of the technology. ", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia3.pdf" + }, + { + "text": "In November 2023, the first global AI Safety Summit was held in Bletchley Park in the UK to discuss the \nnear and far term risks of AI and the possibility of mandatory and voluntary regulatory frameworks.[314] \n28 countries including the United States, China, and the European Union issued a declaration at the start \nof the summit, calling for international co-operation to manage the challenges and risks of artificial \nintelligence.[315][316] In May 2024 at the AI Seoul Summit, 16 global AI tech companies agreed to safety \ncommitments on the development of AI.[317][318] ", + "page_start": 21, + "page_end": 21, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Edward Fredkin argues that \"artificial intelligence is the next step in evolution\", an idea first proposed by \nSamuel Butler's \"Darwin among the Machines\" as far back as 1863, and expanded upon by George \nDyson in his 1998 book*Darwin Among the Machines: The Evolution of Global Intelligence*.[398] ", + "page_start": 27, + "page_end": 27, + "source_file": "wikipedia3.pdf" + }, + { + "text": "nlinePubs-Nils/General%20Essays/AIMag04-04-002.pdf) (PDF).*AI Magazine*.**1**(1). \nArchived (https://web.archive.org/web/20200817194457/http://ai.stanford.edu/~nilsson/Onlin \nePubs-Nils/General%20Essays/AIMag04-04-002.pdf) (PDF) from the original on 17 August \n2020. Retrieved 22 August 2020. Presidential Address to the Association for the \nAdvancement of Artificial Intelligence. \n\nNRC (United States National Research Council) (1999). \"Developments in Artificial \n\nIntelligence\".*Funding a Revolution: Government Support for Computing Research*. National \nAcademy Press. \n\nOmohundro, Steve (2008).*The Nature of Self-Improving Artificial Intelligence*. presented and \n\ndistributed at the 2007 Singularity Summit, San Francisco, CA. \n\nOudeyer, P-Y. (2010). \"On the impact of robotics in behavioral and cognitive sciences: from \n\ninsect navigation to human cognitive development\" (http://www.pyoudeyer.com/IEEETAMD \nOudeyer10.pdf) (PDF).*IEEE Transactions on Autonomous Mental Development*.**2**(1): 2– \n16. doi:10.1109/tamd.2009.2039057 (https://doi.org/10.1109%2Ftamd.2009.2039057). \nS2CID 6362217 (https://api.semanticscholar.org/CorpusID:6362217). Archived (https://web. \narchive.org/web/20181003202543/http://www.pyoudeyer.com/IEEETAMDOudeyer10.pdf) \n(PDF) from the original on 3 October 2018. Retrieved 4 June 2013. ", + "page_start": 61, + "page_end": 61, + "source_file": "wikipedia3.pdf" + }, + { + "text": "**Defining artificial intelligence**\nAlan Turing wrote in 1950 \"I propose to consider the question 'can machines think'?\"[359] He advised \nchanging the question from whether a machine \"thinks\", to \"whether or not it is possible for machinery to \nshow intelligent behaviour\".[359] He devised the Turing test, which measures the ability of a machine to \nsimulate human conversation.[323] Since we can only observe the behavior of the machine, it does not \nmatter if it is \"actually\" thinking or literally has a \"mind\". Turing notes that we can not determine these \nthings about other people but \"it is usual to have a polite convention that everyone thinks.\"[360] \n\nRussell and Norvig agree with Turing that intelligence must be \ndefined in terms of external behavior, not internal structure.[1] \nHowever, they are critical that the test requires the machine to \nimitate humans. \"Aeronautical engineering texts\", they wrote, \"do \nnot define the goal of their field as making 'machines that fly so \nexactly like pigeons that they can fool other pigeons.' \"[362] AI \nfounder \nthat \"Artificial \nintelligence \nis not, by definition, simulation of human \nintelligence\".[363] \n\nJohn McCarthy agreed, writing ", + "page_start": 23, + "page_end": 23, + "source_file": "wikipedia3.pdf" + }, + { + "text": "**Artificial intelligence**\n\n**Artificial intelligence**(**AI**), in its broadest sense, is intelligence exhibited by machines, particularly \ncomputer systems. It is a field of research in computer science that develops and studies methods and \nsoftware that enable machines to perceive their environment and use learning and intelligence to take \nactions that maximize their chances of achieving defined goals.[1] Such machines may be called AIs. \n\nHigh-profile applications of AI include advanced web search engines (e.g., Google Search); \nrecommendation systems (used by YouTube, Amazon, and Netflix); virtual assistants (e.g., Google \nAssistant, Siri, and Alexa); autonomous vehicles (e.g., Waymo); generative and creative tools (e.g., \nChatGPT and AI art); and superhuman play and analysis in strategy games (e.g., chess and Go). However, \nmany AI applications are not perceived as AI: \"A lot of cutting edge AI has filtered into general \napplications, often without being called AI because once something becomes useful enough and common \nenough it's not labeled AI anymore.\"[2][3] \n\nVarious subfields of AI research are centered around particular goals and the use of particular tools. The \ntraditional goals of AI research include reasoning, knowledge representation, planning, learning, natural \nlanguage processing, perception, and support for robotics.[a] General intelligence—the ability to complete \nany task performed by a human on an at least equal level—is among the field's long-term goals.[4] To \nreach these goals, AI researchers have adapted and integrated a wide range of techniques, including \nsearch and mathematical optimization, formal logic, artificial neural networks, and methods based on \nstatistics, operations research, and economics.[b] AI also draws upon psychology, linguistics, philosophy, \nneuroscience, and other fields.[5] ", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Researchers in the 1960s and the 1970s were convinced that their methods would eventually succeed in \ncreating a machine with general intelligence and considered this the goal of their field.[327] In 1965 \nHerbert Simon predicted, \"machines will be capable, within twenty years, of doing any work a man can \ndo\".[328] In 1967 Marvin Minsky agreed, writing that \"within a generation ... the problem of creating \n'artificial intelligence' will substantially be solved\".[329] They had, however, underestimated the difficulty \nof the problem.[w] In 1974, both the U.S. and British governments cut off exploratory research in \nresponse to the criticism of Sir James Lighthill[331] and ongoing pressure from the U.S. Congress to fund \nmore productive projects.[332] Minsky's and Papert's book*Perceptrons*was understood as proving that \nartificial neural networks would never be useful for solving real-world tasks, thus discrediting the \napproach altogether.[333] The \"AI winter\", a period when obtaining funding for AI projects was difficult, \nfollowed.[9] \n\nIn the early 1980s, AI research was revived by the commercial success of expert systems,[334] a form of \nAI program that simulated the knowledge and analytical skills of human experts. By 1985, the market for \nAI had reached over a billion dollars. At the same time, Japan's fifth generation computer project inspired \nthe U.S. and British governments to restore funding for academic research.[8] However, beginning with \nthe collapse of the Lisp Machine market in 1987, AI once again fell into disrepute, and a second, longer- \nlasting winter began.[10] ", + "page_start": 21, + "page_end": 21, + "source_file": "wikipedia3.pdf" + }, + { + "text": "**Regulation**\n\nThe regulation of artificial intelligence is the development \nof public sector policies and laws for promoting and \nregulating AI; it is therefore related to the broader regulation \nof algorithms.[302] The regulatory and policy landscape for \nAI is an emerging issue in jurisdictions globally.[303] \nAccording to AI Index at Stanford, the annual number of \nAI-related laws passed in the 127 survey countries jumped \nfrom one passed \nin 2022 \nalone.[304][305] Between 2016 and 2020, more than 30 \ncountries adopted dedicated strategies for AI.[306] Most EU \nmember states had released national AI strategies, as had \nCanada, China, India, Japan, Mauritius, \nthe Russian \nFederation, Saudi Arabia, United Arab Emirates, U.S., and \nVietnam. Others were in the process of elaborating their own AI strategy, including Bangladesh, Malaysia \nand Tunisia.[306] The Global Partnership on Artificial Intelligence was launched in June 2020, stating a \nneed for AI to be developed in accordance with human rights and democratic values, to ensure public \nconfidence and trust in the technology.[306] Henry Kissinger, Eric Schmidt, and Daniel Huttenlocher \npublished a joint statement in November 2021 calling for a government commission to regulate AI.[307] \nIn 2023, OpenAI leaders published recommendations for the governance of superintelligence, which they \nbelieve may happen in less than 10 years.[308] In 2023, the United Nations also launched an advisory \nbody to provide recommendations on AI governance; the body comprises technology company \nexecutives, governments officials and academics.[309] In 2024, the Council of Europe created the first \ninternational legally binding treaty on AI, called the \"Framework Convention on Artificial Intelligence \nand Human Rights, Democracy and the Rule of Law\". It was adopted by the European Union, the United \nStates, the United Kingdom, and other signatories.[310] \n\nin 2016 to 37 passed ", + "page_start": 20, + "page_end": 20, + "source_file": "wikipedia3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
q. Sometimes called a “ robopocalypse ”[ 299 ]
r. “ Electronic brain ” was the term used by the press around this time. EQTRECT3
s. Darriel Crevier wrote, \" the conterence is genorrally recognized as the official birthdate of the new science.\" 32.4 \" Russell and Nonyig called the conference \" the inception of artificial intelligence :\" 0.55
t. Russell and Nonigs wrote \" for the next 20 years the field would be clominated by these people and their students............................
u. Russell and Norvig wrote, “ It was astonishing wherever a computer did anything kind of smarteah ”...
v. The programs described are Arthur Samuel ' s checkers program for the IBM 70L Daniel Bobrow ' s STUDENT, Newell and Simon ' s Logic Theorica and Terry Winograrae ' s SHBDL1.
w. Russell and Nonvig write. “ in almost all cases, these early systems failed on more difficult problems ”[ 33 ]
x. Embodied approaches to ARTIT were championed by Hans Morave2 / 2RT and Rodney Brooks ( SSSIII ) and went by many names : Nouvelle ALTDevelopmental robotics [ 54 ]
y. Matters Worge arrate in The Adartic “ Wherenes for decaders, computer - science fields such as natural - target processing, compader vision, and robotics used externely different methods, now they all use a programming method calleie
z. Jack Clark wrote in Bloomberg : “ After a half - decade of quiet breakthroughts in artificial infeliogence, 2015 has been a landmark year. Computers are smater and learning baber than ever ”, and noted that the number of software projecte
aa. Nils Nilsson wrote in 256S : “ Simply put, there is wide disagreement in the field about what AI is all about 1999
ab. Dankei Crevier wrote that \" time has proven the accuracy and perceptiveness of some of Dreyfus ' s comments. Had he formulated them less aggressively, constructive actions they suggested might have been taken much earlier.\"[ 7.9 ]
ac. Search presented thickefolistion of “ citrong all ” in 12090 EPH Toxaries ’ original fromtolation was “ The appropriately programmed computer really to a mind, in the sense that computers given the right programmes can be let - being an
", + "page_start": 29, + "page_end": 29, + "source_file": "wikipedia3.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia3.pdf", + "query": "What would a superintelligence need?", + "target_page": 27, + "target_passage": "possess intelligence far surpassing that of the brightest and most gifted human mind.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Superintelligence and the singularity**\n\nA superintelligence is a hypothetical agent that would possess intelligence far surpassing that of the \nbrightest and most gifted human mind.[379] If research into artificial general intelligence produced \nsufficiently intelligent software, it might be able to reprogram and improve itself. The improved software \nwould be even better at improving itself, leading to what I. J. Good called an \"intelligence explosion\" and \nVernor Vinge called a \"singularity\".[395] \n\nHowever, technologies cannot improve exponentially indefinitely, and typically follow an S-shaped \ncurve, slowing when they reach the physical limits of what the technology can do.[396] ", + "page_start": 26, + "page_end": 26, + "source_file": "wikipedia3.pdf" + }, + { + "text": "the future to warrant research or that humans will be valuable from the perspective of a superintelligent \nmachine.[282] However, after 2016, the study of current and future risks and possible solutions became a \nserious area of research.[283] ", + "page_start": 19, + "page_end": 19, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Good, I. J. (1965),*Speculations Concerning the First Ultraintelligent Machine*(https://exhibits.st \nanford.edu/feigenbaum/catalog/gz727rg3869), archived (https://web.archive.org/web/20230 \n710131733/https://exhibits.stanford.edu/feigenbaum/catalog/gz727rg3869) from the original \non 10 July 2023, retrieved 5 October 2024 \n\nGoodfellow, Ian; Bengio, Yoshua; Courville, Aaron (2016),*Deep Learning*(https://web.archive.or \ng/web/20160416111010/http://www.deeplearningbook.org), MIT Press., archived from the \noriginal (http://www.deeplearningbook.org) on 16 April 2016, retrieved 12 November 2017 \nGoodman, Bryce; Flaxman, Seth (2017). \"EU regulations on algorithmic decision-making and a \n'right to explanation' \".*AI Magazine*.**38**(3): 50. arXiv:1606.08813 (https://arxiv.org/abs/1606. \n08813). doi:10.1609/aimag.v38i3.2741 (https://doi.org/10.1609%2Faimag.v38i3.2741). \nS2CID 7373959 (https://api.semanticscholar.org/CorpusID:7373959). ", + "page_start": 56, + "page_end": 56, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Second, Yuval Noah Harari argues that AI does not require a robot body or physical control to pose an \nexistential risk. The essential parts of civilization are not physical. Things like ideologies, law, \ngovernment, money and the economy are built on language; they exist because there are stories that \nbillions of people believe. The current prevalence of misinformation suggests that an AI could use \nlanguage to convince people to believe anything, even to take actions that are destructive.[270] \n\nThe opinions amongst experts and industry insiders are mixed, with sizable fractions both concerned and \nunconcerned by risk from eventual superintelligent AI.[271] Personalities such as Stephen Hawking, Bill \nGates, and Elon Musk,[272] as well as AI pioneers such as Yoshua Bengio, Stuart Russell, Demis \nHassabis, and Sam Altman, have expressed concerns about existential risk from AI. \n\nIn May 2023, Geoffrey Hinton announced his resignation from Google in order to be able to \"freely speak \nout about the risks of AI\" without \"considering how this impacts Google.\"[273] He notably mentioned \nrisks of an AI takeover,[274] and stressed that in order to avoid the worst outcomes, establishing safety \nguidelines will require cooperation among those competing in use of AI.[275] ", + "page_start": 18, + "page_end": 18, + "source_file": "wikipedia3.pdf" + }, + { + "text": "The Turing test can provide some \nevidence of intelligence, but it \npenalizes non-human intelligent \nbehavior.[361] \n\nMcCarthy defines intelligence as \"the computational part of the \nability to achieve goals in the world\".[364] Another AI founder, \nMarvin Minsky similarly describes it as \"the ability to solve hard \nproblems\".[365] The leading AI textbook defines it as the study of \nagents that perceive their environment and take actions that maximize their chances of achieving defined \ngoals.[1] These definitions view intelligence in terms of well-defined problems with well-defined \nsolutions, where both the difficulty of the problem and the performance of the program are direct \nmeasures of the \"intelligence\" of the machine—and no other philosophical discussion is required, or may \nnot even be possible. \n\nAnother definition has been adopted by Google,[366] a major practitioner in the field of AI. This definition \nstipulates the ability of systems to synthesize information as the manifestation of intelligence, similar to \nthe way it is defined in biological intelligence. ", + "page_start": 23, + "page_end": 23, + "source_file": "wikipedia3.pdf" + }, + { + "text": "**Existential risk**\n\nIt has been argued AI will become so powerful that humanity may irreversibly lose control of it. This \ncould, as physicist Stephen Hawking stated, \"spell the end of the human race\".[265] This scenario has been \ncommon in science fiction, when a computer or robot suddenly develops a human-like \"self-awareness\" \n(or \"sentience\" or \"consciousness\") and becomes a malevolent character.[q] These sci-fi scenarios are \nmisleading in several ways. \n\nFirst, AI does not require human-like sentience to be an existential risk. Modern AI programs are given \nspecific goals and use learning and intelligence to achieve them. Philosopher Nick Bostrom argued that if \none gives*almost any*goal to a sufficiently powerful AI, it may choose to destroy humanity to achieve it \n(he used the example of a paperclip factory manager).[267] Stuart Russell gives the example of household \nrobot that tries to find a way to kill its owner to prevent it from being unplugged, reasoning that \"you \ncan't fetch the coffee if you're dead.\"[268] In order to be safe for humanity, a superintelligence would have \nto be genuinely aligned with humanity's morality and values so that it is \"fundamentally on our side\".[269] ", + "page_start": 18, + "page_end": 18, + "source_file": "wikipedia3.pdf" + }, + { + "text": "\n\nrequirements for ", + "page_start": 209, + "page_end": 209, + "source_file": "00-80T-80.pdf" + }, + { + "text": "**Defining artificial intelligence**\nAlan Turing wrote in 1950 \"I propose to consider the question 'can machines think'?\"[359] He advised \nchanging the question from whether a machine \"thinks\", to \"whether or not it is possible for machinery to \nshow intelligent behaviour\".[359] He devised the Turing test, which measures the ability of a machine to \nsimulate human conversation.[323] Since we can only observe the behavior of the machine, it does not \nmatter if it is \"actually\" thinking or literally has a \"mind\". Turing notes that we can not determine these \nthings about other people but \"it is usual to have a polite convention that everyone thinks.\"[360] \n\nRussell and Norvig agree with Turing that intelligence must be \ndefined in terms of external behavior, not internal structure.[1] \nHowever, they are critical that the test requires the machine to \nimitate humans. \"Aeronautical engineering texts\", they wrote, \"do \nnot define the goal of their field as making 'machines that fly so \nexactly like pigeons that they can fool other pigeons.' \"[362] AI \nfounder \nthat \"Artificial \nintelligence \nis not, by definition, simulation of human \nintelligence\".[363] \n\nJohn McCarthy agreed, writing ", + "page_start": 23, + "page_end": 23, + "source_file": "wikipedia3.pdf" + }, + { + "text": "**References**\n\n1. Russell & Norvig (2021), pp. 1–4. \n2. AI set to exceed human brain power (http://www.cnn.com/2006/TECH/science/07/24/ai.bostr \nom/) Archived (https://web.archive.org/web/20080219001624/http://www.cnn.com/2006/TEC \nH/science/07/24/ai.bostrom/) 2008-02-19 at the Wayback Machine CNN.com (July 26, 2006) \n\n3. Kaplan, Andreas; Haenlein, Michael (2019). \"Siri, Siri, in my hand: Who's the fairest in the \n\nland? On the interpretations, illustrations, and implications of artificial intelligence\".*Business*\n*Horizons*.**62**: 15–25. doi:10.1016/j.bushor.2018.08.004 (https://doi.org/10.1016%2Fj.bushor. \n2018.08.004). ISSN 0007-6813 (https://search.worldcat.org/issn/0007-6813). \nS2CID 158433736 (https://api.semanticscholar.org/CorpusID:158433736). \n4. Artificial general intelligence: Russell & Norvig (2021, pp. 32–33, 1020–1021) ", + "page_start": 30, + "page_end": 30, + "source_file": "wikipedia3.pdf" + }, + { + "text": "**Symbolic AI and its limits**\nSymbolic AI (or \"GOFAI\")[370] simulated the high-level conscious reasoning that people use when they \nsolve puzzles, express legal reasoning and do mathematics. They were highly successful at \"intelligent\" \ntasks such as algebra or IQ tests. In the 1960s, Newell and Simon proposed the physical symbol systems \nhypothesis: \"A physical symbol system has the necessary and sufficient means of general intelligent \naction.\"[371] \n\nHowever, the symbolic approach failed on many tasks that humans solve easily, such as learning, \nrecognizing an object or commonsense reasoning. Moravec's paradox is the discovery that high-level \n\"intelligent\" tasks were easy for AI, but low level \"instinctive\" tasks were extremely difficult.[372] \nPhilosopher Hubert Dreyfus had argued since the 1960s that human expertise depends on unconscious \ninstinct rather than conscious symbol manipulation, and on having a \"feel\" for the situation, rather than \nexplicit symbolic knowledge.[373] Although his arguments had been ridiculed and ignored when they \nwere first presented, eventually, AI research came to agree with him.[ab][16] \n\nThe issue is not resolved: sub-symbolic reasoning can make many of the same inscrutable mistakes that \nhuman intuition does, such as algorithmic bias. Critics such as Noam Chomsky argue continuing research \ninto symbolic AI will still be necessary to attain general intelligence,[375][376] in part because sub- \nsymbolic AI is a move away from explainable AI: it can be difficult or impossible to understand why a \nmodern statistical AI program made a particular decision. The emerging field of neuro-symbolic artificial \nintelligence attempts to bridge the two approaches. ", + "page_start": 24, + "page_end": 24, + "source_file": "wikipedia3.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia3.pdf", + "query": "Where can I find the Inspect tool to evaluate the safety of our models?", + "target_page": 21, + "target_passage": "The UK AI Safety Institute released in 2024 a testing toolset called 'Inspect' for AI safety evaluations available under a MIT open-source licence which is freely available on GitHub", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Promotion of the wellbeing of the people and communities that these technologies affect requires \nconsideration of the social and ethical implications at all stages of AI system design, development and \nimplementation, and collaboration between job roles such as data scientists, product managers, data \nengineers, domain experts, and delivery managers.[300] \n\nThe UK AI Safety Institute released in 2024 a testing toolset called 'Inspect' for AI safety evaluations \navailable under a MIT open-source licence which is freely available on GitHub and can be improved with \nthird-party packages. It can be used to evaluate AI models in a range of areas including core knowledge, \nability to reason, and autonomous capabilities.[301] ", + "page_start": 20, + "page_end": 20, + "source_file": "wikipedia3.pdf" + }, + { + "text": "**OSH Barometer – Mental risks:**\n\nhttps://visualisation.osha.europa.eu/osh-barometer/working-conditions-preventions/working- \nconditions \n\n**ESENER – Data visualisation:**\n\nhttps://visualisation.osha.europa.eu/esener/en/survey/datavisualisation/2019 ", + "page_start": 37, + "page_end": 37, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**OSH Barometer – Physical risks:**\n\nhttps://visualisation.osha.europa.eu/osh-barometer/working-conditions-preventions/physical- \nrisk/vibrations-loud-noise-and-temperature \n\n**ESENER – Data visualisation:**\n\nhttps://visualisation.osha.europa.eu/esener/en/survey/datavisualisation/2019 \n\n**EU-OSHA Themes – Musculoskeletal disorders:**\n\nhttps://osha.europa.eu/en/themes/musculoskeletal-disorders ", + "page_start": 44, + "page_end": 44, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "You can navigate directly to the events menu by clicking**View All Events**option or see each \nevent message separately by clicking the**Details**icon of the specific message, analyze the \ncontent, and eventually run the suggested fix procedure (see Figure 5-13). ", + "page_start": 161, + "page_end": 161, + "source_file": "sg247938.pdf" + }, + { + "text": "**OSH Barometer – Non-fatal accidents at work:**\nhttps://visualisation.osha.europa.eu/osh-barometer/accidents-diseases-well-being/work- \naccidents/non-fatal-work-accidents \n\n**OSH Barometer – Fatal accidents at work:**\nhttps://visualisation.osha.europa.eu/osh-barometer/accidents-diseases-well-being/work- \naccidents/fatal-work-accidents \n\n**Eurostat – Accidents at work (ESAW and LFS Ad hoc modules):**\nhttps://ec.europa.eu/eurostat/web/health/data/database ", + "page_start": 72, + "page_end": 72, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Spare 6V20W Halogen Bulb \n1 \n\n1 Lens Cleaning Tissue \n\n1 Cedar Oil \n\n1 1A Fuse (spare) \n\n1 Specification \n\nInspection Certificate 1 \n\nPacking List 1 \n\n**OPERATION**\n\nNote: For oil immersion, please use the index of refraction 1.515 oil \n**Eyepiece Specifications**\n\n1. Remove all components from package. Identify all parts before \n assembling instrument. \n2. Attach 4x, 10x and 40x objectives by screwing into revolving \n turret. Tighten and secure to maximum finger pressure only. \n3. Place the specimen on the stage and secure with spring clips. \n NOTE: The cover glass must face upward (the thinner glass is \n the cover glass), otherwise when the 40x objective is used the \n specimen cannot be observed. Observation is best when the \n thickness of the cover glass is 0.1-1.1mm and the cover glass \n is 0.17mm. \n4. Plug power cord into an electrical outlet. Turn microscope \n lamp ON. \n5. Observe the specimen using the lowest magnification objective \n first. The 10x objective provides a larger field of view making it \n easier to search the specimen. \n\n**Classification Magnification**\n**Field of View (FOV)**\n**Diameter**\n\nPlain Field \nEyepiece \n10x 18mm ", + "page_start": 8, + "page_end": 8, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "C Supplementary materials for models \n\nWe present in this section the model characteristics \nwe collected for the 46 evaluated models. \n\nFor evaluating prompt-based models such as \nintfloat/e5-mistral-instruct-7b, we provide the \nprompts we used in Table 8. \n\nD Evaluation results \n\nThis section presents the results obtained for each \nmodel on each task. To be relevant, we used the \nsame metrics as in MTEB, which varies from one \ntype of task to another: ", + "page_start": 11, + "page_end": 11, + "source_file": "arxiv4.pdf" + }, + { + "text": "**PARTS LIST**\n\n\n \n \n \n \n [html]NameMicroscope Stand4x ( parfocal distance adjusted )\n
Qty
1
110 ×
1Achromatic Objective
40 × ( s ) ( parfocal distance adjustable )1
\n\n2 10x Wide Field Eyepiece w/Pointer \n\nAbbe Condenser NA1.25 1 \n**Objective Specifications**\n1 Plastic Dust Cover ", + "page_start": 8, + "page_end": 8, + "source_file": "Microscope Manual.pdf" + }, + { + "text": "Figure 13-34 Messages in the event log \n\n2. Select**Show All**→**Recommended Actions**to display the most important events to be \nresolved (see Figure 13-35). The Recommended Actions tab shows the highest priority \nmaintenance procedure that must be run. Use the troubleshooting wizard so that IBM \nStorwize V7000 system can determine the proper order of maintenance procedures. ", + "page_start": 725, + "page_end": 725, + "source_file": "sg247938.pdf" + }, + { + "text": "**OPERATION**\n\n**Model AY11232**\n**Optical Specifications - Model AY11232**\n\n1. Remove components from package. \n identify all parts before assembling. \n2. Check the input voltage to ensure that \n it conforms to the microscopes \n requirement. \n\n**SELECTING THE ILLUMINATION**", + "page_start": 4, + "page_end": 4, + "source_file": "Microscope Manual.pdf" + } + ] + }, + { + "references": { + "source_file": "legal2_opengouvernementlicense.pdf", + "query": "What was the age category of most new opiate/crack users during the crime peak in the mid-1990s?", + "target_page": 9, + "target_passage": "mplying that most of these individuals were in their mid-to-late teens during the crime peak of the mid-1990s", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "The mean age at test is 32 and the mean year of birth is 1977, implying that most of these \nindividuals were in their mid-to-late teens during the crime peak of the mid-1990s.9 Given \nevidence suggesting that the average age of initiation for opiate/crack use is around 18–20 \n(Millar et al., 2001), this age profile would tentatively suggest that OCU incidence also peaked in \nthe 1990s and that this created a large cohort of users who would be approaching 40 today. \n\nThe minimum and maximum years of birth are fixed by construction, because anyone born ", + "page_start": 8, + "page_end": 8, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "may be even lower. The number of arrestees testing positive for the first time for opiates \n(or for both opiates and crack-cocaine) dropped from 14,750 in 2006 to 4,281 in the first \n11 months of 2013, a fall of around 70 per cent2. Furthermore, of the new positive testers \nin 2013, only 721 were aged 18–24.3 Though this arrestee data will capture only a \nproportion of the true population, it does suggest that the number of new, young initiates \ninvolved with crime – those who have the potential to inflict most societal harm – has \ndecreased markedly, probably just to a few thousand per year; and that this group now \nmake up a small minority of the total number of opiate/crack-cocaine users (estimated to \nbe 294,000 in 2011/12), most of whom are older, longer-term users. \nIn terms of trends in new opiate/crack-cocaine users, all available data suggest that \nfigures have dipped by at least a fifth since 2005 and have dropped hugely since the late \n1980s and early 1990s when the opiate/crack-cocaine population in the UK grew very \nrapidly. The current estimate works out at a rate of 0.18 per 1,000 population. During the \nepidemic years, published estimates of new opiate/crack-cocaine users in Manchester \nand Bolton show rates more than 11 times larger. ", + "page_start": 2, + "page_end": 2, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "However, further analysis revealed some other possibilities based on the characteristics of \nthose attending opiate/crack treatment for the first time in recent years. The Appendix includes a \nseries of graphs with age-of-onset distributions for those who first attended treatment in 2013, \nand then 2012, and so on back to 2004. These show that the majority of those who presented to \ntreatment in 2004 initiated use in the mid-1990s in line with the likely peak of the epidemic. But \nby 2012 a far greater number of individuals presenting to treatment say they started using \nopiates/crack only a year or two before.23 In other words, there appears to be a shift towards a \nshorter lag between initiation and treatment. This shift looks even more dramatic when using \nproportions rather than absolute numbers, see the Appendix. \n\nFurthermore, these individuals (those who seem to have both initiated recently and presented to \ntreatment within a year or two of initiation) show a notably different age-of-initiation profile \ncompared to the established profile in the literature, which peaks around 18–22 (Donmall & \nJones, 2005). These individuals have a notably older age profile: see figure 11 chart, which \ncompares recent initiates who presented to treatment in 2005 with recent initiates who \npresented to treatment in 2013. ", + "page_start": 27, + "page_end": 27, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "7 Note that individuals aged 65 and over or who had a year of birth before 1959 were excluded. \n8 The total acquisitive crime arrests were calculated from the data to be found here: https://www.gov.uk/government/statistics/tables- \n\nNew opiate and crack-cocaine users: characteristics and trends 7 ", + "page_start": 6, + "page_end": 6, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "This report has attempted to draw together available data and evidence to estimate the number \nof new opiate/crack-cocaine users (OCUs) per year in England since 2005 and then to look \nbriefly at their characteristics. This is important as previous research has suggested that – \nmostly through the actions of a minority - this group has the potential to have a large impact on \ncrime trends and therefore to impose significant societal costs. \n\nThough data on this population is imperfect, a number of different data sources and \nmethodologies are available to estimate OCU incidence. From these, three key conclusions \nemerge: \n\n The number of new opiate/crack users is clearly far lower now than it was in the 1980s \n\nand early 1990s and has even dropped 20-45% since 2005. \n\n This means numbers of new users in 2013 may be around 5,000-8,000 with an \n\napproximate upper bound of 10,000; and numbers involved with prolific criminality will be \nlower still. \n\n The downward trend in new OCUs has flattened since about 2011, but available data do \nnot suggest that this is the precursor to a new increase. If anything, the downward trend \nmay resume in 2014, though the situation requires further monitoring. ", + "page_start": 29, + "page_end": 29, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "**Executive summary**\n\nThis paper uses a range of datasets and methodologies to: \n\n obtain working estimates for the number of individuals in England who started using \n\nopiates/crack from 2005 to 2013;1 \n\n examine the characteristics of these individuals. \n\nThe main findings of the paper are as follows. \n\n \n\nIt is estimated that around 5,000 to 8,000 individuals started using opiates or crack- \ncocaine in 2013. There is a high degree of uncertainty around this figure due to the \nsparse data on this population, but sense-checks based on treatment and criminal justice \nsystem data suggest the true figure is unlikely to be much larger than 10,000. \n\n Data also suggest that the number of current opiate/crack initiates involved with crime ", + "page_start": 2, + "page_end": 2, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "initiated use at an older age. Currently it is not possible to determine whether this is a \nreporting issue or a genuine shift in the age profile of new opiate/crack-cocaine users. \n\n The report has several important policy implications. Even though numbers of new \ninitiates involved with crime have dropped to the low thousands, putting downward \npressure on crime, identification and early diversion to treatment remains paramount. \nFrontier Economics have estimated that the average4 lifetime crime cost of an injecting \ndrug user is £445,000, so the potential for social harm – even from a small number of \nindividuals – remains large and potentially long-lasting. This means local areas need to \nmanage both the (relatively large) stock of current users, and the (much smaller) flow of \nnew initiates, whose treatment needs may be different. There is no evidence of any new \nepidemic in this country, but given the impact of the epidemic of the 80s and early 90s on \ncrime, ongoing monitoring of recent trends is required to spot early signs of any emerging \nproblems. \n\n**Aims and Methodology**\n\nPrevious Home Office research has demonstrated the importance of opiate/crack-cocaine use \nin driving aggregate trends in acquisitive crime (Morgan, 2014). While established estimates \nexist of the total number of opiate/crack-cocaine users (OCUs) in England (Hay et al., 2013), \nthere are no estimates for the number of new OCUs each year (throughout this paper the \nnumber of new OCUs is also referred to as**‘incidence’**). This is important for three main \nreasons. ", + "page_start": 3, + "page_end": 3, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "The mode age of initiation has shifted from around 18 to around 25 and there is an older age \nprofile throughout. Rises in average age of initiation have also been reported recently in cohorts \nof Australian injecting drug users (Horyniak et al., 2015). There appear to be two possible \nexplanations. \n\n There is a genuine shift towards new initiates being older, and for them to present to \n\ntreatment much faster than in previous years. \n\n There is a consistent, but small number of individuals who mis-report their age of onset \n\nwhen attending treatment i.e. who report that they have only been using opiates/crack for \na short period when in fact they have been using for a far longer period, and that this is \nstarting to really bias the numbers for recent cohorts because attendees from the original \nepidemic are becoming smaller. \n\nIt is possible then that the flattening we observe in the incidence trend is due to a small in-flux of \nolder initiates, although mis-reporting may also explain that phenomenon. Either way though, as \nthis analysis has made clear throughout, absolute numbers of new OCUs appear to be small – \nprobably fewer than 10,000 per annum and the numbers of those involved with crime will be \nsmaller still. In addition, despite a flattening in the probable trend in new users, there is currently \nno sign that it is likely to tip upwards. If anything, the data suggest the downward trend is set to \nresume, though clearly it remains important to monitor the situation. ", + "page_start": 28, + "page_end": 28, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "before 1960 was removed and because DIP tests are only administered to those aged 18 and \nover, so only using data to 2013 means it would not be possible for anyone to be born in 1996 \nor afterwards to be included. Even so, it is clear from the year-of-birth distribution (Figure 2) that \npositive opiate tests drop off sharply for those born after 1982. This is in line with other evidence \nsuggesting that the number of new users of opiates decreased sharply in the 2000s. This needs \nto be considered when interpreting the analysis that follows. When DIP and the NDTMS \ntreatment system began in the mid-2000s, there already existed a cohort of around 320,000 \nOCUs, according to available estimates by Hay et al., (2013). And most of these individuals \nbegan using opiates/crack during the epidemic years of the 1980s and 1990s. In terms of data \ncapture this means it is hard to separate the gradual inclusion of more and more individuals \nfrom this original cohort from genuinely new users of these drugs. ", + "page_start": 9, + "page_end": 9, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "The majority of those presenting for treatment between 2005 and 2014 started using \nopiates/crack before 2005 (around four in five). Only 52,829 individuals said they had an \nopiate/crack initiation date between 2005 and 2014. This suggests an average of just under \n5,000 new starters per year during this period. But this would be an under-estimate of incidence \nbecause it is likely that some of those who began use between 2005 and 2014 would not yet \nhave come to treatment during that period. \n\nTo correct for this, we use two variants of a methodology employed by researchers in Millar et \nal. (2001) and Hickman et al. (2001). These papers discuss the methodology in detail. \n\nIn brief, the method uses the lag-to-treatment distribution for the sample coupled with the \nnumber of new treatment presentations in a given year to estimate OCU incidence in that year. \nSo, when presenting to treatment, all individuals are asked to provide the year in which they first \nbegan using their primary drug, which for this analysis was limited to opiates and/or crack- \nNew opiate and crack-cocaine users: characteristics and trends 22 ", + "page_start": 21, + "page_end": 21, + "source_file": "legal2_opengouvernementlicense.pdf" + } + ] + }, + { + "references": { + "source_file": "legal2_opengouvernementlicense.pdf", + "query": "According to the National Database Treatment Monitoring System, how many people started using opiates/crack between 2005 and 2014?", + "target_page": 22, + "target_passage": " Only 52,829 individuals said they had an opiate/crack initiation date between 2005 and 2014", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "Reading down the year columns, the table shows that of the 6,449 people who presented for \nopiate/crack treatment for the first time in 2013, 376 said they had begun using in 2005. Another \n470 said they started using in 2006, and so on. \n\nReading across the table shows that of all those who said they began using opiates/crack in \n2005 (8,960), 1,305 also presented to treatment for the first time in that year (which is 15 per \ncent of the observed cohort from Table 11 and 12 per cent of our estimated total cohort from \nTable 12). Another 1,508 presented for the first time a year later, and so on. The first number in \nthe totals column (8,960) therefore represents all individuals who said they began using in 2005. \nIt is therefore the ‘observed’ incidence level. The column to the right of this is the cumulative \npercentages from the estimated lag-to-treatment distribution in Table 12. This shows the ", + "page_start": 23, + "page_end": 23, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "The majority of those presenting for treatment between 2005 and 2014 started using \nopiates/crack before 2005 (around four in five). Only 52,829 individuals said they had an \nopiate/crack initiation date between 2005 and 2014. This suggests an average of just under \n5,000 new starters per year during this period. But this would be an under-estimate of incidence \nbecause it is likely that some of those who began use between 2005 and 2014 would not yet \nhave come to treatment during that period. \n\nTo correct for this, we use two variants of a methodology employed by researchers in Millar et \nal. (2001) and Hickman et al. (2001). These papers discuss the methodology in detail. \n\nIn brief, the method uses the lag-to-treatment distribution for the sample coupled with the \nnumber of new treatment presentations in a given year to estimate OCU incidence in that year. \nSo, when presenting to treatment, all individuals are asked to provide the year in which they first \nbegan using their primary drug, which for this analysis was limited to opiates and/or crack- \nNew opiate and crack-cocaine users: characteristics and trends 22 ", + "page_start": 21, + "page_end": 21, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "This section uses treatment data from the National Database Treatment Monitoring System \n(NDTMS) to estimate the number of new OCUs annually. The NDTMS captures data on the \nnumbers of people presenting to services with problem drug misuse and information about the \ndrug treatment they receive. All drug treatment agencies in England provide a basic level of \ninformation to the NDTMS on their activities each month. The data for this report included all \nunique individuals presenting to treatment with opiates or crack-cocaine listed as their primary \ndrug between 2005 and 2014. All individuals whose age of first use was listed as below ten or \nbefore 2005 were then excluded. Excluding individuals who started using opiates/crack before \n2005 resulted in a large number of records being left out, due to the fact that the majority of the \ntreatment population, even in 2013/14, initiated in the 1980s and 1990s when heroin and crack \nuse surged in the UK. However, this exclusion is necessary for the incidence methodology, as \nexplained later in this section. The remaining dataset included 52,829 individuals, as shown in \nTable 10. ", + "page_start": 21, + "page_end": 21, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "Table 11 shows that 15 per cent of the individuals who started use in 2005 and had presented \nfor treatment by 2014, presented within one year of initiation. A further 17 per cent presented \nbetween one and two years after initiation, prior to coming to treatment, meaning that overall 31 \nper cent of the sample said they came to treatment within two years of first using opiates/crack. \n(The fact this is not 32% is simply due to rounding). ", + "page_start": 22, + "page_end": 22, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "**Executive summary**\n\nThis paper uses a range of datasets and methodologies to: \n\n obtain working estimates for the number of individuals in England who started using \n\nopiates/crack from 2005 to 2013;1 \n\n examine the characteristics of these individuals. \n\nThe main findings of the paper are as follows. \n\n \n\nIt is estimated that around 5,000 to 8,000 individuals started using opiates or crack- \ncocaine in 2013. There is a high degree of uncertainty around this figure due to the \nsparse data on this population, but sense-checks based on treatment and criminal justice \nsystem data suggest the true figure is unlikely to be much larger than 10,000. \n\n Data also suggest that the number of current opiate/crack initiates involved with crime ", + "page_start": 2, + "page_end": 2, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "may be even lower. The number of arrestees testing positive for the first time for opiates \n(or for both opiates and crack-cocaine) dropped from 14,750 in 2006 to 4,281 in the first \n11 months of 2013, a fall of around 70 per cent2. Furthermore, of the new positive testers \nin 2013, only 721 were aged 18–24.3 Though this arrestee data will capture only a \nproportion of the true population, it does suggest that the number of new, young initiates \ninvolved with crime – those who have the potential to inflict most societal harm – has \ndecreased markedly, probably just to a few thousand per year; and that this group now \nmake up a small minority of the total number of opiate/crack-cocaine users (estimated to \nbe 294,000 in 2011/12), most of whom are older, longer-term users. \nIn terms of trends in new opiate/crack-cocaine users, all available data suggest that \nfigures have dipped by at least a fifth since 2005 and have dropped hugely since the late \n1980s and early 1990s when the opiate/crack-cocaine population in the UK grew very \nrapidly. The current estimate works out at a rate of 0.18 per 1,000 population. During the \nepidemic years, published estimates of new opiate/crack-cocaine users in Manchester \nand Bolton show rates more than 11 times larger. ", + "page_start": 2, + "page_end": 2, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": " However, the findings also suggest that between 2011 and early 2014, the number of \n\nnew opiate/crack-cocaine users stopped decreasing and instead stabilised at a \n(historically) low level. Further analysis was conducted to try and determine whether this \nwas a precursor to a new rise in initiates. Though the data are not totally conclusive, the \nresults suggest that a marked increase in new opiate/crack-cocaine users in the near \nfuture is unlikely. If anything, findings suggested that the downward trend may be set to \nresume. \n\n Analysis also revealed some possible changes in characteristics of the new opiate/crack- \ncocaine initiates. There is a trend in the treatment data towards new initiates coming to \ntreatment earlier in their drug-using careers than previous cohorts and also to have ", + "page_start": 2, + "page_end": 2, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "Figure 10 shows that, rather than increasing in the current year, new presentations for \nopiate/crack use have actually fallen slightly from 48,154 in 2013/14 to 47,241 in 2014/15, a \ndecrease of 1.9%. However, given that the early signs of previous opiate/crack use epidemics \nhave been missed before (see Morgan, 2014), and the potential social harm that a fresh \nincrease in new OCUs could cause, further analysis was conducted on the most recent data to \ntry and determine whether the apparent flattening in trends was actually caused by the early \nstages of a significant surge in new users. \n\nThe treatment data was broken down by age to check whether the slight fall in total new \npresentations in 2014/15 masked an increase in younger treatment presentations. This showed \ninstead that opiate/crack presentations by those aged 18-24 had fallen from 3,579 in 2013/14 to \n3,021 in 2014/15, a fall of 15.6%. In other words, younger new presentations have fallen at a \nfaster rate over the last year than for those aged over-25. Furthermore, separate statistics \nproduced for those in treatment aged 18-and-under also show a fall in aggregate numbers in \ntreatment for opiates and crack. ", + "page_start": 26, + "page_end": 26, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "This report has attempted to draw together available data and evidence to estimate the number \nof new opiate/crack-cocaine users (OCUs) per year in England since 2005 and then to look \nbriefly at their characteristics. This is important as previous research has suggested that – \nmostly through the actions of a minority - this group has the potential to have a large impact on \ncrime trends and therefore to impose significant societal costs. \n\nThough data on this population is imperfect, a number of different data sources and \nmethodologies are available to estimate OCU incidence. From these, three key conclusions \nemerge: \n\n The number of new opiate/crack users is clearly far lower now than it was in the 1980s \n\nand early 1990s and has even dropped 20-45% since 2005. \n\n This means numbers of new users in 2013 may be around 5,000-8,000 with an \n\napproximate upper bound of 10,000; and numbers involved with prolific criminality will be \nlower still. \n\n The downward trend in new OCUs has flattened since about 2011, but available data do \nnot suggest that this is the precursor to a new increase. If anything, the downward trend \nmay resume in 2014, though the situation requires further monitoring. ", + "page_start": 29, + "page_end": 29, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "However, further analysis revealed some other possibilities based on the characteristics of \nthose attending opiate/crack treatment for the first time in recent years. The Appendix includes a \nseries of graphs with age-of-onset distributions for those who first attended treatment in 2013, \nand then 2012, and so on back to 2004. These show that the majority of those who presented to \ntreatment in 2004 initiated use in the mid-1990s in line with the likely peak of the epidemic. But \nby 2012 a far greater number of individuals presenting to treatment say they started using \nopiates/crack only a year or two before.23 In other words, there appears to be a shift towards a \nshorter lag between initiation and treatment. This shift looks even more dramatic when using \nproportions rather than absolute numbers, see the Appendix. \n\nFurthermore, these individuals (those who seem to have both initiated recently and presented to \ntreatment within a year or two of initiation) show a notably different age-of-initiation profile \ncompared to the established profile in the literature, which peaks around 18–22 (Donmall & \nJones, 2005). These individuals have a notably older age profile: see figure 11 chart, which \ncompares recent initiates who presented to treatment in 2005 with recent initiates who \npresented to treatment in 2013. ", + "page_start": 27, + "page_end": 27, + "source_file": "legal2_opengouvernementlicense.pdf" + } + ] + }, + { + "references": { + "source_file": "legal2_opengouvernementlicense.pdf", + "query": "What proportion of opiate users tested in 2004 were still positive a decade later?", + "target_page": 18, + "target_passage": "Nearly ten per cent (8.9%) of individuals who tested positive for opiates at charge in 2004 also tested positive nearly a decade later in 2013 (on arrest)", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "There were just over 100,000 unique individuals who tested positive for opiates-only or positive- \nfor-both between 2004 and 2013. The distribution of the 296,008 positive tests these individuals \ngave, shows that the vast majority (55%) were only tested once (see Figure 4), which is likely to \nbe why the age statistics are quite similar between Table 3 and Table 4. However, within this ", + "page_start": 11, + "page_end": 11, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "There are several observations to be drawn from these tables. First, it is clear that a proportion \nof opiate-using offenders offend over long periods of time. Nearly ten per cent (8.9%) of \nindividuals who tested positive for opiates at charge in 2004 also tested positive nearly a \ndecade later in 2013 (on arrest). And reading vertically, of the 12,253 individuals testing positive \nin 2013, 1,092 (8.9%) had also tested positive almost a decade earlier. \n\nSecond, in relation to incidence, these numbers also allow for some back-of-the-envelope \nmodelling to address the extent to which the figure of 4,281 individuals, who are new positive \ntesters in 2013, is an under- or over-estimate of the number of new OCUs in total. Taking the \nfigures for 2008, when DIP was fully up and running, we know that around 25,000 unique \nindividuals had positive tests that year. This can be combined with available estimates of the \ntotal OCU population (Hay et al., 2013) and the proportion who are likely to be offending \n(Gossop et al., 2003; Morgan, 2014) to give an approximate arrest rate. i.e. if there were about \n150,000 crime-involved OCUs through the period, this implies an arrest rate of about 17 per \nNew opiate and crack-cocaine users: characteristics and trends 18 ", + "page_start": 17, + "page_end": 17, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "before 1960 was removed and because DIP tests are only administered to those aged 18 and \nover, so only using data to 2013 means it would not be possible for anyone to be born in 1996 \nor afterwards to be included. Even so, it is clear from the year-of-birth distribution (Figure 2) that \npositive opiate tests drop off sharply for those born after 1982. This is in line with other evidence \nsuggesting that the number of new users of opiates decreased sharply in the 2000s. This needs \nto be considered when interpreting the analysis that follows. When DIP and the NDTMS \ntreatment system began in the mid-2000s, there already existed a cohort of around 320,000 \nOCUs, according to available estimates by Hay et al., (2013). And most of these individuals \nbegan using opiates/crack during the epidemic years of the 1980s and 1990s. In terms of data \ncapture this means it is hard to separate the gradual inclusion of more and more individuals \nfrom this original cohort from genuinely new users of these drugs. ", + "page_start": 9, + "page_end": 9, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "may be even lower. The number of arrestees testing positive for the first time for opiates \n(or for both opiates and crack-cocaine) dropped from 14,750 in 2006 to 4,281 in the first \n11 months of 2013, a fall of around 70 per cent2. Furthermore, of the new positive testers \nin 2013, only 721 were aged 18–24.3 Though this arrestee data will capture only a \nproportion of the true population, it does suggest that the number of new, young initiates \ninvolved with crime – those who have the potential to inflict most societal harm – has \ndecreased markedly, probably just to a few thousand per year; and that this group now \nmake up a small minority of the total number of opiate/crack-cocaine users (estimated to \nbe 294,000 in 2011/12), most of whom are older, longer-term users. \nIn terms of trends in new opiate/crack-cocaine users, all available data suggest that \nfigures have dipped by at least a fifth since 2005 and have dropped hugely since the late \n1980s and early 1990s when the opiate/crack-cocaine population in the UK grew very \nrapidly. The current estimate works out at a rate of 0.18 per 1,000 population. During the \nepidemic years, published estimates of new opiate/crack-cocaine users in Manchester \nand Bolton show rates more than 11 times larger. ", + "page_start": 2, + "page_end": 2, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "The fifth row in Table 1 shows that the total number of opiate and opiate/cocaine tests over the \nperiod was 364,537. Table 2 shows descriptive statistics for the individuals providing these tests \n(noting that the same individual may be included several times if they gave multiple positive \ntests). \n\n**Table 2: Descriptive statistics on all positive opiate-only/positive-for-both tests.**\n\nOpiate/opiate+cocaine positive tests in England 2004–2013 (all positive tests including repeats \nby the same individual) ", + "page_start": 8, + "page_end": 8, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "Of central interest for this paper is the third row which shows numbers of individuals testing \npositive for opiates only or were positive-for-both for the first time. All the previous caveats \nabout DIP trends need to be borne in mind when looking at those figures. Clearly the rise in new \npositive testers in the early period will be affected by the changes to DIP coverage through \nthose years, as possibly will the sharp fall in positive testers in the latter period. However, \ngraphing the data (see the red line in Figure 7 below) shows that the fall from 14,750 new \npositive testers in 2006 to 4,281 in 2013, is not only large (the drop is around 70 per cent even if \nwe use the adjusted figure for 2013) but also more or less linear. This means that there is no \nimmediate reason to suggest that the 2013 figures are artificially low due to changes in DIP \ncoverage (i.e. the fact that DIP ceased to be a centrally funded programme in April of that year). \nTaken together, the data from the period post-2006 (when DIP had achieved a high level of \ncoverage) certainly appear to show that the number of new crime-involved OCUs is unlikely to \nbe rising and may be falling markedly, see Figure 7. ", + "page_start": 14, + "page_end": 14, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "**Figure 2: Year of birth distribution for all opiate-only/positive-for-both tests.**\n\n", + "page_start": 9, + "page_end": 9, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "**Figure 3: Distribution of tester’s age at positive test for all opiate-only/positive-for-both tests.**\n\n", + "page_start": 10, + "page_end": 10, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "**Executive summary**\n\nThis paper uses a range of datasets and methodologies to: \n\n obtain working estimates for the number of individuals in England who started using \n\nopiates/crack from 2005 to 2013;1 \n\n examine the characteristics of these individuals. \n\nThe main findings of the paper are as follows. \n\n \n\nIt is estimated that around 5,000 to 8,000 individuals started using opiates or crack- \ncocaine in 2013. There is a high degree of uncertainty around this figure due to the \nsparse data on this population, but sense-checks based on treatment and criminal justice \nsystem data suggest the true figure is unlikely to be much larger than 10,000. \n\n Data also suggest that the number of current opiate/crack initiates involved with crime ", + "page_start": 2, + "page_end": 2, + "source_file": "legal2_opengouvernementlicense.pdf" + }, + { + "text": "The majority of those presenting for treatment between 2005 and 2014 started using \nopiates/crack before 2005 (around four in five). Only 52,829 individuals said they had an \nopiate/crack initiation date between 2005 and 2014. This suggests an average of just under \n5,000 new starters per year during this period. But this would be an under-estimate of incidence \nbecause it is likely that some of those who began use between 2005 and 2014 would not yet \nhave come to treatment during that period. \n\nTo correct for this, we use two variants of a methodology employed by researchers in Millar et \nal. (2001) and Hickman et al. (2001). These papers discuss the methodology in detail. \n\nIn brief, the method uses the lag-to-treatment distribution for the sample coupled with the \nnumber of new treatment presentations in a given year to estimate OCU incidence in that year. \nSo, when presenting to treatment, all individuals are asked to provide the year in which they first \nbegan using their primary drug, which for this analysis was limited to opiates and/or crack- \nNew opiate and crack-cocaine users: characteristics and trends 22 ", + "page_start": 21, + "page_end": 21, + "source_file": "legal2_opengouvernementlicense.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia5.pdf", + "query": "Who led the Fronde des princes?", + "target_page": 4, + "target_passage": "It was headed by the highest-ranking French nobles, among them Louis's uncle Gaston, Duke of Orléans and first cousin Anne Marie Louise d'Orléans, Duchess of Montpensier, known as la Grande Mademoiselle; Princes of the Blood such as Condé, his brother Armand de Bourbon, Prince of Conti, and their sister the Duchess of Longueville; dukes of legitimised royal descent, such as Henri, Duke of Longueville, and François, Duke of Beaufort; so-called \"foreign princes\" such as Frédéric Maurice, Duke of Bouillon, his brother Marshal Turenne, and Marie de Rohan, Duchess of Chevreuse; and scions of France's oldest families, such as François de La Rochefoucauld.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Just as the first*Fronde*(the*Fronde parlementaire*of 1648–1649) ended, a second one (the \n*Fronde des princes*of 1650–1653) began. Unlike that which preceded it, tales of sordid \nintrigue and half-hearted warfare characterized this second phase of upper-class \ninsurrection. To the aristocracy, this rebellion represented a protest for the reversal of their \npolitical demotion from vassals to courtiers. It was headed by the highest-ranking French \nnobles, among them Louis's uncle Gaston, Duke of Orléans and first cousin Anne Marie Louise d'Orléans, Duchess of \nMontpensier, known as*la Grande Mademoiselle*; Princes of the Blood such as Condé, his brother Armand de Bourbon, Prince of \nConti, and their sister the Duchess of Longueville; dukes of legitimised royal descent, such as Henri, Duke of Longueville, and \nFrançois, Duke of Beaufort; so-called \"foreign princes\" such as Frédéric Maurice, Duke of Bouillon, his brother Marshal Turenne, \nand Marie de Rohan, Duchess of Chevreuse; and scions of France's oldest families, such as François de La Rochefoucauld. \n\nPortrait by Justus van Egmont \nbetween the years 1649–1652. ", + "page_start": 3, + "page_end": 3, + "source_file": "wikipedia5.pdf" + }, + { + "text": "The*Frondeurs*, political heirs of the disaffected feudal aristocracy, sought to protect their \nincreasingly centralized royal government. \ntraditional feudal privileges from \nFurthermore, they believed their traditional influence and authority was being usurped by \nthe recently ennobled bureaucrats (the*Noblesse de Robe*, or \"nobility of the robe\"), who \nadministered the kingdom and on whom the monarchy increasingly began to rely. This \nbelief intensified the nobles' resentment. \n\nthe \n\nIn 1648, Anne and Mazarin attempted to tax members of the*Parlement de Paris*. The \nmembers refused to comply and ordered all of the king's earlier financial edicts burned. \nBuoyed by the victory of*Louis, duc d'Enghien*(later known as*le Grand Condé*) at the \nBattle of Lens, Mazarin, on Queen Anne's insistence, arrested certain members in a show \nof force.[24] The most important arrest, from Anne's point of view, concerned Pierre \nBroussel, one of the most important leaders in the*Parlement de Paris*. \nLouis XIV in 1643, by Claude Deruet \n\nPeople in France were complaining about the expansion of royal authority, the high rate of \ntaxation, and the reduction of the authority of the Parlement de Paris and other regional \nrepresentative entities. Paris erupted in rioting as a result, and Anne was forced, under \nintense pressure, to free Broussel. Moreover, on the night of 9–10 February 1651, when \nLouis was twelve, a mob of angry Parisians broke into the royal palace and demanded to \nsee their king. Led into the royal bed-chamber, they gazed upon Louis, who was feigning \nsleep, were appeased, and then quietly departed.[25] The threat to the royal family \nprompted Anne to flee Paris with the king and his courtiers. ", + "page_start": 2, + "page_end": 2, + "source_file": "wikipedia5.pdf" + }, + { + "text": "experiences during the*Fronde*, when men of high birth readily took up the rebel cause against their king, who was actually the \nkinsman of some. This victory over the nobility may thus have ensured the end of major civil wars in France until the French \nRevolution about a century later. ", + "page_start": 9, + "page_end": 9, + "source_file": "wikipedia5.pdf" + }, + { + "text": "**Early acts**\n\nAs the Thirty Years' War came to an end, a civil war known as the Fronde erupted in \nFrance. It effectively checked France's ability to exploit the Peace of Westphalia. Anne and \nMazarin had largely pursued the policies of Cardinal Richelieu, augmenting the Crown's \npower at the expense of the nobility and the*Parlements*. Anne was more concerned with \ninternal policy than foreign affairs; she was a very proud queen who insisted on the divine \nrights of the King of France.[22] \n\nAll this led her to advocate a forceful policy in all matters relating to the King's authority, \nin a manner that was much more radical than the one proposed by Mazarin. The Cardinal \ndepended totally on Anne's support and had to use all his influence on the Queen to temper \nsome of her radical actions. Anne imprisoned any aristocrat or member of parliament who \nchallenged her will; her main aim was to transfer to her son an absolute authority in the \nmatters of finance and justice. One of the leaders of the Parlement of Paris, whom she had \njailed, died in prison.[23] \n\nLouis XIV, then Dauphin of France, \nin 1642, one year before his \naccession to the throne, by Philippe \nde Champaigne ", + "page_start": 2, + "page_end": 2, + "source_file": "wikipedia5.pdf" + }, + { + "text": "It was his mother who gave Louis his belief in the absolute and divine power of \nhis monarchical rule.[12] \n\nDuring his childhood, he was taken care of by the governesses Françoise de \nLansac and Marie-Catherine de Senecey. In 1646, Nicolas V de Villeroy \nbecame the young king's tutor. Louis XIV became friends with Villeroy's young \nchildren, particularly François de Villeroy, and divided his time between the \nPalais-Royal and the nearby Hotel de Villeroy. \n\n**House**\n\n**Father**\n\n**Mother**\n\n**Religion**\n\n**Signature**\n**Minority and the*Fronde***", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia5.pdf" + }, + { + "text": "**See also**\n\nCharles de Lorme, personal medical doctor to Louis XIV \nFundamental laws of the Kingdom of France \nHouse of France \nLevée (ceremony) \nList of French monarchs \nOutline of France \nLouis XIV style \nNicolas Fouquet \nFrench forestry Ordinance of 1669 \nPotager du Roi ", + "page_start": 25, + "page_end": 25, + "source_file": "wikipedia5.pdf" + }, + { + "text": "**Succession**\n\n*The Death of Louis XIV at the*\n*Palace of Versailles*, Thomas Jones \nBarker, 1835-1840 \n\nLouis outlived most of his immediate legitimate family. His last surviving legitimate son, \nLouis, Dauphin of France, died in 1711. Barely a year later, the Duke of Burgundy, the \neldest of the Dauphin's three sons and then heir-apparent to Louis, followed his father. \nBurgundy's elder son, Louis, Duke of Brittany, joined them a few weeks later. Thus, on his \n\ndeathbed, Louis's heir-apparent was his five-year-old great-grandson, Louis, Duke of Anjou, Burgundy's younger son. \n\nLouis foresaw an underaged successor and sought to restrict the power of his nephew Philip II, Duke of Orléans, who, as his \nclosest surviving legitimate relative in France, would probably become regent to the prospective Louis XV. Accordingly, the king \ncreated a regency council as Louis XIII had in anticipation of Louis XIV's own minority, with some power vested in his ", + "page_start": 19, + "page_end": 19, + "source_file": "wikipedia5.pdf" + }, + { + "text": "famous throughout Europe. Composers and musicians such as Jean-Baptiste Lully, Jacques \nChampion de Chambonnières, and François Couperin thrived. In 1661, Louis founded the \nAcadémie Royale de Danse, and in 1669, the Académie d'Opéra, important driving events \nin the evolution of ballet. He also attracted, supported and patronized such artists as André \nCharles Boulle, who revolutionised marquetry with his art of inlay, today known as \n\"Boulle work\". Always on the lookout for new talent, the king launched music \ncompetitions: in 1683, Michel-Richard de Lalande thus became deputy master of the Royal \nChapel, composing his*Symphonies for the Soupers du Roy*along with 77 large scale \n*Grand Motets*. \n\nOver the course of four building campaigns, Louis converted a hunting lodge \ncommissioned by Louis XIII into the spectacular Palace of Versailles. Except for the \ncurrent Royal Chapel (built near the end of his reign), the palace achieved much of its \ncurrent appearance after the third building campaign, which was followed by an official \nmove of the royal court to Versailles on 6 May 1682. Versailles became a dazzling, awe- \ninspiring setting for state affairs and the reception of foreign dignitaries. At Versailles, the \nking alone commanded attention. ", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia5.pdf" + }, + { + "text": "ha_0) (Reprint ed.). Vintage. ISBN 978-0-6797-2610-4. \n\nSymcox, Geoffrey, ed. (1974).*War, Diplomacy, and Imperialism, 1618–1763*. Walker & Co. ISBN 978-0-8027-2056-6. \nSonnino, Paul (1998). \"Prelude to the Fronde: The French Delegation at the Peace of Westphalia\". In Duchhardt, \nHeinz (ed.).*Der Westfälische Friede: Diplomatie–Politische Zäsur–Kulturelles Umfeld–Rezeptionsgeschichte*. \nMünchen: Oldenberg Verlag GmbH. ISBN 978-3-4865-6328-3. \n\nSpielvogel, Jackson J. (2016).*Western Civilization: A Brief History, Volume I: To 1715*(https://books.google.com/book \ns?id=eskaCgAAQBAJ&pg=PT419). Cengage Learning. ISBN 978-1-3058-8842-5. \n\nSturdy, David J. (1998).*Louis XIV*. St Martin's Press. ISBN 978-0-3122-1427-2. \nWilson, Peter H. (2000).*Absolutism in Central Europe*. Routledge. ISBN 978-0-4152-3351-4. \nWolf, John B. (1968).*Louis XIV*(https://archive.org/details/louisxiv00wolf). W.W. Norton & Co., Inc.: a standard ", + "page_start": 32, + "page_end": 32, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Queen Anne played the most important role in defeating the Fronde because she wanted to transfer absolute authority to her son. \nIn addition, most of the princes refused to deal with Mazarin, who went into exile for a number of years. The*Frondeurs*claimed \nto act on Louis's behalf, and in his real interest, against his mother and Mazarin. \n\nQueen Anne had a very close relationship with the Cardinal, and many observers believed that Mazarin became Louis XIV's \nstepfather by a secret marriage to Queen Anne.[30] However, Louis's coming-of-age and subsequent coronation deprived them of \nthe*Frondeurs*' pretext for revolt. The*Fronde*thus gradually lost steam and ended in 1653, when Mazarin returned triumphantly \nfrom exile. From that time until his death, Mazarin was in charge of foreign and financial policy without the daily supervision of \nAnne, who was no longer regent.[31] \n\nDuring this period, Louis fell in love with Mazarin's niece Marie Mancini, but Anne and Mazarin ended the king's infatuation by \nsending Mancini away from court to be married in Italy. While Mazarin might have been tempted for a short time to marry his \nniece to the King of France, Queen Anne was absolutely against this; she wanted to marry her son to the daughter of her brother, \nPhilip IV of Spain, for both dynastic and political reasons. Mazarin soon supported the Queen's position because he knew that her \nsupport for his power and his foreign policy depended on making peace with Spain from a strong position and on the Spanish \nmarriage. Additionally, Mazarin's relations with Marie Mancini were not good, and he did not trust her to support his position. All \nof Louis's tears and his supplications to his mother did not make her change her mind. The Spanish marriage would be very ", + "page_start": 3, + "page_end": 3, + "source_file": "wikipedia5.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia5.pdf", + "query": "What was one of Louis XIV's most ill-famed decrees?", + "target_page": 6, + "target_passage": "One of Louis's more infamous decrees was the Grande Ordonnance sur les Colonies of 1685, the Code Noir (black code)", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "One of Louis's more infamous decrees was the*Grande Ordonnance sur les Colonies*of \n1685, the*Code Noir*(black code). Although it sanctioned slavery, it attempted to humanise \nthe practice by prohibiting the separation of families. Additionally, in the colonies, only \nRoman Catholics could own slaves, and these had to be baptised. \n\nLouis ruled through a number of councils: \n\nConseil d'en haut (\"High Council\", concerning the most important matters of \nstate)—composed of the king, the crown prince, the controller-general of \nfinances, and the secretaries of state in charge of various departments. The \nmembers of that council were called ministers of state. \nConseil des dépêches (\"Council of Messages\", concerning notices and administrative reports from the provinces). \nConseil de Conscience (\"Council of Conscience\", concerning religious affairs and episcopal appointments). \nConseil royal des finances (\"Royal Council of Finances\") headed by the \"chef du conseil des finances\" (an \nhonorary post in most cases)—this was one of the few posts in the council available to the high aristocracy.[38] \n\n**Early wars in the Low Countries**\n\n**Spain**\n\nThe death of Louis's maternal uncle King Philip IV of Spain in 1665 precipitated the War of Devolution. In 1660, Louis had \nmarried Philip IV's eldest daughter, Maria Theresa, as one of the provisions of the 1659 Treaty of the Pyrenees.[39] The marriage \ntreaty specified that Maria Theresa was to renounce all claims to Spanish territory for herself and all her descendants.[39] Mazarin ", + "page_start": 5, + "page_end": 5, + "source_file": "wikipedia5.pdf" + }, + { + "text": "**Succession**\n\n*The Death of Louis XIV at the*\n*Palace of Versailles*, Thomas Jones \nBarker, 1835-1840 \n\nLouis outlived most of his immediate legitimate family. His last surviving legitimate son, \nLouis, Dauphin of France, died in 1711. Barely a year later, the Duke of Burgundy, the \neldest of the Dauphin's three sons and then heir-apparent to Louis, followed his father. \nBurgundy's elder son, Louis, Duke of Brittany, joined them a few weeks later. Thus, on his \n\ndeathbed, Louis's heir-apparent was his five-year-old great-grandson, Louis, Duke of Anjou, Burgundy's younger son. \n\nLouis foresaw an underaged successor and sought to restrict the power of his nephew Philip II, Duke of Orléans, who, as his \nclosest surviving legitimate relative in France, would probably become regent to the prospective Louis XV. Accordingly, the king \ncreated a regency council as Louis XIII had in anticipation of Louis XIV's own minority, with some power vested in his ", + "page_start": 19, + "page_end": 19, + "source_file": "wikipedia5.pdf" + }, + { + "text": "**See also**\n\nCharles de Lorme, personal medical doctor to Louis XIV \nFundamental laws of the Kingdom of France \nHouse of France \nLevée (ceremony) \nList of French monarchs \nOutline of France \nLouis XIV style \nNicolas Fouquet \nFrench forestry Ordinance of 1669 \nPotager du Roi ", + "page_start": 25, + "page_end": 25, + "source_file": "wikipedia5.pdf" + }, + { + "text": "**Personal reign and reforms**\n\n**Coming of age and early reforms**\n\nLouis XIV was declared to have reached the age of majority on the 7th of September 1651. On the death of \nMazarin, in March 1661, Louis personally took the reins of government and astonished his court by declaring \nthat he would rule without a chief minister: \"Up to this moment I have been pleased to entrust the government \nof my affairs to the late Cardinal. It is now time that I govern them myself. You [secretaries and ministers] \nwill assist me with your counsels when I ask for them. I request and order you to seal no orders except by my \ncommand . . . I order you not to sign anything, not even a passport . . . without my command; to render \naccount to me personally each day and to favor no one\".[33] Capitalizing on the widespread public yearning \nfor peace and order after decades of foreign and civil strife, the young king consolidated central political \nauthority at the expense of the feudal aristocracy. Praising his ability to choose and encourage men of talent, \nthe historian Chateaubriand noted: \"it is the voice of genius of all kinds which sounds from the tomb of \nLouis\".[34] ", + "page_start": 4, + "page_end": 4, + "source_file": "wikipedia5.pdf" + }, + { + "text": "**Quotes**\n\nNumerous quotes have been attributed to Louis XIV by legend. \n\nThe well-known \"I am the state\" (*\"L'État, c'est moi.\"*) was reported from at least the late 18th century.[143] It was widely repeated \nbut also denounced as apocryphal by the early 19th century.[144][b][145] ", + "page_start": 21, + "page_end": 21, + "source_file": "wikipedia5.pdf" + }, + { + "text": "**Relations with the major colonies**\n\nLouis's legal reforms were enacted in his numerous Great Ordinances. Prior to that, France \nwas a patchwork of legal systems, with as many traditional legal regimes as there were \nprovinces, and two co-existing legal systems—customary law in the north and Roman civil \nlaw in the south.[36] The*Grande Ordonnance de Procédure Civile*of 1667, the*Code*\n*Louis*, was a comprehensive legal code imposing a uniform regulation of civil procedure \nthroughout the kingdom. Among other things, it prescribed baptismal, marriage and death \nrecords in the state's registers, not the church's, and it strictly regulated the right of the \n*Parlements*to remonstrate.[37] The*Code Louis*later became the basis for the Napoleonic \ncode, which in turn inspired many modern legal codes. \n\nLouis and his family portrayed as \nRoman gods in a 1670 painting by \nJean Nocret. L to R: Louis's aunt, \nHenriette-Marie; his brother, \nPhilippe, duc d'Orléans; the Duke's \ndaughter, Marie Louise d'Orléans, \nand wife, Henriette-Anne Stuart; the \nQueen-mother, Anne of Austria; \nthree daughters of Gaston \nd'Orléans; Louis XIV; the Dauphin \nLouis; Queen Marie-Thérèse;*la*\n*Grande Mademoiselle*. ", + "page_start": 5, + "page_end": 5, + "source_file": "wikipedia5.pdf" + }, + { + "text": "He did say, \"Every time I appoint someone to a vacant position, I make a hundred unhappy and one ungrateful.\"[146][147] Louis is \nrecorded by numerous eyewitnesses as having said on his deathbed: \"*Je m'en vais, mais l'État demeurera toujours.*\" (\"I depart, but \nthe State shall always remain.\")[148] ", + "page_start": 22, + "page_end": 22, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Louis began his personal reign with administrative and fiscal reforms. In 1661, the treasury verged on \nbankruptcy. To rectify the situation, Louis chose Jean-Baptiste Colbert as Controller-General of Finances in \n1665. However, Louis first had to neutralize Nicolas Fouquet, the powerful Superintendent of Finances. \nAlthough Fouquet's financial indiscretions were not very different from Mazarin's before him or Colbert's \nafter him, his ambition worried Louis. He lavishly entertained the king at the opulent château of Vaux-le- \nVicomte, flaunting a wealth which could hardly have accumulated except through embezzlement of government funds. \n\nRoyal \nMonogram \n\nFouquet appeared eager to succeed Mazarin and Richelieu in power, and he indiscreetly purchased and privately fortified the \nremote island of Belle Île. These acts sealed his doom. Fouquet was charged with embezzlement; the*Parlement*found him guilty \nand sentenced him to exile; and finally Louis altered the sentence to life imprisonment. ", + "page_start": 4, + "page_end": 4, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Several reasons have been suggested for the \ncreation of the extravagant and stately palace, as \nwell as the relocation of the monarchy's seat. The \nmemoirist Saint-Simon speculated \nthat Louis \nviewed Versailles as an isolated power centre where \ntreasonous cabals could be more readily discovered and foiled.[62] There has also been \nspeculation that the revolt of the*Fronde*caused Louis to hate Paris, which he abandoned \nfor a country retreat, but his sponsorship of many public works in Paris, such as the \nestablishment of a police force and of street-lighting,[111] lend little credence to this theory. \nAs a further example of his continued care for the capital, Louis constructed the*Hôtel des*\n*Invalides*, a military complex and home to this day for officers and soldiers rendered \ninfirm either by injury or old age. While pharmacology was still quite rudimentary in his \nday, the*Invalides*pioneered new treatments and set new standards for hospice treatment. \nThe conclusion of the Treaty of Aix-la-Chapelle in 1668 also induced Louis to demolish \nParis's northern walls in 1670 and replace them with wide tree-lined boulevards.[112] \n\nThe*Cour royale*and the*Cour de*\n*marbre*at Versailles ", + "page_start": 16, + "page_end": 16, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Alternatively, Louis's critics attribute the social upheaval culminating in the French Revolution to his failure to reform French \ninstitutions while the monarchy was still secure. Other scholars counter that there was little reason to reform institutions that \nlargely worked well under Louis. They also maintain that events occurring almost 80 years after his death were not reasonably \nforeseeable to Louis and that in any case, his successors had sufficient time to initiate reforms of their own.[135] \n\nLouis has often been criticised for his vanity. The memoirist Saint-Simon, who claimed \nthat Louis slighted him, criticised him thus: \n\nThere was nothing he liked so much as flattery, or, to put it more plainly, \nadulation; the coarser and clumsier it was, the more he relished it. ", + "page_start": 21, + "page_end": 21, + "source_file": "wikipedia5.pdf" + } + ] + }, + { + "references": { + "source_file": "wikipedia5.pdf", + "query": "What did Louis XIV do to avoid the Spanish War of Succession in 1698?", + "target_page": 13, + "target_passage": "In an attempt to avoid war, Louis signed the Treaty of the Hague with William III of England in 1698. This agreement divided Spain's Italian territories between Louis's son le Grand Dauphin and Archduke Charles, with the rest of the empire awarded to Joseph Ferdinand.", + "chunk_present": { + "presence": true, + "index": 9 + } + }, + "top_chunk": [ + { + "text": "**Acceptance of the will of Charles II and consequences**\n\nOn his deathbed in 1700, Charles II of Spain \nunexpectedly \nclear \ndemonstration of French military superiority for \nmany decades before this time, the pro-French \nfaction at the court of Spain, and even Pope \nInnocent XII convinced him that France was more likely to preserve his empire intact. He \nthus offered the entire empire to the Dauphin's second son Philip, Duke of Anjou, provided \nit remained undivided. Anjou was not in the direct line of French succession, thus his \naccession would not cause a Franco-Spanish union.[92] If Anjou refused, the throne would \nbe offered to his younger brother Charles, Duke of Berry. If the Duke of Berry declined it, \nit would go to Archduke Charles, then to the distantly related House of Savoy if Charles \ndeclined it.[93] \n\nchanged his will. The \n\nPhilip V of Spain \n\nLouis was confronted with a difficult choice. He could agree to a partition of the Spanish \npossessions and avoid a general war, or accept Charles II's will and alienate much of \nEurope. He may initially have been inclined to abide by the partition treaties, but the \nDauphin's insistence persuaded him otherwise.[94] Moreover, Louis's foreign minister, \nJean-Baptiste Colbert, marquis de Torcy, pointed out that war with the Emperor would \nalmost certainly ensue whether Louis accepted the partition treaties or Charles II's will. He \nemphasised that, should it come to war, William III was unlikely to stand by France since \nhe \"made a treaty to avoid war and did not intend to go to war to implement the treaty\".[91] Indeed, in the event of war, it might be \npreferable to be already in control of the disputed lands. Eventually, therefore, Louis decided to accept Charles II's will. Philip, \nDuke of Anjou, thus became Philip V, King of Spain. \n\nLouis in 1701 ", + "page_start": 13, + "page_end": 13, + "source_file": "wikipedia5.pdf" + }, + { + "text": "**Succession**\n\n*The Death of Louis XIV at the*\n*Palace of Versailles*, Thomas Jones \nBarker, 1835-1840 \n\nLouis outlived most of his immediate legitimate family. His last surviving legitimate son, \nLouis, Dauphin of France, died in 1711. Barely a year later, the Duke of Burgundy, the \neldest of the Dauphin's three sons and then heir-apparent to Louis, followed his father. \nBurgundy's elder son, Louis, Duke of Brittany, joined them a few weeks later. Thus, on his \n\ndeathbed, Louis's heir-apparent was his five-year-old great-grandson, Louis, Duke of Anjou, Burgundy's younger son. \n\nLouis foresaw an underaged successor and sought to restrict the power of his nephew Philip II, Duke of Orléans, who, as his \nclosest surviving legitimate relative in France, would probably become regent to the prospective Louis XV. Accordingly, the king \ncreated a regency council as Louis XIII had in anticipation of Louis XIV's own minority, with some power vested in his ", + "page_start": 19, + "page_end": 19, + "source_file": "wikipedia5.pdf" + }, + { + "text": "**France as the pivot of warfare**\n\nUnder Louis, France was the leading European power, and most wars pivoted around its \naggressiveness. No European state exceeded it in population, and no one could match its \nwealth, central location, and very strong professional army. It had largely avoided the \ndevastation of the Thirty Years' War. Its weaknesses included an inefficient financial \nsystem that was hard-pressed to pay for its military adventures, and the tendency of most \nother powers to gang up against it. \n\nDuring Louis's reign, France fought three major wars: the Franco-Dutch War, the Nine \nYears' War, and the War of the Spanish Succession. There were also two lesser conflicts: \nthe War of Devolution and the War of the Reunions.[64] The wars were very expensive but \ndefined Louis XIV's foreign policy, and his personality shaped his approach. Impelled \"by \na mix of commerce, revenge, and pique\", Louis sensed that war was the ideal way to \nenhance his glory. In peacetime, he concentrated on preparing for the next war. He taught \nhis diplomats that their job was to create tactical and strategic advantages for the French \nmilitary.[6] By 1695, France retained much of its dominance but had lost control of the seas \nto England and Holland, and most countries, both Protestant and Catholic, were in alliance \nagainst it. Sébastien Le Prestre de Vauban, France's leading military strategist, warned \nLouis in 1689 that a hostile \"Alliance\" was too powerful at sea. He recommended that \nFrance fight back by licensing French merchant ships to privateer and seize enemy \nmerchant ships while avoiding its navies: \n\nLouis XIV ", + "page_start": 9, + "page_end": 9, + "source_file": "wikipedia5.pdf" + }, + { + "text": "Another event Louis found threatening was England's Glorious Revolution of 1688. \nAlthough King James II was Catholic, his two Anglican daughters, Mary and Anne, \nensured the English people a Protestant succession. But when James II's son James Francis \nEdward Stuart was born, he took precedence in succession over his sisters. This seemed to \nherald an era of Catholic monarchs in England. Protestant lords called on the Dutch Prince \nWilliam III of Orange, grandson of Charles I of England, to come to their aid. He sailed for England with troops despite Louis's \nwarning that France would regard it as a provocation. Witnessing numerous desertions and defections, even among those closest \nto him, James II fled England. Parliament declared the throne vacant, and offered it to James's daughter Mary II and his son-in- \nlaw and nephew William. Vehemently anti-French, William (now William III of England) pushed his new kingdoms into war, thus \ntransforming the League of Augsburg into the Grand Alliance. Before this happened, Louis expected William's expedition to \nEngland to absorb his energies and those of his allies, so he dispatched troops to the Rhineland after the expiry of his ultimatum to \nthe German princes requiring confirmation of the Truce of Ratisbon and acceptance of his demands about the succession crises. \nThis military manoeuvre was also intended to protect his eastern provinces from Imperial invasion by depriving the enemy army \nof sustenance, thus explaining the preemptive scorched earth policy pursued in much of southwestern Germany (the \"Devastation \nof the Palatinate\").[80] \n\nLouis in 1690 ", + "page_start": 11, + "page_end": 11, + "source_file": "wikipedia5.pdf" + }, + { + "text": "One of Louis's more infamous decrees was the*Grande Ordonnance sur les Colonies*of \n1685, the*Code Noir*(black code). Although it sanctioned slavery, it attempted to humanise \nthe practice by prohibiting the separation of families. Additionally, in the colonies, only \nRoman Catholics could own slaves, and these had to be baptised. \n\nLouis ruled through a number of councils: \n\nConseil d'en haut (\"High Council\", concerning the most important matters of \nstate)—composed of the king, the crown prince, the controller-general of \nfinances, and the secretaries of state in charge of various departments. The \nmembers of that council were called ministers of state. \nConseil des dépêches (\"Council of Messages\", concerning notices and administrative reports from the provinces). \nConseil de Conscience (\"Council of Conscience\", concerning religious affairs and episcopal appointments). \nConseil royal des finances (\"Royal Council of Finances\") headed by the \"chef du conseil des finances\" (an \nhonorary post in most cases)—this was one of the few posts in the council available to the high aristocracy.[38] \n\n**Early wars in the Low Countries**\n\n**Spain**\n\nThe death of Louis's maternal uncle King Philip IV of Spain in 1665 precipitated the War of Devolution. In 1660, Louis had \nmarried Philip IV's eldest daughter, Maria Theresa, as one of the provisions of the 1659 Treaty of the Pyrenees.[39] The marriage \ntreaty specified that Maria Theresa was to renounce all claims to Spanish territory for herself and all her descendants.[39] Mazarin ", + "page_start": 5, + "page_end": 5, + "source_file": "wikipedia5.pdf" + }, + { + "text": "France established contact with Francis II Rákóczi and promised support if he took up the \ncause of Hungarian independence. \n\nThe Franco-Spanish army led by the \nDuke of Berwick defeated decisively \nthe Alliance forces of Portugal, \nEngland, and the Dutch Republic at \nthe Battle of Almansa. \n\nDefeats, famine, and mounting debt greatly weakened France. Between 1693 and 1710, \nover two million people died in two famines, made worse as foraging armies seized food \nsupplies from the villages.[98] In desperation, Louis ordered a disastrous invasion of the \nEnglish island of Guernsey in the autumn of 1704 with the aim of raiding their successful \nharvest. By the winter of 1708–09, he was willing to accept peace at nearly any cost. He \nagreed that the entire Spanish empire should be surrendered to Archduke Charles, and also \nconsented to return to the frontiers of the Peace of Westphalia, giving up all the territories \nhe had acquired over 60 years. But he could not promise that Philip V would accept these \nterms, so the Allies demanded that Louis single-handedly attack his grandson to force \nthese terms on him. If he could not achieve this within the year, the war would resume. \nLouis would not accept these terms.[99] ", + "page_start": 14, + "page_end": 14, + "source_file": "wikipedia5.pdf" + }, + { + "text": "In July 1695, the city of Namur, occupied for three years by the French, was besieged by an allied \narmy led by William III. Louis XIV ordered the surprise destruction of a Flemish city to divert the \nattention of these troops. This led to the bombardment of Brussels, in which more than 4,000 \nbuildings were destroyed, including the entire city centre. The strategy failed, as Namur fell three \nweeks later, but harmed Louis XIV's reputation: a century later, Napoleon deemed the \nbombardment \"as barbarous as it was useless\".[85] \n\nPeace was broached by Sweden in 1690. By 1692, both sides evidently wanted peace, and secret \nbilateral talks began, but to no avail.[86] Louis tried to break up the alliance against him by dealing \nwith individual opponents but did not achieve his aim until 1696 when the Savoyards agreed to the \nTreaty of Turin and switched sides. Thereafter, members of the League of Augsburg rushed to the \npeace table, and negotiations for a general peace began in earnest, culminating in the Peace of \nRyswick of 1697.[87] \n\nMarshal de Luxembourg ", + "page_start": 12, + "page_end": 12, + "source_file": "wikipedia5.pdf" + }, + { + "text": "In light of his foreign and domestic policies during the early 1680s, which were perceived \nas aggressive, Louis's actions, fostered by the succession crises of the late 1680s, created \nconcern and alarm in much of Europe. This led to the formation of the 1686 League of \nAugsburg by the Holy Roman Emperor, Spain, Sweden, Saxony, and Bavaria. Their stated \nintention was to return France to at least the borders agreed to in the Treaty of \nNijmegen.[78] Emperor Leopold I's persistent refusal to convert the Truce of Ratisbon into \na permanent treaty fed Louis's fears that the Emperor would turn on France and attack the \nReunions after settling his affairs in the Balkans.[79] ", + "page_start": 11, + "page_end": 11, + "source_file": "wikipedia5.pdf" + }, + { + "text": "**Accession**\n\nSensing imminent death in the spring of 1643, King Louis XIII decided to put his affairs in \norder for his four-year-old son Louis XIV. Not trusting the judgement of his Spanish wife \nQueen Anne, who would normally have become the sole regent of France, the king \ndecreed that a regency council would rule on his son's behalf, with Anne at its head.[13] \n\nLouis XIII died on 14 May 1643. On 18 May[14] Queen Anne had her husband's will \nannulled by the*Parlement de Paris*, a judicial body of nobles and high-ranking clergy,[15] \nand she became sole regent. She exiled her husband's ministers Chavigny and Bouthilier \nand appointed the Count of Brienne as her minister of foreign affairs.[16] Anne kept the \ndirection of religious policy strongly in hand until her son's majority in 1661. \n\nShe appointed Cardinal Mazarin as chief minister, giving him the daily administration of \npolicy. She continued the policies of her late husband and Cardinal Richelieu, despite their \npersecution of her, in order to win absolute authority in France and victory abroad for her \nson. Anne protected Mazarin by exiling her followers the Duke of Beaufort and Marie de \nRohan, who conspired against him in 1643.[17] \nLouis XIV as a young child, \nunknown painter \n\nThe best example of Anne's loyalty to France was her treatment of one of Richelieu's men, \nthe Chancellor Pierre Séguier. Séguier had brusquely interrogated Anne in 1637 (like a \n\"common criminal\", as she recalled) following the discovery that she was giving military secrets to her father in Spain, and Anne \nwas virtually under house arrest for years. By keeping the effective Séguier in his post, Anne sacrificed her own feelings for the \ninterests of France and her son Louis. ", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia5.pdf" + }, + { + "text": "The principal claimants to the throne of Spain belonged to the ruling families of France and Austria. The French claim derived \nfrom Louis XIV's mother Anne of Austria (the older sister of Philip IV of Spain) and his wife Maria Theresa (Philip IV's eldest \ndaughter). Based on the laws of primogeniture, France had the better claim as it originated from the eldest daughters in two \ngenerations. However, their renunciation of succession rights complicated matters. In the case of Maria Theresa, nonetheless, the \nrenunciation was considered null and void owing to Spain's breach of her marriage contract with Louis. In contrast, no \nrenunciations tainted the claims of Emperor Leopold I's son Charles, Archduke of Austria, who was a grandson of Philip III's \nyoungest daughter Maria Anna. The English and Dutch feared that a French or Austrian-born Spanish king would threaten the \nbalance of power and thus preferred the Bavarian Prince Joseph Ferdinand, a grandson of Leopold I through his first wife \nMargaret Theresa of Spain (the younger daughter of Philip IV). \n\nIn an attempt to avoid war, Louis signed the Treaty of the Hague with William III of England in 1698. This agreement divided \nSpain's Italian territories between Louis's son*le Grand Dauphin*and Archduke Charles, with the rest of the empire awarded to \nJoseph Ferdinand. William III consented to permitting the Dauphin's new territories to become part of France when the latter ", + "page_start": 12, + "page_end": 12, + "source_file": "wikipedia5.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed2.pdf", + "query": "Does nerve transection or crushing affect small afferents within the dorsal root ganglion in the same way?", + "target_page": 5, + "target_passage": "Both SNItrans (Fig. 2C) and SNIcrush (Fig. 2D) injuries resulted in a rightward shift in population distributions of the cross-sectional area of nucleated, FB-labelled DRG neurons when compared with contralateral DRG, consistent with a loss of small afferents post–nerve injury.", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "3. Results \n\n3.1. Peripheral nerve injury induces a loss of small neurons \nfrom the dorsal root ganglion \n\nTogether, our data derived from several different experimental \napproaches show that a population of small-diameter afferents \nare lost following peripheral nerve injury. \n\n3.2. Spared nerve crush or transection results in death of \nMrgprd-expressing neurons \n\nTo date, determining cell \nloss among specific populations of \nafferent neurons has proved challenging due to the down- \nregulation of subpopulation-specific marker genes following \ntransection.37,44 To overcome this issue, we took \naxonal \nadvantage of \ntransgenic strategies to label populations in \na manner that persisted after injury. Owing to the bias for the \nloss of small neurons and the known loss of IB4-binding central \nterminals postinjury,36 we initially focused on nonpeptidergic \nnociceptive neurons. We used MrgDChR2-YFP mice to identify \nneurons belonging to the largest of \nthe 3 classes of non- \npeptidergic nociceptors, NP1.55,59 To determine whether these \nneurons are lost following nerve injury, we used a stereological \nmethod to quantify L4 DRG MrgD-YFP1 (yellow fluorescent ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed2.pdf" + }, + { + "text": "SNItrans resulted in a mixed population of axotomized and intact \nafferents within the L4 DRG. Therefore, we developed an approach \nto restrict our analysis to axotomized afferents, without relying on \ntransgenic labelling, and used this as a complementary approach to \nconfirm our findings. We injected the neuronal tracer FB into the \nglabrous, tibial innervation territory of both hindpaws 1 week before \ncommon peroneal and tibial transection (SNItrans) or crush (SNIcrush) \nsurgeries (Figs. 2A and B). FastBlue-uptake was complete across \nneurons of all sizes by 1 week (Fig. S3, http://links.lww.com/PAIN/ \nC84), so this approach allowed us to profile a sample of the \naxotomized afferents. Both SNItrans (Fig. 2C) and SNIcrush (Fig. 2D) \ninjuries resulted in a rightward shift in population distributions of the \ncross-sectional area of nucleated, FB-labelled DRG neurons when \ncompared with contralateral DRG, consistent with a loss of small \nafferents post–nerve injury. ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed2.pdf" + }, + { + "text": "There are many anatomical sites within the somatosensory \nnervous system where differential \nloss of sensory neuron \npopulations could impact neurobiology. For example, loss of \ncutaneous afferents may afford more opportunity for plasticity in \nreinnervation patterns, such as collateral sprouting of uninjured or \nsurviving afferents, and the types of nerve endings made by \ndifferent molecular subpopulations.17,27 It also seems likely that the \ndeath of many neurons within a DRG could contribute to the \nexpansion and activation of immune cell types, which are known to \nplay a major role in neuropathic pain.30,69 Finally, under normal \nconditions, peripheral sensory input is integrated into the dorsal \nhorn of the spinal cord by complex interneuron circuitry. Many \nspinal circuits are engaged by convergent input from different \nafferent types.9,41,70 Therefore, selective loss of input from discrete \nafferent types could undoubtedly impact the normal processing of \nremaining afferent signals.34 Experimentally abrogating neuronal \nloss may be a fruitful approach to assess the contribution to \nnervous system plasticity (adaptive or maladaptive) following injury. \nIn this regard, our in vitro readout would be a useful experimental ", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed2.pdf" + }, + { + "text": "Figure 1. SNItrans induces death of small primary afferent neurons, accompanied by a reduction in volume, not cell density, of the dorsal root ganglion. (A) \nApproach to differentially labelled intact afferents with tdTomato and damaged afferents with GFP after peripheral nerve injury using the AvilFlpO;Atf3CreERT2;RC:: \nFLTG mouse line and schematic of experimental timeline. (B) Representative image of GFP, tdTomato, and NeuN expression in an L4 DRG, 2 weeks after SNItrans. \nScale bars 5 100 mm. (C and D) Stereological quantification of the total number of DRG neurons (C) or number of axotomized and intact neurons (D) in the L4 DRG \n1, 2, 4, and 8 weeks after SNItrans or contralateral (contra) to injury. (C) One-way ANOVA with Tukey posttests; F4,10 5 37.98, P , 0.001. (D) Two-way RM ANOVA; \nTimepoint 3 Color interaction F4,10 5 39.04, P , 0.001, n 5 3 mice; Tukey posttests (between injured groups): †P , 0.05 vs contra, ‡P , 0.05 vs 1-week. (E) \nVolume of DRG-containing cells (ie, excluding white matter tracts) following SNItrans. One-way ANOVA with Tukey posttests; F4,10 5 21.25, P , 0.001, n 5 3. (F) \nNeuronal density within the DRG following SNItrans. One-way ANOVA; F4,10 5 2.77, P 5 0.09, n 5 3. (G) Population distribution of uninjured and injured afferents by \ncross-sectional area, 1 and 8 weeks post-SNItrans. Kolmogorov–Smirnov tests of cumulative distributions; Uninjured: D 5 0.08, P 5 0.18; Injured: D 5 0.32, P , \n0.001; n 5 310 to 427 neurons from 3 mice.*P , 0.05,**P , 0.01,***P , 0.001 vs contra. ANOVA, analysis of variance; DRG, dorsal root ganglion; GFP, green \nfluorescent protein. ", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed2.pdf" + }, + { + "text": "Figure 2. Spared nerve crush and transection lead to a loss of small DRG neurons. (A) Approach to restrict analysis to damaged afferents: a subcutaneous \ninjection of the tracer FB into both hindpaws labelled tibial afferents, before unilateral SNItrans or SNIcrush surgery. (B) Representative image of FB labelling and NeuN \nimmunostaining in the L4 DRG. The image is a projection of optical sections at 3-mm intervals through the entirety of a 30-mm-thick tissue section. Scale bar 5 \n100 mm. (C and D) Quantification of the cross-sectional area of FastBlue labelled DRG neurons ipsilateral and contralateral to SNItrans (C) or SNIcrush injury (D) \nreveals a loss of small afferents and subsequent shift in population distribution. Kolmogorov–Smirnov tests of cumulative distributions; SNItrans: D 5 0.25, P , \n0.001; n 5 183 or 191 neurons from 3 mice; SNIcrush: D 5 0.22, P , 0.001, n 5 319 or 325 neurons from 3 mice. (E) Experimental approach for whole DRG \nvolumetric analyses after SNItrans. (F) Representative 3D rendering of TDP-43 profiles and corresponding nuclear spot profiles following Imaris-based spot \ndetection feature. Scale bar 5 100 mm. (G) Quantification of DRG nuclear spot volume ipsilateral and contralateral to SNItrans. Kolmogorov–Smirnov tests of \ncumulative distribution: D 5 0.06, P , 0.001, n 5 30,206 (contra) or 32,544 (ipsi) nuclei from 4 (contra) or 5 (ipsi) mice. (H) Total number of nuclear spots, by size, \nper DRG. Two-way RM ANOVA; size bin 3 injury interaction: F2,145 8.26, P 5 0.004; n 5 4 to 5 mice; ˇS´ıd ´ak multiple comparisons tests:**P , 0.01. ANOVA, \nanalysis of variance; DRG, dorsal root ganglion; FB, FastBlue; RM, repeated measures. ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed2.pdf" + }, + { + "text": "A.H. Cooper et al.·165 (2024) 2863–2876 \n2872 \n\ninjury (Fig. S6A–C, http://links.lww.com/PAIN/C84), indicating \nthat any loss of neurons within specific neuronal subpopulations \nwas not biased towards soma size. Collectively, these data show \nthat unrepaired axonal damage to peripheral sensory neurons \ninduces a partial loss of Trpm81 and CGRP1 subpopulations, \nbut no major loss of myelinated afferents. \nBased on our findings of preferential \n\ndeveloped transgenic recombinase driver lines, we have \nshown that \nloss is biased across molecularly defined \nsubpopulations. Nonpeptidergic nociceptive neurons are \nparticularly susceptible to loss, with almost all Mrgprd1 \naxotomized afferents lost following an unrepaired transection \ninjury (SNItrans) and roughly half lost following a model which \ncontrastingly allows for nerve regenerations (SNIcrush). \nFinally, we have observed that the vulnerability of Mrgprd1 \nneurons extends to the in vitro setting and provide data to \nsupport \nloss is driven by a lack of \nthe hypothesis that \nneurotrophic support following injury. ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed2.pdf" + }, + { + "text": "Abstract \nThere is a rich literature describing the loss of dorsal root ganglion (DRG) neurons following peripheral axotomy, but the vulnerability \nof discrete subpopulations has not yet been characterised. Furthermore, the extent or even presence of neuron loss following injury \nhas recently been challenged. In this study, we have used a range of transgenic recombinase driver mouse lines to genetically label \nmolecularly defined subpopulations of DRG neurons and track their survival following traumatic nerve injury. We find that spared \nnerve injury leads to a marked loss of cells containing DRG volume and a concomitant loss of small-diameter DRG neurons. Neuron \nloss occurs unequally across subpopulations and is particularly prevalent in nonpeptidergic nociceptors, marked by expression of \nMrgprd. We show that this subpopulation is almost entirely lost following spared nerve injury and severely depleted (by roughly 50%) \nfollowing sciatic nerve crush. Finally, we used an in vitro model of DRG neuron survival to demonstrate that nonpeptidergic \nnociceptor loss is likely dependent on the absence of neurotrophic support. Together, these results profile the extent to which DRG \nneuron subpopulations can survive axotomy, with implications for our understanding of nerve injury–induced plasticity and pain. ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed2.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
[ 53 ]
Tandrup T, Woolf CJ, Coggeshall RE. Delayed loss of small dorsal root ganglion cells after transection of the rat sciatic nerve. J Comp Neurol 2000 ; 422 : 172 – 80.
[ 54 ]
Terenghi G, Hart A, Wiberg M. The nerve injury and the dying neurons : diagnosis and prevention. J Hand Surg Eur Vol 2011 ; 36 : 730 – 4.
[ 55 ]
Uncekin D, Furier A, Islam S, Abdo H, Lonnetterg P, Lox D, Herling - Leffer J, Heaggthon J, Kharchenko O, Kharcherko Pai, Linnansson S, Emfors P : Unbiased classification of sensory neuron types by large - scale single - cell RNA sequencingi
[ 56 ]
Vestergaard S, Tandrup T, Jakobsen J. Effect of permanent awotomy on number and volume of dorsal root ganglion cell bodies. J Comp Neurol 1997.388 - 307 - 12.
[ 57 ]
Wall PD, Gutnick M. Properties of afferent nerve impulses originating from a neuroma. Nature 1974 ; 248 : 740 – 43.
[ 58 ]
WangCr, Gx L. PluenY, GengX, Xx, M, YangN, YvLL, BengY, ZhurC, Yang Y, Zhox Y, Gvan X, Luo W, LuG, DongK, YvLG, LanL, TlengZ, Fleolifation of MrgprD by TRP - A1 promotes neuropathic pain, FASEB, J 2019.33 : 1360 – 73.
[ 59 ]
Wang H, Zyka MJ. Mrgprd - expressing polymodal nociceptive neurons imervate most. known classes of substantia gelatinosa neurons. J Neurosoi 2009 ; 29 : 13202 – 9.
[ 60 ]
Wang R, Guo W, Ossipox MH, Vanderah TW, Porreca F, La J. Glial cell line - derived neurotrophic factor normalizes neurochemical changes in injured dorsal root ganglion neurons and preventis the expression of experimental neuropathic pa
[ 61 ]
Wang X, Archibald ML, Sitevens K, Baidridge WH, Chauhan BC. Qyan fluorescent protein ( CFP ) expressing cells in the refina of Thy1 - CFP transgenic mice before and after optic nerve injury. Neurosci Lett 2010 ; 468 : 110 – 4.
[ 62 ]
Warwick C, Cassidy C, Hachisulia J, Wright MC, Baunbauer HM, Adelman PC, LaskH, Shrahian TO, Ross SE, Koerbe HR, MrgordOre Ineage neurons mediate optogenetic alodynia through an emergent polynaptic circuit, PAN 2021 ; HS2 ; 2120 – 31.
", + "page_start": 13, + "page_end": 13, + "source_file": "pubmed2.pdf" + }, + { + "text": "observed 7809 6 153 neurons per DRG; this was not significantly \ndifferent to the number of neurons in the contralateral DRG \n(7917 6 349), whereas cell number approximately halved by \n8 weeks postinjury to 3963 6 410 neurons per DRG (Fig. 1C). \nSeparating analysis into intact vs axotomized afferents revealed \nthat only axotomized afferents were lost, with no difference \nobserved in numbers of intact afferents (Fig. 1D). Between 1 and \n8 weeks after injury, we observed a 61.0 6 7.0% decrease in the \nnumber of GFP1 neurons. This loss of injured afferents resulted \nin a loss of neuron-containing (ie, excluding white matter regions) \nDRG volume (Fig. 1E), but not neuron density (Fig. 1F). Cell loss \npredominantly occurred between 1 and 2 weeks postinjury and \nstabilized after this timepoint. Population distributions of the \ncross-sectional area of nucleated, \ntdTomato-expressing cell \nprofiles were not significantly different at 1 vs 8 weeks post- \nSNItrans, in contrast to GFP-expressing/injured afferents, in which \na loss of a population of small afferents at 8 weeks postinjury was \nobserved (Fig. 1G). ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed2.pdf" + }, + { + "text": "Figure 3. Spared nerve crush or transection results in death of nonpeptidergic neurons. (A) Schematic of experimental approach for (B and C). (B) MrgDChR2-YFP L4 \nDRGs 4 weeks after SNI, contralateral or ipsilateral to injury. Images are projections of optical sections at 3-mm intervals through the entirety of 30-mm-thick tissue \nsections. Scale bars 5 100 mm. (C) Quantification of total number of MrgD-YFP1 cells per L4 DRG 4 weeks after SNI revealed a significant loss in ipsilateral DRG. \nTwo-way RM ANOVA with ˇS´ıd ´ak multiple comparisons tests; Side x Treatment interaction: F1,5 5 9.23, P 5 0.029; n 5 3 mice. (D) The experimental approach \nused to generate data presented in (E–G). (E and F) MrgD-YFP expression and FB labelling in the L4 DRG, 14 days after SNI or crush surgery or contralateral to \ninjury. White boxes represent regions enlarged in (F). Scale bars 5 100 mm (E) or 20 mm (F). (G) The proportion of FB-labelled DRG neurons decreased after spared \nnerve crush injury, and co-labelling is almost completely absent after SNI. Two-way RM ANOVA with ˇS´ıd ´ak multiple comparisons tests; side 3 injury interaction: \nF1,4 5 7.80, P 5 0.049; n 5 3 mice. Posttests:*P , 0.05,**P , 0.01. ANOVA, analysis of variance; DRG, dorsal root ganglion; SNI, spared nerve injury; FB, \nFastBlue; RM, repeated measures. ", + "page_start": 7, + "page_end": 7, + "source_file": "pubmed2.pdf" + } + ] + }, + { + "references": { + "source_file": "legal5_eubiodiversity_cc4.pdf", + "query": "What are the EU's key nature conservation commitments for 2030?", + "target_page": 6, + "target_passage": "1. Legally protect a minimum of 30% of the EU’s land area and 30% of the EU’s sea area and integrate ecological corridors, as part of a true Trans-European Nature Network. 2. Strictly protect at least a third of the EU’s protected areas, including all remaining EU primary and old-growth forests. 3. Effectively manage all protected areas, defining clear conservation objectives and measures, and monitoring them appropriately.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "With this strategy, the Commission proposes ambitious commitments for the EU to bring \nto the table. The EU should also support governments and stakeholders across the globe \nto significantly step up their ambition and their action. \n\nThe Commission proposes that the EU ensures that the post-2020 global framework \nincludes, at a minimum, the elements outlined below: \n\n Overarching global goals for biodiversity for 2050, in line with the United \nNations 2030 Agenda for Sustainable Development and the vision of ‘living in \nharmony with nature’. The ambition should be that,**by 2050, all of the world’s**\n**ecosystems are restored, resilient, and adequately protected.**The world \nshould commit to the net-gain principle to give nature back more than it takes. \nThe world should commit to no human-induced extinction of species, at \nminimum where avoidable. \n\n Ambitious**global 2030 targets in line with EU commitments**in this strategy. \nThese should clearly address the drivers of biodiversity loss and be specific, \nmeasurable, actionable, relevant and time-bound. \n\n A much**stronger implementation, monitoring and review**process. Parties \nshould revise their National Biodiversity Strategies and Action Plans by the end \nof 2021, or as a minimum, submit national commitments for the most important \ntargets. There should be a**regular review cycle**to look at progress towards the ", + "page_start": 19, + "page_end": 19, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "The Commission will aim to agree the criteria and guidance for additional designations \nwith Member States by the end of 2021. Member States will then have until the end of \n2023 to demonstrate significant progress in legally designating new protected areas and \nintegrating ecological corridors. On this basis, the Commission will assess by 2024 \nwhether the EU is on track to meet its 2030 targets or whether stronger actions, including \nEU legislation, are needed. \n\nFinally, the**Overseas Countries and Territories**also host important biodiversity \nhotspots, not governed by EU environmental rules. The Commission encourages relevant \nMember States to consider promoting equal or equivalent rules in these countries and \nterritories. \n\n**Nature protection: key commitments by 2030**\n\n1. Legally protect a minimum of 30% of the EU’s land area and 30% of the EU’s sea \narea and integrate ecological corridors, as part of a true Trans-European Nature \nNetwork. \n\n2. Strictly protect at least a third of the EU’s protected areas, including all remaining EU \n\nprimary and old-growth forests. \n\n3. Effectively manage all protected areas, defining clear conservation objectives and \n\nmeasures, and monitoring them appropriately. ", + "page_start": 5, + "page_end": 5, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": " Firstly, and subject to an impact assessment, the Commission will put forward a \nproposal for legally binding**EU nature restoration targets**in 2021 to restore \ndegraded ecosystems, in particular those with the most potential to capture and \nstore carbon and to prevent and reduce the impact of natural disasters. This will \nidentify the conditions in which the targets must be met, as well as the most \neffective measures to reach them. The impact assessment will also look at the \npossibility of an EU-wide methodology to map, assess and achieve good \ncondition of ecosystems so they can deliver benefits such as climate regulation, \nwater regulation, soil health, pollination and disaster prevention and protection. \n\n \n\nIn that context, the Commission will request and support Member States to raise \nthe level of implementation of existing legislation within clear deadlines. It will \nin particular request Member States to ensure**no deterioration in conservation**\n**trends and status**of all protected habitats and species by 203030. In addition, \nMember States will have to ensure that at least 30% of species and habitats not \n\n28 Notably the EU Birds Directive (2009/147/EC), Habitats Directive (92/43/EEC), Water Framework \nDirective (2000/60/EC), Floods Directive (2007/60/EC) and Marine Strategy Framework Directive \n(2008/56/EC). \n29 See Fitness Check of the EU Nature Legislation (SWD(2016) 472) and Fitness Check of the EU Water \n\n\n \n \n \n \n [html]\n
TableTable
TableAlbiological
1.Specifications
", + "page_start": 6, + "page_end": 6, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "build on the headline ambition to ensure that by 2050**all of the world’s ecosystems are**\n**restored, resilient, and adequately protected.**The world should commit to the net-gain \nprinciple to give nature back more than it takes. As part of this, the world should commit \nto no human-induced extinction of species, at minimum where avoidable. \n\nThis strategy sets out how Europe can help make this happen. As a milestone, it aims to \nensure that**Europe's biodiversity will be on the path to recovery by 2030**for the \nbenefit of people, the planet, the climate and our economy, in line with the 2030 Agenda \nfor Sustainable Development and with the objectives of the Paris Agreement on Climate \nChange. It addresses the five main drivers of biodiversity loss, sets out an enhanced \ngovernance framework to fill remaining gaps, ensures the full implementation of EU \nlegislation, and pulls together all existing efforts. This strategy is enterprising and \nincentivising in spirit and action. It reflects the fact that**protecting and restoring nature**\n**will need more than regulation alone**. It will require action by citizens, businesses, \nsocial partners and the research and knowledge community, as well as strong \npartnerships between local, regional, national and European level. This strategy is in line \nwith the ambitions and commitment set out in President von der Leyen’s Political \nGuidelines and in the European Green Deal. ", + "page_start": 3, + "page_end": 3, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "States and the European Environment Agency, will put forward in 2020 criteria and \nguidance for identifying and designating additional areas, including a definition of strict \nprotection, as well as for appropriate management planning. In doing so, it will indicate \nhow other effective area-based conservation measures and greening of cities could \ncontribute to the targets. \n\nThe targets relate to the EU as a whole and could be broken down according to the EU \nbio-geographical regions and sea basins or at a more local level.**Every Member State**\n**will have to do its fair share of the effort**based on objective ecological criteria, \nrecognising that each country has a different quantity and quality of biodiversity. \nParticular focus will be placed on protecting and restoring the tropical and sub-tropical \nmarine and terrestrial ecosystems in the EU’s outermost regions given their exceptionally \nhigh biodiversity value. \n\nIn addition, in order to have a truly coherent and resilient Trans-European Nature \nNetwork, it will be important to set up**ecological corridors**to prevent genetic isolation, \nallow for species migration, and maintain and enhance healthy ecosystems. In this \ncontext, investments in green and blue infrastructure27 and cooperation across borders \namong Member States should be promoted and supported, including through the \nEuropean Territorial Cooperation. ", + "page_start": 5, + "page_end": 5, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "The implementation of the**EU Invasive Alien Species Regulation**58 and other relevant \nlegislation and international agreements must also be stepped up**.**This should aim to \nminimise, and where possible eliminate, the introduction and establishment of alien \nspecies in the EU environment. The aim will be to manage established invasive alien \nspecies and**decrease the number of Red List species they threaten by 50%**59. \n\n**EU Nature Restoration Plan: key commitments by 2030**\n\n1. Legally binding EU nature restoration targets to be proposed in 2021, subject to an \nimpact assessment. By 2030, significant areas of degraded and carbon-rich \necosystems are restored; habitats and species show no deterioration in conservation \ntrends and status; and at least 30% reach favourable conservation status or at least \nshow a positive trend. \n\n2. The decline in pollinators is reversed. \n3. The risk and use of chemical pesticides is reduced by 50% and the use of more \n\nhazardous pesticides is reduced by 50%. \n\n4. At least 10% of agricultural area is under high-diversity landscape features. \n5. At least 25% of agricultural land is under organic farming management, and the \n\nuptake of agro-ecological practices is significantly increased. \n\n6. Three billion new trees are planted in the EU, in full respect of ecological principles. \n7. Significant progress has been made in the remediation of contaminated soil sites. \n8. At least 25,000 km of free-flowing rivers are restored. ", + "page_start": 14, + "page_end": 14, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "policies. In addition, by integrating policy coherence for sustainable development in all \nits policies, the EU will reduce the pressure on biodiversity worldwide. In all of its \ninternational cooperation, the EU should promote sustainable agricultural and fisheries \npractices and actions to protect and restore the world’s forests. Particular attention will \nalso be paid to sustainable water resource management, the restoration of degraded land, \nand the protection and restoration of biodiverse areas with high ecosystem services and \nclimate mitigation potential. A better protection of natural ecosystems, coupled with \nefforts to reduce wildlife trade and consumption, will also help prevent and build up \nresilience to possible future diseases and pandemics. The EU will enhance its support to \nglobal efforts to apply the**One Health approach**83, which recognises the intrinsic \nconnection between human health, animal health and healthy resilient nature. \n\nThe EU will step up support to partner countries across the world to achieve the new \nglobal targets, fight environmental crime, and tackle the drivers of biodiversity loss. In \nAfrica, the EU will launch the**NaturAfrica**initiative to protect wildlife and key \necosystems while offering opportunities in green sectors for local populations. Similar \nprojects will be developed in other regions. The EU will also support the Western \nBalkans and EU Neighbourhood countries in their efforts to protect biodiversity. ", + "page_start": 22, + "page_end": 22, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "In all of its work, the EU will strengthen the links between**biodiversity protection and**\n**human rights**, gender, health, education, conflict sensitivity, the rights-based approach, \nland tenure and the role of indigenous peoples and local communities. \n\nAs part of its global efforts, the EU will promote biodiversity coalitions with partners and \ncivil society around the world. For example, in March 2020, the Commission launched \nthe**Global Biodiversity Coalition**of national parks, aquariums, botanic gardens, zoos, \nnatural history and sciencemuseums to help raise awareness around the world on the need \nto protect and nurture biodiversity. The Commission will consider launching or joining \nother High Ambition Coalitions to help develop the post-2020 framework. \n\n**5. CONCLUSION**\n\nProtecting and restoring biodiversity is the only way to preserve the quality and \ncontinuity of human life on Earth. The commitments proposed in this strategy pave the \nway for ambitious and necessary changes – changes that will ensure the wellbeing and \neconomic prosperity of present and future generations in a healthy environment. The \nimplementation of these commitments will take into account the diversity of challenges \nacross sectors, regions and Member States, recognise the need to ensure social justice, \nfairness and inclusiveness in line with the European Pillar of Social Rights, and will \nrequire a sense of responsibility and strong joint efforts from the EU, its Member States, \nstakeholders and citizens. ", + "page_start": 22, + "page_end": 22, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "**2.2. An EU Nature Restoration Plan: restoring ecosystems across**\n\n**land and sea**\n\nProtecting the nature we have will not be enough to bring nature back into our lives. To \nreverse biodiversity loss, the world needs to be more ambitious on nature restoration. \nWith a**new EU Nature Restoration Plan**, Europe will lead the way. \n\nThe plan will help improve the health of existing and new protected areas, and bring \ndiverse and resilient nature back to all landscapes and ecosystems. This means reducing \npressures on habitats and species, and ensuring all use of ecosystems is sustainable. It \nalso means supporting the recovery of nature, limiting soil sealing and urban sprawl, and \ntackling pollution and invasive alien species. The plan will create jobs, reconcile \neconomic activities with nature growth and help ensure the long-term productivity and \nvalue of our natural capital. \n\n*2.2.1. Strengthening the EU legal framework for nature restoration*\n\nNature restoration is already partially required from the Member States in existing EU \nlegislation28. However,**significant implementation and regulatory gaps hinder**\n**progress**. For instance, there is no requirement for Member States to have biodiversity \nrestoration plans. There are not always clear or binding targets and timelines and no \ndefinition or criteria on restoration or on the sustainable use of ecosystems. There is also \nno requirement to comprehensively map, monitor or assess ecosystem services, health or \nrestoration efforts. These issues are exacerbated by the gaps in implementation that \nprevent the existing legislation from achieving its objectives29. Stronger implementation \nsupport and enforcement is required. To ensure that nature restoration across land and sea \npicks up, increases the EU’s resilience, and contributes to climate change mitigation and \nadaptation as a key nature-based solution, this strategy puts forward two strands of \nactions: ", + "page_start": 6, + "page_end": 6, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "*3.3.2. Investments, pricing and taxation*\n\nTackling biodiversity loss and restoring ecosystems will require significant public and \nprivate investments at national and European level. This will mean making the most of \nall relevant EU programmes and financing instruments. The Commission will strengthen \nits**biodiversity proofing framework**69,*inter alia*by using in an appropriate way the \ncriteria established under the EU taxonomy, to ensure that EU funding supports \nbiodiversity-friendly investments. \n\nTo meet the needs of this strategy, including investment priorities for Natura 2000 and \ngreen infrastructure,**at least €20 billion a year70 should be unlocked for spending on**\n**nature**. This will require mobilising private and public funding at national and EU \nlevel71, including through a range of different programmes in the next long-term EU \nbudget. Moreover, as nature restoration will make a major contribution to climate \nobjectives, a significant proportion of the 25% of the EU budget dedicated to climate \naction will be invested on biodiversity and nature-based solutions. \n\nUnder Invest EU, a dedicated natural-capital and circular-economy initiative will be \nestablished to mobilise at least €10 billion over the next 10 years, based on public/private \nblended finance. Nature and biodiversity is also a priority for the European Green Deal \nInvestment Plan. To help unlock the investment needed, the EU must provide long-term \ncertainty for investors and help embed sustainability in the financial system. The EU \n**sustainable finance taxonomy**will help guide investment towards a green recovery and \nthe deployment of nature-based solutions. In 2021, the Commission will adopt a \ndelegated act under the Taxonomy Regulation72 to establish a common classification of \neconomic activities that substantially contribute to protecting and restoring biodiversity \nand ecosystems. This will be further supported by a**Renewed Sustainable Finance**\n**Strategy**later this year which will help ensure that the financial system contributes to \nmitigating existing and future risks to biodiversity and better reflect how biodiversity \nloss affects companies’ profitability and long-term prospects73. ", + "page_start": 17, + "page_end": 17, + "source_file": "legal5_eubiodiversity_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "legal5_eubiodiversity_cc4.pdf", + "query": "Was there a biodiversity governance framework in place in the EU before the European Commission's proposal?", + "target_page": 16, + "target_passage": "In the EU, there is currently no comprehensive governance framework to steer the implementation of biodiversity commitments agreed at national, European or international level. To address the gap, the Commission will put in place a new European biodiversity governance framework. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**3. ENABLING TRANSFORMATIVE CHANGE**\n\n**3.1. A new governance framework**\n\nIn the EU, there is currently no comprehensive governance framework to steer the \nimplementation of biodiversity commitments agreed at national, European or \ninternational level. To address the gap, the Commission will put in place**a new**\n**European biodiversity governance framework**. This will help map obligations and \ncommitments and set out a roadmap to guide their implementation. \n\nAs part of this new framework, the Commission will put in place a monitoring and \nreview mechanism. This will include a**clear set of agreed indicators**and will enable \nregular progress assessment and set out corrective action if necessary. This mechanism \nwill feed the Environmental Implementation Review and contribute to the European \nSemester. \n\nThe new governance framework will ensure co-responsibility and co-ownership by all \nrelevant actors in meeting the EU’s biodiversity commitments. It will support \nadministrative capacity building, transparency, stakeholder dialogue, and participatory \ngovernance at different levels. \n\nThe Commission will assess the progress and suitability of this approach in 2023, and \nconsider whether a legally binding approach to governance is needed. \n\n**3.2.**\n\n**Stepping up**\n**environmental legislation**\n\n**implementation and enforcement of EU**\n\nAll environmental legislation relies on proper implementation and enforcement. Over the \nlast 30 years, the EU has put in place a solid legislative framework to protect and restore \nits natural capital. However, recent evaluations show that although legislation is fit for \npurpose, implementation on the ground is lagging behind60. This is having dramatic \nconsequences on biodiversity and comes with a substantial economic cost61.**The full**\n**implementation and enforcement of EU environmental legislation is therefore at the**\n**heart of this strategy**, for which political support and financial and human resources \nwill need to be prioritised. ", + "page_start": 15, + "page_end": 15, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "To ensure environmental and social interests are fully embedded into business strategies, \nthe Commission will put forward a new initiative in 2021 on**sustainable corporate**\n**governance**. This initiative, which may take the form of a legislative proposal, will \naddress human rights and environmental duty of care and due diligence across economic \nvalue chains in a proportionate way according to different sizes of entreprises64. This will \nhelp ensure that shareholder and stakeholder interests are fully aligned with the \nobjectives set out in this strategy. In addition, in 2020, the Commission launched a \nreview of the reporting obligations of businesses under the**Non-Financial Reporting**\n**Directive**65, with a view to improving the quality and scope of non-financial disclosures, \nincluding on environmental aspects such as biodiversity. \n\nThrough its existing platforms66, the Commission will help to build a**European**\n**Business for Biodiversity**movement, taking inspiration from recent initiatives67 and \nmaking this movement an integral part of the European Climate Pact. Particular attention \nwill be paid to measures to incentivise and eliminate barriers for the take-up of nature- \nbased solutions, as these can lead to significant business and employment opportunities \nin various sectors68 and are the key to innovation for economic or societal needs that rely \non nature. ", + "page_start": 16, + "page_end": 16, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "*3.3.2. Investments, pricing and taxation*\n\nTackling biodiversity loss and restoring ecosystems will require significant public and \nprivate investments at national and European level. This will mean making the most of \nall relevant EU programmes and financing instruments. The Commission will strengthen \nits**biodiversity proofing framework**69,*inter alia*by using in an appropriate way the \ncriteria established under the EU taxonomy, to ensure that EU funding supports \nbiodiversity-friendly investments. \n\nTo meet the needs of this strategy, including investment priorities for Natura 2000 and \ngreen infrastructure,**at least €20 billion a year70 should be unlocked for spending on**\n**nature**. This will require mobilising private and public funding at national and EU \nlevel71, including through a range of different programmes in the next long-term EU \nbudget. Moreover, as nature restoration will make a major contribution to climate \nobjectives, a significant proportion of the 25% of the EU budget dedicated to climate \naction will be invested on biodiversity and nature-based solutions. \n\nUnder Invest EU, a dedicated natural-capital and circular-economy initiative will be \nestablished to mobilise at least €10 billion over the next 10 years, based on public/private \nblended finance. Nature and biodiversity is also a priority for the European Green Deal \nInvestment Plan. To help unlock the investment needed, the EU must provide long-term \ncertainty for investors and help embed sustainability in the financial system. The EU \n**sustainable finance taxonomy**will help guide investment towards a green recovery and \nthe deployment of nature-based solutions. In 2021, the Commission will adopt a \ndelegated act under the Taxonomy Regulation72 to establish a common classification of \neconomic activities that substantially contribute to protecting and restoring biodiversity \nand ecosystems. This will be further supported by a**Renewed Sustainable Finance**\n**Strategy**later this year which will help ensure that the financial system contributes to \nmitigating existing and future risks to biodiversity and better reflect how biodiversity \nloss affects companies’ profitability and long-term prospects73. ", + "page_start": 17, + "page_end": 17, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "With this strategy, the Commission proposes ambitious commitments for the EU to bring \nto the table. The EU should also support governments and stakeholders across the globe \nto significantly step up their ambition and their action. \n\nThe Commission proposes that the EU ensures that the post-2020 global framework \nincludes, at a minimum, the elements outlined below: \n\n Overarching global goals for biodiversity for 2050, in line with the United \nNations 2030 Agenda for Sustainable Development and the vision of ‘living in \nharmony with nature’. The ambition should be that,**by 2050, all of the world’s**\n**ecosystems are restored, resilient, and adequately protected.**The world \nshould commit to the net-gain principle to give nature back more than it takes. \nThe world should commit to no human-induced extinction of species, at \nminimum where avoidable. \n\n Ambitious**global 2030 targets in line with EU commitments**in this strategy. \nThese should clearly address the drivers of biodiversity loss and be specific, \nmeasurable, actionable, relevant and time-bound. \n\n A much**stronger implementation, monitoring and review**process. Parties \nshould revise their National Biodiversity Strategies and Action Plans by the end \nof 2021, or as a minimum, submit national commitments for the most important \ntargets. There should be a**regular review cycle**to look at progress towards the ", + "page_start": 19, + "page_end": 19, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "In all of its work, the EU will strengthen the links between**biodiversity protection and**\n**human rights**, gender, health, education, conflict sensitivity, the rights-based approach, \nland tenure and the role of indigenous peoples and local communities. \n\nAs part of its global efforts, the EU will promote biodiversity coalitions with partners and \ncivil society around the world. For example, in March 2020, the Commission launched \nthe**Global Biodiversity Coalition**of national parks, aquariums, botanic gardens, zoos, \nnatural history and sciencemuseums to help raise awareness around the world on the need \nto protect and nurture biodiversity. The Commission will consider launching or joining \nother High Ambition Coalitions to help develop the post-2020 framework. \n\n**5. CONCLUSION**\n\nProtecting and restoring biodiversity is the only way to preserve the quality and \ncontinuity of human life on Earth. The commitments proposed in this strategy pave the \nway for ambitious and necessary changes – changes that will ensure the wellbeing and \neconomic prosperity of present and future generations in a healthy environment. The \nimplementation of these commitments will take into account the diversity of challenges \nacross sectors, regions and Member States, recognise the need to ensure social justice, \nfairness and inclusiveness in line with the European Pillar of Social Rights, and will \nrequire a sense of responsibility and strong joint efforts from the EU, its Member States, \nstakeholders and citizens. ", + "page_start": 22, + "page_end": 22, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "encouraging cooperation in**education for environmental sustainability**in 2021. This \nwill provide guidance for schools and teachers on how to cooperate and exchange \nexperiences across Member States on biodiversity teaching. The Commission will also \nprovide support materials and facilitate the exchange of good practices in EU networks of \nteacher-training programmes. \n\n**4. THE EUROPEAN UNION FOR AN AMBITIOUS GLOBAL BIODIVERSITY AGENDA**\n\nBiodiversity is a priority of the EU’s external action and an integral part of efforts to \nmeet the United Nations Sustainable Development Goals. It will be mainstreamed \nthroughout bilateral and multilateral engagements, through the EU’s ‘Green Deal \ndiplomacy’, and forthcoming green alliances76. The Commission will work closely with \nthe European Parliament and Member States to ensure a high level of EU ambition and \nmobilise all efforts for the good of the world’s biodiversity. \n\n**4.1. Raising the level of ambition and commitment worldwide**\n\nProtecting biodiversity is a global challenge and the next decade will be decisive. Global \nefforts under the United Nations Convention on Biological Diversity have largely been \ninsufficient. Nature cannot afford any half measures or lack of ambition. \n\nIn this spirit, the EU is ready to lead all efforts – working with like-minded partners in**a**\n**high-ambition coalition on biodiversity**– to agree an ambitious new global framework \nfor post-2020 at the upcoming 15th Conference of the Parties to the Convention on \nBiological Diversity. ", + "page_start": 19, + "page_end": 19, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "States and the European Environment Agency, will put forward in 2020 criteria and \nguidance for identifying and designating additional areas, including a definition of strict \nprotection, as well as for appropriate management planning. In doing so, it will indicate \nhow other effective area-based conservation measures and greening of cities could \ncontribute to the targets. \n\nThe targets relate to the EU as a whole and could be broken down according to the EU \nbio-geographical regions and sea basins or at a more local level.**Every Member State**\n**will have to do its fair share of the effort**based on objective ecological criteria, \nrecognising that each country has a different quantity and quality of biodiversity. \nParticular focus will be placed on protecting and restoring the tropical and sub-tropical \nmarine and terrestrial ecosystems in the EU’s outermost regions given their exceptionally \nhigh biodiversity value. \n\nIn addition, in order to have a truly coherent and resilient Trans-European Nature \nNetwork, it will be important to set up**ecological corridors**to prevent genetic isolation, \nallow for species migration, and maintain and enhance healthy ecosystems. In this \ncontext, investments in green and blue infrastructure27 and cooperation across borders \namong Member States should be promoted and supported, including through the \nEuropean Territorial Cooperation. ", + "page_start": 5, + "page_end": 5, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "The Commission will aim to agree the criteria and guidance for additional designations \nwith Member States by the end of 2021. Member States will then have until the end of \n2023 to demonstrate significant progress in legally designating new protected areas and \nintegrating ecological corridors. On this basis, the Commission will assess by 2024 \nwhether the EU is on track to meet its 2030 targets or whether stronger actions, including \nEU legislation, are needed. \n\nFinally, the**Overseas Countries and Territories**also host important biodiversity \nhotspots, not governed by EU environmental rules. The Commission encourages relevant \nMember States to consider promoting equal or equivalent rules in these countries and \nterritories. \n\n**Nature protection: key commitments by 2030**\n\n1. Legally protect a minimum of 30% of the EU’s land area and 30% of the EU’s sea \narea and integrate ecological corridors, as part of a true Trans-European Nature \nNetwork. \n\n2. Strictly protect at least a third of the EU’s protected areas, including all remaining EU \n\nprimary and old-growth forests. \n\n3. Effectively manage all protected areas, defining clear conservation objectives and \n\nmeasures, and monitoring them appropriately. ", + "page_start": 5, + "page_end": 5, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": " Firstly, and subject to an impact assessment, the Commission will put forward a \nproposal for legally binding**EU nature restoration targets**in 2021 to restore \ndegraded ecosystems, in particular those with the most potential to capture and \nstore carbon and to prevent and reduce the impact of natural disasters. This will \nidentify the conditions in which the targets must be met, as well as the most \neffective measures to reach them. The impact assessment will also look at the \npossibility of an EU-wide methodology to map, assess and achieve good \ncondition of ecosystems so they can deliver benefits such as climate regulation, \nwater regulation, soil health, pollination and disaster prevention and protection. \n\n \n\nIn that context, the Commission will request and support Member States to raise \nthe level of implementation of existing legislation within clear deadlines. It will \nin particular request Member States to ensure**no deterioration in conservation**\n**trends and status**of all protected habitats and species by 203030. In addition, \nMember States will have to ensure that at least 30% of species and habitats not \n\n28 Notably the EU Birds Directive (2009/147/EC), Habitats Directive (92/43/EEC), Water Framework \nDirective (2000/60/EC), Floods Directive (2007/60/EC) and Marine Strategy Framework Directive \n(2008/56/EC). \n29 See Fitness Check of the EU Nature Legislation (SWD(2016) 472) and Fitness Check of the EU Water \n\n\n \n \n \n \n [html]\n
TableTable
TableAlbiological
1.Specifications
", + "page_start": 6, + "page_end": 6, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "The Commission invites the European Parliament and the Council to endorse this \nstrategy ahead of the 15th Conference of the Parties to the Convention on Biological \nDiversity. To ensure full political ownership of this strategy, the Commission will \nsuggest a standing progress point at the Council and at the European Parliament. It will \nreview the strategy by 2024 to assess progress and whether further action is needed to \nmeet its objectives. ", + "page_start": 22, + "page_end": 22, + "source_file": "legal5_eubiodiversity_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "legal5_eubiodiversity_cc4.pdf", + "query": "What is the EU's tolerance for unauthorised fishing?", + "target_page": 21, + "target_passage": "The EU will apply zero tolerance towards illegal, unreported and unregulated fishing", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "threaten their conservation status. To support this, data collection on by-catch for all \nsensitive species needs to be stepped up. \n\nIn addition,**fisheries-management measures**must be established in all marine protected \nareas according to clearly defined conservation objectives and on the basis of the best \navailable scientific advice. \n\n*2.2.7. Restoring freshwater ecosystems*\n\nThe EU’s legal framework on water is ambitious but implementation is lagging behind \nand enforcement must be stepped up46. Greater efforts are needed to**restore freshwater**\n**ecosystems and the natural functions of rivers**in order to achieve the objectives of the \nWater Framework Directive. This can be done by removing or adjusting barriers that \nprevent the passage of migrating fish and improving the flow of water and sediments. To \nhelp make this a reality,**at least 25,000 km of rivers will be restored into free-flowing**\n**rivers by 2030**47 through the removal of primarily obsolete barriers and the restoration of \nfloodplains and wetlands. Technical guidance and support to the Member States to \nidentify sites and help mobilise funding will be provided by the Commission in 2021, in \nconsultation with all relevant authorities48. Member State authorities should review water \nabstraction and impoundment permits to implement ecological flows in order to achieve \ngood status or potential of all surface waters and good status of all groundwater by 2027 \nat the latest, as required by the Water Framework Directive49. To that effect, the \nCommission will provide technical support to Member States on their measures by 2023. ", + "page_start": 12, + "page_end": 12, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "The application of an ecosystem-based management approach under EU legislation43 will \nreduce the adverse impacts of fishing, extraction and other human activities, especially \non sensitive species and seabed habitats. To support this,**national maritime spatial**\n**plans**, which Member States have to deliver in 2021, should aim at covering all maritime \nsectors and activities, as well as area-based conservation-management measures.44 The \nCommission will also propose a**new action plan to conserve fisheries resources and**\n**protect marine ecosystems**by 2021. Where necessary, measures will be introduced to \nlimit the use of fishing gear most harmful to biodiversity, including on the seabed. It will \nalso look at how to reconcile the use of bottom-contacting fishing gear with biodiversity \ngoals, given it is now the most damaging activity to the seabed. This must be done in a \nfair and just way for all. The European Maritime and Fisheries Fund should also support \nthe transition to more selective and less damaging fishing techniques. \n\nHealthy fish stocks are key to the long-term prosperity of fishermen and the health of our \noceans and biodiversity. This makes it all the more important to maintain or reduce \nfishing mortality at or under**Maximum Sustainable Yield levels**. This will help achieve \na healthy population age and size distribution for fish stocks. ", + "page_start": 11, + "page_end": 11, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "The EU should also use all of its diplomatic leverage and outreach capacities to help \nbroker agreement on the designation of three vast**Marine Protected Areas in the**\n**Southern Ocean**78, two of which were co-proposed by the EU in East Antarctica and in \nthe Weddell Sea. If agreed, this would constitute one of the biggest acts of nature \nprotection in history. \n\nWork will continue with partner countries and regional organisations to put in place \nmeasures to protect and sustainably use sensitive maritime ecosystems and species, \nincluding in areas beyond national jurisdiction, with a focus on marine biodiversity \nhotspots. The EU should continue supporting Small Island Developing States and other \nrelevant partner countries to participate in meetings of regional and global organisations \nand bodies, and to implement relevant international commitments and regulations. \n\nThe EU will apply**zero tolerance towards illegal, unreported and unregulated**\n**fishing**and will combat overfishing, including through WTO negotiations on a**global**\n**agreement to ban harmful fisheries subsidies**. \n\nIn international negotiations, the EU should advocate that marine minerals in the \ninternational seabed area cannot be exploited before the**effects of deep-sea mining**on \nthe marine environment, biodiversity and human activities have been sufficiently \nresearched, the risks are understood and the technologies and operational practices are \nable to demonstrate no serious harm to the environment, in line with the precautionary ", + "page_start": 20, + "page_end": 20, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "have been subject to*irregularities*,*fraud*or*breach of obligations*; \n\n6 Regulation (EU, Euratom) 2018/1046 of the European Parliament and of the Council of 18 July 2018 on the \nfinancial rules applicable to the general budget of the Union, amending Regulations (EU) No 1296/2013, (EU) \nNo 1301/2013, (EU) No 1303/2013, (EU) No 1304/2013, (EU) No 1309/2013, (EU) No 1316/2013, (EU) No \n223/2014, (EU) No 283/2014, and Decision No 541/2014/EU and repealing Regulation (EU, Euratom) No \n966/2012, \nhttps://eur-lex.europa.eu/legal- \ncontent/EN/TXT/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG \nOJ ", + "page_start": 29, + "page_end": 29, + "source_file": "EN-Draft FWC for services 0142.pdf" + }, + { + "text": "17 Mid-term review of the EU Biodiversity Strategy to 2020 (COM(2015) 478 and SWD(2015) 187); \nFitness Check of the EU Nature Legislation (Birds and Habitats Directives) (SWD(2016) 472); Fitness \nCheck of the EU Water Legislation (SWD(2019) 439). \n\n\n \n \n \n \n [html]\n
while scTableTableTableTableTable
", + "page_start": 3, + "page_end": 3, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "processes essentially undisturbed to respect the areas’ ecological requirements. \n\n25 https://www.cbd.int/forest/definitions.shtml; Natura 2000 and Forests. \n26 Additional Natura 2000 designations will be implemented with support from EU funds and \nenforcement as appropriate. \n\n4 ", + "page_start": 4, + "page_end": 4, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "Obviously,**most informal, and**— in particular —**irregular and illegal types of work do not respect**\nlegal OSH obligations — and at the same time legal monitoring obligations also fail. The EU \nFundamental Rights Agency (FRA) published several case studies and examples in a series called \n‘Severe labour exploitation reports; 359 these studies provide an insight into most irregular working \nconditions. \n\n**Undeclared work**is defined as paid and lawful (not criminal) activity but undeclared to public authorities. (‘paid \nactivities that are lawful as regards their nature but not declared to public authorities, taking into account the \ndifferences in the regulatory systems of Member States’.) \n\nIn 2018, the European Commission estimated the scale of**undeclared work**in the EU. According to this estimate, \non average, 11.6% of total labour input in the private sector is undeclared, and undeclared work constitutes on \naverage 16.4% of gross value added. The main sectors according to the Special Flash Eurobarometer from 2019360 \nare personal services (childcare/elderly care/cleaning) followed by construction and hospitality services.361 The \n‘European Platform tackling undeclared work’ provides fact sheets about the type and quantity of undeclared work \nin all EU Member States.362 ", + "page_start": 122, + "page_end": 122, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "19 Brander et al. (2015), The benefits to people of expanding Marine Protected Areas. \n20 Fitness Check of the EU Nature Legislation (SWD(2016) 472). \n21 Member States’ Prioritised Action Frameworks 2020; Mutafoglu et al. (2017), Natura 2000 and Jobs: \nScoping Study. \n\n22 Latest EU-27 statistics (European database of nationally designated protected areas) v. 2019, and \nNatura 2000 dataset ‘end 2018’. Today, 26% of the EU’s land area is already protected, with 18% as \npart of Natura 2000 and 8% under national schemes. Of EU seas, 11% are protected, with 8% in Natura \n2000 and 3% under additional national protection. To note: offshore wind projects will be possible if in \ncompliance with relevant environmental and nature protection legislation. \n23 Zero draft of the post-2020 global biodiversity framework (CBD/WG2020/2/3), available at \nhttps://www.cbd.int/conferences/post2020/wg2020-02/documents. \n24 Strict protection does not necessarily mean the area is not accessible to humans, but leaves natural ", + "page_start": 4, + "page_end": 4, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "principle79 and taking into account the call of the European Parliament80. In parallel, the \nEU will continue to fund research on the impact of deep-sea mining activities and on \nenvironmentally-friendly \ntechnologies. The EU should also advocate for more \ntransparency in international bodies such as the International Seabed Authority. \n\n*4.2.2. Trade policy*\n\n**Trade policy will actively support and be part of the ecological transition**. In this \nspirit, the Commission will ensure full implementation and enforcement of the \nbiodiversity provisions in all trade agreements, including through the EU Chief Trade \nEnforcement Officer. The Commission will better assess the impact of trade agreements \non biodiversity, with follow-up action to strengthen the biodiversity provisions of \nexisting and new agreements if relevant. The Commission will also present in 2021 a \nlegislative proposal and other measures to avoid or minimise the placing of products \nassociated with deforestation or forest degradation on the EU market81, and to promote \nforest-friendly imports and value chains. The Commission will take a number of steps to \n**crack down on illegal wildlife trade**. This trade contributes to the depletion or \nextinction of entire species, is the world’s fourth most lucrative black market and is \nthought to be one of the causes behind the emergence of zoonotic diseases. It is a human, \neconomic and environmental duty to dismantle it. ", + "page_start": 21, + "page_end": 21, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "(4) For the purposes of these Regulations a person is not treated as having been in a country or \n\nterritory if— \n\n(a) the person has only been on a vessel which has been in the territorial waters of that \ncountry or territory; \n\n(b) the person did not disembark from that vessel while it was in the territorial waters of that \n\ncountry or territory; \n\n(c) that vessel did not moor at a port in that country or territory; and \n(d) no passenger was permitted to be taken on board that vessel while it was in the territorial \nwaters of that country or territory. \n\n(5) Schedule 4 (exemptions) describes categories of person who are exempt from certain \n\nrequirements in accordance with these Regulations. ", + "page_start": 4, + "page_end": 4, + "source_file": "uksi_20210582_en.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_SMFG_2011.pdf", + "query": "What are the missions of the Sumitomo Mitsui Financial Group?", + "target_page": 7, + "target_passage": "• To provide optimum added value to our customers and together with them achieve growth • To create sustainable shareholder value through business growth• To create sustainable shareholder value through business growth • To provide a challenging and professionally rewarding work environment for our dedicated employees• To provide a challenging and professionally rewarding work environment for our dedicated employee", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Corporate Outline (as of September 30, 2011)** **Editorial Policy**\n\nCompany Name Sumitomo Mitsui Financial Group, Inc. This report has been created in an effort to convey to our stakeholders the variety of our initiatives and the roles the SMFG Group :: \n\nBusiness Description Management of banking subsidiaries (under the stipulations of Japan’s Banking Act) and of \n: is fulfilling as we work to create a sustainable society. \n\nnon-bank subsidiaries, as well as the performance of ancillary functions \nWe have aimed to present the information clearly, so that readers may understand our attitude that the fulfillment of CSR is \n\nEstablished December 2, 2002 \n: \nthe essence of business itself, and our initiatives act upon this. \n\nHead Office 1-2, Marunouchi 1-chome, Chiyoda-ku, Tokyo, Japan \n: \nOur CSR Report 2011 (digest version), launched last fiscal year, is intended to present more concise reports of the Group’s \nChairman of the Board Masayuki Oku \n: \nCSR activities, with a focus on specific activities of interest. To complement this, we have also posted online our CSR Report \nPresident Koichi Miyata (Concurrent Director at Sumitomo Mitsui Banking Corporation) \n: \n2011 (digest version, with examples of activities and statistical performance), with more detailed information on CSR \nCapital ¥2,337.8 billion \n: \nactivities and statistical data omitted in the CSR Report 2011 (digest version). \nStock Exchange Listings Tokyo Stock Exchange (First Section) \n: \nWe disclose the full range of our CSR activities as a Group on our website in the official-use version of our CSR Report (in \nOsaka Securities Exchange (First Section) \nJapanese only). It is recommended that you read it in combination with the above two digest versions in order to understand \nNagoya Stock Exchange (First Section) \nour CSR and other activities in greater detail. \nNote: American Depositary Receipts (ADRs) are listed on the New York Stock Exchange. \n\nFrom the current fiscal year, we are including third-party opinions in the website version. ", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\n\n\nSpecific Examples of CSR Activities \n\n**Together with Our Employees**\n\n**We are developing human resources that can take on global roles,**\n**and we are creating globalized working environments**", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\n**Keeping**\n**our shareholders**\n**informed**\n\nSpecific Examples of CSR Activities \n\n**Together with Our Shareholders**\n**and Markets**\n\nWebsite \n\nAnnual report \n\n**Contributing to the development of sounder financial markets**\n\nSRI Indexes on which SMFG is listed Examples of Group disclosure activities \n\nQuarterly and interim financial reports, \nQuarterly and interim financial reports, \n\nresults announcements, securities \nresults announcements, securities \n\nreports, legal disclosure statements, \nreports, legal disclosure statements, \n\nregular publications, etc. \nregular publications, etc. \n\nWe believe that the SMFG Group can contribute \nWe believe that the SMFG Group can contribute \nAnnual and interim reports (in Japanese \nAnnual and interim reports (in Japanese \nfurther to the creation of a sustainable society \nfurther to the creation of a sustainable society \nand English) \nand English) ", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**Structure of Sumitomo Mitsui Financial Group (as of September 30, 2011)**\n\nDaiwa SB Investments \nDaiwa SB Investments \n\n**SMFG SUMITOMO MITSUI FINANCIAL GROUP**\nSumitomo Mitsui Auto Service \nSumitomo Mitsui Auto Service ", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "In November 2010, the Sumitomo Mitsui \nIn November 2010, the Sumitomo Mitsui \n\nFinancial Group listed on the New York \nFinancial Group listed on the New York \n\nStock Exchange. This move, we believe, not \nStock Exchange. This move, we believe, not \n\nonly significantly increases convenience for \nonly significantly increases convenience for \n\nour overseas shareholders and investors, \nour overseas shareholders and investors, \n\nbut also broadens our customer base as it \nbut also broadens our customer base as it \n\nfurther increases the transparency of our \nfurther increases the transparency of our \n\nfinancial position. Listing on the New York \nfinancial position. Listing on the New York \n\nStock Exchange as a socially responsible \nStock Exchange as a socially responsible \n\ncorporation accelerates our evolution into a \ncorporation accelerates our evolution into a \n\nglobal player. \nglobal player. ", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**Scope of this Report**\n\n(cid:129) Sumitomo Mitsui Financial Group, Inc. \n\n(cid:129) Sumitomo Mitsui Banking Corporation \n\n(cid:129) SMFG Card & Credit, Inc. \n\n(cid:129) Sumitomo Mitsui Card Company, Limited \n\n(cid:129) Cedyna Financial Corporation \n\n(cid:129) Sumitomo Mitsui Finance and Leasing Co., Ltd. \n\n(cid:129) The Japan Research Institute, Limited \n\n(cid:129) SMBC Friend Securities Co., Ltd. \n\n(cid:129) SMBC Nikko Securities Inc. \n\n(cid:129) THE MINATO BANK, LTD. \n\n(cid:129) Kansai Urban Banking Corporation \n\n(cid:129) Other Group companies \n\nCompany name abbreviations and other special terminology \n\nThroughout this report,**“Sumitomo Mitsui Financial Group”**or**“SMFG”**refers to the holding company alone.**“The SMFG Group”**\n\nrefers to the holding company and its primary domestic and international subsidiaries and affiliates. ", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "In the past, the Sumitomo Group \nIn the past, the Sumitomo Group undertook large-scale afforestation \nundertook large-scale afforestation \n\nprograms to solve the problem of \nprograms to solve the problem of pollution around the Besshi copper \npollution around the Besshi copper \n\nmine, while the Mitsui Group set up \nmine, while the Mitsui Group set up the Mitsui Memorial Hospital to \nthe Mitsui Memorial Hospital to \n\ngive the poorest in society access to \ngive the poorest in society access to basic medical care. Based on this \nbasic medical care. Based on this \n\ncorporate social responsibility \ncorporate social responsibility DNA embedded in the business \nDNA embedded in the business \n\nphilosophies of both the Sumitomo \nphilosophies of both the Sumitomo and Mitsui groups over the 400 \nand Mitsui groups over the 400 \n\nyears of their existence, we will \nyears of their existence, we will continue to play our part in solving \ncontinue to play our part in solving \n\nproblems facing the international \nproblems facing the international community through our financial \ncommunity through our financial \n\noperations. \nservice operations. \nservice ", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\nSpecific Examples of CSR Activities \n\n**New queue-number display system**\n**installed at bank counters**\n\n**Together with Our Customers**\n\nColors and special designs are used to make \n\nqueue-number displays more visible to all customers \n\n(The Minato Bank) ", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\nSpecific Examples of CSR Activities \n\nEnvironmental and \nenergy businesses: \n34.2% \nOthers: \n23.7% \n\n**Together with Our Customers**\n\nKansai Genki \nFund \nFinancing \nby sector \n(June 30, 2011) \n\nInvestment \nand business \nexpansion \nin Asia, etc.: \n10.5% \n\n**We believe it is important to contribute to maintenance and protection of**\n**the natural environment and the sustainable development of regional society**\n**through our core business, hand in hand with the customer.**\n\nEnvironmentally Responsible \nEnvironmentally Responsible \nCompany Support Fund \nCompany Support Fund \nEnvironmental Facilities \nEnvironmental Facilities \nSupport Fund \nSupport Fund \n\n**Name**\n\n**Social contribution**\n**and donation type-cards**\n**Credit cards**\n\nMedical, nursing and healthcare businesses: \n31.6% \n\n¥50 billion \n¥50 billion **Size of fund** The “Chikyuni Yasashii Card” \n\nThe fund supports companies \n**Outline**The fund supports companies \nwith environmentally-aware \nwith environmentally-aware \nmanagements or involvement in \nmanagements or involvement in \nenvironmental businesses \nenvironmental businesses ", + "page_start": 8, + "page_end": 8, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**About this Report**\n\nPeriod Covered \n\nApril 1, 2010 to March 31, 2011 ( “Fiscal 2010” ) \nNote: Certain items in this report refer to activities taking place after April 2011. \n\n: \n\n**CSR report (online version, Japanese only)**\n\nPublication Date of \nJapanese Document \n\n**Enriched**\n**CSR disclosure**\n\nDecember 2011 \n: \nwww.smfg.co.jp/responsibility \n\nContact \n\nGroup CSR Department, Sumitomo Mitsui Financial Group, Inc. \n1-2 Marunouchi 1-chome, Chiyoda-ku, Tokyo 100-0005 \nTEL: +81-3-3282-8111 \n\n: \n\nThis is the official version of our CSR report. Covers the full spectrum of \nThis is the official version of our CSR report. Covers the full spectrum of \nCSR activities at SMFG \nCSR activities at SMFG ", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_SMFG_2011.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_SMFG_2011.pdf", + "query": "Did Katsutoshi Konuma participate in the August 2011 expert roundtable on the role of the Sumitomo Mitsui Financial Group's new Food and Agricultural Assessment Loan? ", + "target_page": 8, + "target_passage": "Key comments of participants Together with Our Customers Katsutoshi Konuma, Section Manager, Social & Environmental Management, Asahi Breweries Ltd", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Roundtable session: SMBC Food and Agricultural Assessment Loan**\n\nA roundtable session with experts held in August 2011 \nconsidered the role of the new SMBC Food and Agricultural \nAssessment Loan in improving the food supply chain that \nlinks food and fishery producers with food processors and \nconsumers. Opinions were also exchanged on what other \nfuture role the bank might assume in this regard, given \nthe current situation and issues facing the food industry \nand agriculture \nin Japan. \n\n**Key comments of participants**\n\nKatsutoshi Konuma, Section Manager, Social & Environmental Management, Asahi Breweries Ltd. \n“We want to deliver value by creating demand and quality combined with safety, peace \nof mind and trust.” \n\nYasuhiro Nakashima Associate Professor Graduate School of Agricultural and Life Sciences, \nThe University of Tokyo \n“Eating should be something that generates emotion. New potential exists in the world of cuisine.” \nDaisuke Yamamoto, Vice Senior Consultant, Research Department, \nThe Japan Research Institute, Limited \n“As consumer tastes go through a time of great change, I think it is important to \nprioritize ingredients and the attitude of customers toward eating.” \nYoichiro Fukayama, Planning Dept., Deputy Head (with powers of representation) of \nthe Corporate Banking Unit & Middle Market Banking Unit, SMBC \n“An important concept is multilateral dialogue as the number of parties involved in food \nproduction increases throughout the supply chain.” \nModerated by Kenji Sawami, Partner, Ernst & Young ShinNihon LLC ", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**Corporate Outline (as of September 30, 2011)** **Editorial Policy**\n\nCompany Name Sumitomo Mitsui Financial Group, Inc. This report has been created in an effort to convey to our stakeholders the variety of our initiatives and the roles the SMFG Group :: \n\nBusiness Description Management of banking subsidiaries (under the stipulations of Japan’s Banking Act) and of \n: is fulfilling as we work to create a sustainable society. \n\nnon-bank subsidiaries, as well as the performance of ancillary functions \nWe have aimed to present the information clearly, so that readers may understand our attitude that the fulfillment of CSR is \n\nEstablished December 2, 2002 \n: \nthe essence of business itself, and our initiatives act upon this. \n\nHead Office 1-2, Marunouchi 1-chome, Chiyoda-ku, Tokyo, Japan \n: \nOur CSR Report 2011 (digest version), launched last fiscal year, is intended to present more concise reports of the Group’s \nChairman of the Board Masayuki Oku \n: \nCSR activities, with a focus on specific activities of interest. To complement this, we have also posted online our CSR Report \nPresident Koichi Miyata (Concurrent Director at Sumitomo Mitsui Banking Corporation) \n: \n2011 (digest version, with examples of activities and statistical performance), with more detailed information on CSR \nCapital ¥2,337.8 billion \n: \nactivities and statistical data omitted in the CSR Report 2011 (digest version). \nStock Exchange Listings Tokyo Stock Exchange (First Section) \n: \nWe disclose the full range of our CSR activities as a Group on our website in the official-use version of our CSR Report (in \nOsaka Securities Exchange (First Section) \nJapanese only). It is recommended that you read it in combination with the above two digest versions in order to understand \nNagoya Stock Exchange (First Section) \nour CSR and other activities in greater detail. \nNote: American Depositary Receipts (ADRs) are listed on the New York Stock Exchange. \n\nFrom the current fiscal year, we are including third-party opinions in the website version. ", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "The SMBC Food and Agricultural Assessment \nThe SMBC Food and Agricultural Assessment \n\nLoan comes with conditions, depending on \nLoan comes with conditions, depending on \n\nthe results of an evaluation of food-producers’ \nthe results of an evaluation of food-producers’ \n\nprogress in areas such as food safety and \nprogress in areas such as food safety and \n\nenvironment-friendliness, healthiness and \nenvironment-friendliness, healthiness and \n\nnutritional value, and efficiency of distribution. \nnutritional value, and efficiency of distribution. \n\nThe Japan Research Institute researches \nThe Japan Research Institute researches \n\nm e a s u r e s i n t h e \nm e a s u r e s i n t h e \n\nTelephone handset-type ATM \n (The Minato Bank) of food and \na r e a s of food and \na r e a s \n\nfarming being taken \nfarming being taken \n\nby the loan applicant, \nby the loan applicant, \n\n**Preparing our businesses**\n**for a higher old-age**\n**dependency ratio**\n\nand drafts a simple \nand drafts a simple \n\n“diagnosis” stating \n“diagnosis” stating \n\nwhether there is room \nwhether there is room \n\nfor future improvement. Ernst & Young \nfor future improvement. Ernst & Young \n\nShinNihon LLC provides expert opinions on \nShinNihon LLC provides expert opinions on ", + "page_start": 7, + "page_end": 7, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Commitment from the Top \n\nTakeshi Kunibe \n**A Conversation with Tadao Ando, Takeshi Kunibe and Koichi Miyata**\n\nPresident and CEO \nSumitomo Mitsui Banking Corporation \n\n**What can we do now to spur**\n**the reconstruction and revitalization**\n**of Japan, and help**\n**resolve global issues?**\nuntil the country became an economic \nuntil the country became an economic ", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**About this Report**\n\nPeriod Covered \n\nApril 1, 2010 to March 31, 2011 ( “Fiscal 2010” ) \nNote: Certain items in this report refer to activities taking place after April 2011. \n\n: \n\n**CSR report (online version, Japanese only)**\n\nPublication Date of \nJapanese Document \n\n**Enriched**\n**CSR disclosure**\n\nDecember 2011 \n: \nwww.smfg.co.jp/responsibility \n\nContact \n\nGroup CSR Department, Sumitomo Mitsui Financial Group, Inc. \n1-2 Marunouchi 1-chome, Chiyoda-ku, Tokyo 100-0005 \nTEL: +81-3-3282-8111 \n\n: \n\nThis is the official version of our CSR report. Covers the full spectrum of \nThis is the official version of our CSR report. Covers the full spectrum of \nCSR activities at SMFG \nCSR activities at SMFG ", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\n**Keeping**\n**our shareholders**\n**informed**\n\nSpecific Examples of CSR Activities \n\n**Together with Our Shareholders**\n**and Markets**\n\nWebsite \n\nAnnual report \n\n**Contributing to the development of sounder financial markets**\n\nSRI Indexes on which SMFG is listed Examples of Group disclosure activities \n\nQuarterly and interim financial reports, \nQuarterly and interim financial reports, \n\nresults announcements, securities \nresults announcements, securities \n\nreports, legal disclosure statements, \nreports, legal disclosure statements, \n\nregular publications, etc. \nregular publications, etc. \n\nWe believe that the SMFG Group can contribute \nWe believe that the SMFG Group can contribute \nAnnual and interim reports (in Japanese \nAnnual and interim reports (in Japanese \nfurther to the creation of a sustainable society \nfurther to the creation of a sustainable society \nand English) \nand English) ", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**INDE X**\n\n**Foreword**\n**1**\n\n**Commitment from the Top**\n**3**\n\n**A Conversation with Tadao Ando,**\n**Takeshi Kunibe and Koichi Miyata**\n\n**What can we do now to spur the**\n**reconstruction and revitalization of Japan,**\n**and help resolve global issues?**", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**Scope of this Report**\n\n(cid:129) Sumitomo Mitsui Financial Group, Inc. \n\n(cid:129) Sumitomo Mitsui Banking Corporation \n\n(cid:129) SMFG Card & Credit, Inc. \n\n(cid:129) Sumitomo Mitsui Card Company, Limited \n\n(cid:129) Cedyna Financial Corporation \n\n(cid:129) Sumitomo Mitsui Finance and Leasing Co., Ltd. \n\n(cid:129) The Japan Research Institute, Limited \n\n(cid:129) SMBC Friend Securities Co., Ltd. \n\n(cid:129) SMBC Nikko Securities Inc. \n\n(cid:129) THE MINATO BANK, LTD. \n\n(cid:129) Kansai Urban Banking Corporation \n\n(cid:129) Other Group companies \n\nCompany name abbreviations and other special terminology \n\nThroughout this report,**“Sumitomo Mitsui Financial Group”**or**“SMFG”**refers to the holding company alone.**“The SMFG Group”**\n\nrefers to the holding company and its primary domestic and international subsidiaries and affiliates. ", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "display \n this display \nSumitomo Mitsui Financial Group, Inc. \nanxious. I think everyone needs to hit the \nanxious. I think everyone needs to hit the of front-line commitment. \nof front-line commitment. \n\n‘reset’ button in some sense. If we don’t,t, \n‘reset’ button in some sense. If we don Moving forward on the reconstruction of \nMoving forward on the reconstruction of \n\nmore difficulties lie ahead. \nmore difficulties lie ahead. the Tohoku region, I believe we can also \nthe Tohoku region, I believe we can also The SMFG Group has 62,000 employees, \nThe SMFG Group has 62,000 employees, \n\n**Miyata**: Indeed, prior to 1970, living \n: Indeed, prior to 1970, living contribute to the rebuilding of infrastructure \ncontribute to the rebuilding of infrastructure “stepping up to the plate and working hard \n“stepping up to the plate and working hard \n\nstandards or wage levels were very low, \nstandards or wage levels were very low, t h r o u g h pr o je c t f i n a n c e a n d o t h e r \nt h r o u g h p r o j e c t f i n a n c e a n d o t h e r ", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "close. Our expa nsion of com mercia l \nclose. Our expa nsion of com mercia l world, as a matter of urgency. \nworld, as a matter of urgency. \n\n**Miyata**: In Asia today, there are a variety \n: In Asia today, there are a variety bank ing operations to date is part of \nbank ing operations to date is part of Japa nese compa n ies tend to be quite \nJapa nese compa n ies tend to be quite \n\nof infrastructure projects. Of course, \nof infrastructure projects. Of course, reserved and unobtrusive. I believe they \nreserved and unobtrusive. I believe they \n\ns uppor t i ng s uch proje c t s i s SM FG’s s \ns uppor t i ng s uch proje c t s i s SM FG must become more willing to blow their \nmust become more willing to blow their \n\nfundamental business, but we also hope to \nfundamental business, but we also hope to own trumpets. For example, our students \nown trumpets. For example, our students \n\ncontribute to the sustainable development \ncontribute to the sustainable development and salar y men cannot freely express \nand salar y men cannot freely express \n\nof society and the world including Asia. I \nof society and the world including Asia. I ", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_SMFG_2011.pdf" + } + ] + }, + { + "references": { + "source_file": "news2.pdf", + "query": "What is the trend of flood risk in Canada in 2024?", + "target_page": 1, + "target_passage": "(NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly exposed", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Three ways Canadian communities are reducing flood**\n**risks**\n\n(NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly \nexposed. There are large-scale programs available across the country providing flood protection \nmeasures for communities at risk, such as Intact’s Municipal Climate Resiliency Grants. This \nprogram is helping build the resilience of communities and homes through a variety of \npreventative actions. \n\nWetlands can reduce flood risk by absorbing large quantities of water, but they are not typically \nfound in cities. In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community \nGardens created a wetland on downtown’s east side, an area historically prone to flooding. Made \nup of natural elements like ponds and marshes, the wetland reduces the community’s flood risk \nby catching and absorbing rainfall and runoff from surrounding surfaces. \n\nKnowing the risks is the first step to protecting homes and communities. In New Brunswick, the \nCity of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online \nflood prevention guidance. Residents can input their addresses to see if they are at risk and learn \ntips to reduce the risk of flooding around their properties. The portal launched in the summer of \n2023 and was viewed 27,000 times in its first year. ", + "page_start": 0, + "page_end": 0, + "source_file": "news2.pdf" + }, + { + "text": "areas are projected to see an increase in flood event lengths of 4 days or more, particularly India \nand Bangladesh, for which such increases are projected in all ensemble members to some extent. \nIncreases of 2–4 days are also projected in parts of Brazil by all ensemble members, although \nthe magnitude and location within the country varied between members. Similar increases are \nprojected in the region of the Horn of Africa and southern Arabian Peninsula in several members. \nThe HCVI calculated for 2°C global warming showed very large geographical variability \n(figure 7) which relates largely to differences in socio-economic factors [22]. Differences in the \nclimate change simulated in different ensemble members leads to some variation in the HCVI at ", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed11.pdf" + }, + { + "text": "\n \n \n \n \n [html]Table 1 below indicates the likely dimensions of the outputs for each of the components as of July 2017.LandUpdated probability density functions presented as 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 30 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 5p (- 10 - 50 - 50 - 50 - 50 - 50 - 50 - 50 - 5p )-UK\n
Observations ( UK State of the Climate )Marine and coastal projectionsGlobal projectionsProbabilistic projections
High resolution projectionsCharacteristicsObserved trends ; long - term climatologies ; weather events for the preceding yearUpdated sea level rise and surge projections based on starting start start start surger model ( CS - 3 ) using CMIP5. EURO - CORDEX ‡Ensemble of P20 spatially series of the Met Office Hadley Centre model number of CMIPS models
Downscaled projections over the UK for - 10 spatially coherent time series. 2.2 km model provides realistic information on heavy rainfall eventsScaleUKUKGlobal
UKSpatial resolutionaTo match land projectionsUK Coastline †6Okm25km12km *
2.2kmHighest temporal resolutionDaily / monthlyAnnualDailyMonthlyDaily
Sub - dailyPeriod of databulk of 20th century to present day1950 - 21001900 - 21001961 - 21001981 - 2080
1981 - 20002021 - 20402061 - 2080Emissions scenariosN / ARCP2.6, RCP4.5, RCP8.5 H **RCP8.5 ; additional lower scenario ( for Met Office Hadley Centre model only )SRES A1B, RCP2.6, RCP4.5, RCP6.0 RCP8.5RCP8.5
RCP8.5Variables available **Temperature, precipitation ( including snow ), sunshine, windSea level rise, storm surgeTemperature, precipitation, humidity, wind speed, wind direction, solar radiationTemperature, precipitation, humidity, wind speed, solar radiationTemperature, precipitation, humidity, wind speed, wind direction, solar radiation
", + "page_start": 3, + "page_end": 3, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "**MARINE PROJECTIONS**\n**Sea level rise. Storm surge. Past event case studies.**\n\nSea-level rise projections will extend to 2100 and will include contributions from glaciers, \nice sheets, freshwater reservoirs, groundwater and thermal expansion. Outputs will include \nan estimate of the year-to-year changes in sea level rise and a “plausible but highly unlikely” \nscenario known as H++. A new feature of UKCP18 will be assessing the credibility of making \nsea level rise projections to 2300. The projections will use the latest information from the \nCMIP5 models and application of the methods used in the Intergovernmental Panel on \nClimate Change’s (IPCC) Fifth Assessment Report10. \n\nThe UKCP09 storm surge projections will be updated to provide new estimates of the change \nin high water levels over the 21st Century. These estimates will be based on a combination of \nprojected mean sea level change and projections of change in the extremes due to changes in \natmospheric storminess. These “storminess” projections will use the same surge model used \nin operational weather forecasting, using the wind and pressure from the CMIP5 ensemble to \ndrive the surge. New understanding of the modification of large-scale sea level change signals \nas they pass from the open ocean onto the shelf sea around the UK will be incorporated into \nthe UKCP18 marine projections. UKCP18 will also include storm surge historical case studies \nderived from applying plausible future sea level change to historical extreme events. ", + "page_start": 1, + "page_end": 1, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "**Table 2.**Proxies for flood and drought events used in the HCVI. \n\n\n \n \n \n \n [html]\n
extreme weather eventdescription of proxy
average length of flood eventsnumber of days in which the cumulative daily rainfall excess is positive, compared with the 95th percentile in the 1981 – 2010 average
average length of drought eventsnumber of days in which the cumulative daily rainfall deficit is positive, compared with the 20th percentile in the 1981 – 2010 average
", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed11.pdf" + }, + { + "text": "**13**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n. \n. \n. \n\n–3 \n3 \n0 \nchange in length of average flood event (days) \n–2 –1 1 2 \n. \n. \n. \n. \n. \n. \n GFDL-ESM2M \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \nMIROC-ESM-CHEM \n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n. \n. ", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed11.pdf" + }, + { + "text": "The higher-resolution HadGEM3 simulations project consistent increases in temperature-related \nextremes, with larger changes at 2°C compared to 1.5°C and local changes being larger than the \nglobal annual mean. There is a higher degree of spatial variation in our projections compared \nwith CMIP5-based studies. \n\nIn the model projections examined here, changes relating to the water cycle are complex, both \nin their geographical pattern and in the variation between different models. The length of flooding \nevents generally increases across world in all models, but maximum rainfall can either increase or \ndecrease depending on locations. Global patterns of increase and decrease show some consistency \nbetween the different GWLs, but also some local differences. Worldwide, most impacts broadly \ntend to increase with global warming in most areas. For global mean changes, even when the sign \nof change is uncertain, individual realizations generally show reduced impact at 1.5°C compared \nwith 2°C. However, this does not always hold even at the scale of major global river basins. \n\nVulnerability to food insecurity increases more at 2°C global warming than 1.5°C in \napproximately three-quarters of countries assessed. The vulnerability increase can arise from \nincreases in either flooding or drought. Reduced drought leads to decreased vulnerability in a \nlimited number of cases. ", + "page_start": 24, + "page_end": 24, + "source_file": "pubmed11.pdf" + }, + { + "text": "**15**\n\nr \ns \nt \na \n. \nr \no \ny \na \nl \ns \no \nc \ni \ne \nt \ny \np \nu \nb \n\n. \n. \n. \n. \n. \n. \n–75 –50 –10 –1 \n0 \n% \n1 10 50 75 \n. \n. \n. \n. \n. \n. \nGFDL-ESM2M HadGEM2-ES \n. \n. \n. \n. \n. \n\nl \ni \ns \nh \nn \ng \n. \no \nr \ng \n\n. \n. \n. \ni \n. \n. \n. \n. \n. \n. \n. \nP \nh \n. \n. \n. \ni \nl \n. . \n\nT \nr \na \nn \ns \n. \n\n. \n. \n. \n. \n. \n. \nR . \n\n. \nS \no \nc \n. \n\n. \n. \n. \n. \n. \n\nA \n**3**\n**7**\n**6**\n\n. \n. \n. \n. \n\n: \n2 \n0 \n1 \n6 \n0 \n4 \n5 \n2 \n\n. \n. \n. \n. \n. \n. \n. \n\n**Figure 9.**Changes in run-off for mean flows simulated by the JULES ecosystem–hydrology model under six climate simulations \nat 2°C global warming. (a) Ensemble mean and (b) percentage of models agreeing on increased flow. \n\n. \n. ", + "page_start": 14, + "page_end": 14, + "source_file": "pubmed11.pdf" + }, + { + "text": "**Natural Gas Volatility**\n\nThe Company expects to see continued volatility in natural gas pricing in Nova Scotia and New Brunswick until additional pipeline capacity is built \nto alleviate supply constraints in Atlantic Canada and the Northeastern US, bringing pricing more in‑line with other areas of North America. In \nthe short‑term, Management will continue to manage properties to maximize energy efficiencies. In addition, where dual‑fired heating systems \nexist, the Company will switch to oil when the economics support the change and will explore investing in increasing the base of dual‑fired \nsystems. \n\n**Acquisition Activity With a Focus in Ontario and Two New Developments Underway**\n\nThe Company expects to purchase a minimum of $75 million in assets in 2014. The concentration of acquisition activity is expected to take place \nin Ontario, in‑line with the Company’s long‑term strategic goal of increasing NOI generated from outside of Atlantic Canada to 50%. Killam also \nhas two new development projects underway, including a two building 101‑unit complex located in St. John’s, expected to be completed in Q3 \n2014, and one located in Cambridge, with the first phase of 122 units expected to be completed in the first half of 2015. ", + "page_start": 27, + "page_end": 27, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Research \n\n**Cite this article:**Betts RA et al. 2018 Changes \nin climate extremes, fresh water availability \nand vulnerability to food insecurity projected \nat 1.5°C and 2°C global warming with a \nhigher-resolution global climate model. Phil. \nTrans. R. Soc. A**376**: 20160452. \nhttp://dx.doi.org/10.1098/rsta.2016.0452 \n\nAccepted: 13 February 2018 \n\nOne contribution of 20 to a theme issue ‘The \nParis Agreement: understanding the physical \nand social challenges for a warming world of \n1.5°C above pre-industrial levels’. \n\n**Subject Areas:**\nclimatology, hydrology \n\n**Keywords:**\n1.5°C, Paris Agreement, 2°C, global climate \nimpacts, water resources, terrestrial \necosystems \n\n**Author for correspondence:**\nRichard A. Betts \ne-mail: richard.betts@metoffice.gov.uk ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed11.pdf" + } + ] + }, + { + "references": { + "source_file": "news2.pdf", + "query": "How flooding was prevented in Vancouver? ", + "target_page": 1, + "target_passage": "In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community Gardens created a wetland on downtown’s east side, an area historically prone to flooding. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Three ways Canadian communities are reducing flood**\n**risks**\n\n(NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly \nexposed. There are large-scale programs available across the country providing flood protection \nmeasures for communities at risk, such as Intact’s Municipal Climate Resiliency Grants. This \nprogram is helping build the resilience of communities and homes through a variety of \npreventative actions. \n\nWetlands can reduce flood risk by absorbing large quantities of water, but they are not typically \nfound in cities. In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community \nGardens created a wetland on downtown’s east side, an area historically prone to flooding. Made \nup of natural elements like ponds and marshes, the wetland reduces the community’s flood risk \nby catching and absorbing rainfall and runoff from surrounding surfaces. \n\nKnowing the risks is the first step to protecting homes and communities. In New Brunswick, the \nCity of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online \nflood prevention guidance. Residents can input their addresses to see if they are at risk and learn \ntips to reduce the risk of flooding around their properties. The portal launched in the summer of \n2023 and was viewed 27,000 times in its first year. ", + "page_start": 0, + "page_end": 0, + "source_file": "news2.pdf" + }, + { + "text": "Overall, large-scale river and floodplain restoration investments50 can provide a major \neconomic boost for the restoration sector and for local socioeconomic activities such as \ntourism and recreation. At the same time, these investments can improve water \nregulation, flood protection, nursery habitats for fish, and the removal of nutrient \npollution. \n\n*2.2.8. Greening urban and peri-urban areas*\n\n**Green urban spaces**, from parks and gardens to green roofs and urban farms, provide a \nwide range of benefits for people. They also provide opportunities for businesses and a \nrefuge for nature. They reduce air, water and noise pollution, provide protection from \nflooding, droughts and heat waves, and maintain a connection between humans and \nnature51. \n\nThe recent lockdowns due to the COVID-19 pandemic have shown us the**value of green**\n**urban spaces for our physical and mental wellbeing**. While protection of some urban ", + "page_start": 12, + "page_end": 12, + "source_file": "legal5_eubiodiversity_cc4.pdf" + }, + { + "text": "\nREDUCED DOWNWASH \nDUE TO GROUND EFFECT ", + "page_start": 293, + "page_end": 293, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n\nPRESSURE RISE \nLIMITED BY ", + "page_start": 143, + "page_end": 143, + "source_file": "00-80T-80.pdf" + }, + { + "text": "Rebate programs are a powerful motivation for homeowners to make upgrades that might \notherwise be put off. In PEI, the City of Charlottetown offered rebates covering 75 per cent of \neligible material and labour costs, up to a maximum of $1,000. More than 90 properties \ncompleted upgrades, including installing sump pumps, backup batteries, backwater valves, and \nwater monitors and alarms, to better prepare them for extreme weather events. \n\nCommunities can learn more about the grant program and how to apply at intactfc.com/mcrg. \n\nwww.newscanada.com \n\nWord Count: 281 ", + "page_start": 0, + "page_end": 0, + "source_file": "news2.pdf" + }, + { + "text": "\nDEFLECTED AIRSTREAM ", + "page_start": 84, + "page_end": 84, + "source_file": "00-80T-80.pdf" + }, + { + "text": "**Table 2.**Proxies for flood and drought events used in the HCVI. \n\n\n \n \n \n \n [html]\n
extreme weather eventdescription of proxy
average length of flood eventsnumber of days in which the cumulative daily rainfall excess is positive, compared with the 95th percentile in the 1981 – 2010 average
average length of drought eventsnumber of days in which the cumulative daily rainfall deficit is positive, compared with the 20th percentile in the 1981 – 2010 average
", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed11.pdf" + }, + { + "text": "\n\nDOWNWASH AT TAIL ", + "page_start": 280, + "page_end": 280, + "source_file": "00-80T-80.pdf" + }, + { + "text": "**Washington State Encourages the Use of Compost,**\n**to Protect Our Water Quality**\nThe Washington State Department of Ecology recommends that soils \non construction sites be restored with compost before planting, and also \nencourages the use of compost for construction site erosion control, to reduce \nstormwater runoff and help keep our rivers, lakes, and Puget Sound clean. \nLearn more at**www.SoilsforSalmon.org**or**www.BuildingSoil.org.**\n\n**Remember:**\n**Your compost provider can help you pick the best compost mix**\n**for your needs.**", + "page_start": 5, + "page_end": 5, + "source_file": "CompostGuide.pdf" + }, + { + "text": "\nDOWNWASH AT ", + "page_start": 275, + "page_end": 275, + "source_file": "00-80T-80.pdf" + } + ] + }, + { + "references": { + "source_file": "news2.pdf", + "query": "How can citizens in Fredericton easily access flood risk data?", + "target_page": 1, + "target_passage": "New Brunswick, the City of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online flood prevention guidance.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Three ways Canadian communities are reducing flood**\n**risks**\n\n(NC) Communities in Canada are facing increased flood risks, with 1.5 million homes highly \nexposed. There are large-scale programs available across the country providing flood protection \nmeasures for communities at risk, such as Intact’s Municipal Climate Resiliency Grants. This \nprogram is helping build the resilience of communities and homes through a variety of \npreventative actions. \n\nWetlands can reduce flood risk by absorbing large quantities of water, but they are not typically \nfound in cities. In Vancouver, B.C., Environmental Youth Alliance and Strathcona Community \nGardens created a wetland on downtown’s east side, an area historically prone to flooding. Made \nup of natural elements like ponds and marshes, the wetland reduces the community’s flood risk \nby catching and absorbing rainfall and runoff from surrounding surfaces. \n\nKnowing the risks is the first step to protecting homes and communities. In New Brunswick, the \nCity of Fredericton launched a Neighbourhood Flood Risk Tool to provide easy access to online \nflood prevention guidance. Residents can input their addresses to see if they are at risk and learn \ntips to reduce the risk of flooding around their properties. The portal launched in the summer of \n2023 and was viewed 27,000 times in its first year. ", + "page_start": 0, + "page_end": 0, + "source_file": "news2.pdf" + }, + { + "text": "How can I get the information and when? \nAccess to the raw data, pre-prepared data and maps, headline messages and user guidance will be available \nthrough a dedicated website. \n\nA dedicated user interface will provide users with a means to download the data and produce customised \nvisualisations. The exact nature of these outputs is still the subject of consultation with users. \n\nDetailed descriptions of the scientific basis of the projections will be available as the project progresses. For the \nlatest information visit: \n**http://ukclimateprojections.metoffice.gov.uk/24125**\n\n*UKCP Project Team*\n\n*July 2017*", + "page_start": 3, + "page_end": 3, + "source_file": "legal1_opengouvernementlicense.pdf" + }, + { + "text": "more concrete over time is damage control. In a world that produces digital data without \n\ninterruption, uncontrolled and unpredictable data releases are facts of life that are very hard to \n\npredict, practically impossible to avoid and increasingly common. Opening public government data, \n\nthat is providing plenty of officially verified information, becomes therefore also a damage control \n\nsolution, to prevent or at least minimize damages from such uncontrolled releases. Without official \n\nOpen Public Data, individual citizens, political parties or other organizations will start to process \n\nand compare (if they already aren't...) data from unofficial sources anyway, maybe from different \n\ncountries. In such cases, it will be unavoidable not reach sometimes, even in good faith, wrong \n\nconclusions. This is not some theoretical possibility far in the future, as this real world example \n\n(from a comment to an Open Data discussion in an italian blog) proves: \n\n\"*on the*[non italian]*Geonames website you can download geo-referenced data*\n*about... 47000 Italian municipalities. That worries me, because there are only 8094 of*\n*them. Besides, I grabbed a few random data about population, and I can guarantee you*\n*that not one was right. What should be done in such cases?*", + "page_start": 4, + "page_end": 4, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "**Table 2.**Proxies for flood and drought events used in the HCVI. \n\n\n \n \n \n \n [html]\n
extreme weather eventdescription of proxy
average length of flood eventsnumber of days in which the cumulative daily rainfall excess is positive, compared with the 95th percentile in the 1981 – 2010 average
average length of drought eventsnumber of days in which the cumulative daily rainfall deficit is positive, compared with the 20th percentile in the 1981 – 2010 average
", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed11.pdf" + }, + { + "text": "thing to do is to*create*data, normally through outsourcing and crowd sourcing. \n\nOther issues, that will be discussed in detail in other sections of the report because they are also \n\npresent in Europe in different forms, are related to lack of equal opportunities for access to data and \n\nserious fears (sometimes, concrete, sometimes caused by confusion about what should be open and \n\nhow) that data will be used*against*citizens. A commenter to Gurstein's Open Data: Empowering \n\nthe Empowered or Effective Data Use for Everyone? said: \n\n*in Delhi and Mumbai, mobs and rioters managed to get information about particular*\n*identity groups through voter rolls: openness is, in certain situations, a precarious*\n*virtue. It is almost certain that Open Data would be used to rig election but here again*\n*openness is not the issue, they would find it anyway...*\n\nSo far, the main interest about Open Data in Asian countries seems limited, so to speak, to its \n\neffects on transparency in politics. At a two-weeks programming contest held at the end of 2010 in \n\nThailand, for example, one of the most appreciated entries was a software scraper of the Thailand's \n\nMember of House of Representative Website, that made it possible for everybody to create ", + "page_start": 7, + "page_end": 7, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "UN Food and Agriculture Organization, UN Development Programme and UN Population \nFund [22]. The exposure component comprised proxies for the average length of flood and \ndrought events calculated with daily precipitation data [23] (table 2). These proxies were chosen \nabove other possible metrics as they were required to replace self-reported instances of flood \nand drought events used in the original HCVI, which correlate with undernutrition data at the \ncountry-level [23]. The proxies were therefore masked to only include data where a significant \nproportion of people live and grow crops before aggregating to country level and combining to \ncomprise a measure of exposure [23]; nevertheless, it is recognized that precipitation data alone \nmay not always be adequate for representing flood and drought events, so the current method is \nregarded as preliminary. \n\nThe impacts of projected climate change, therefore, act through changes in these quantities. In \nthe current version of the HCVI, climate-change impacts on other quantities such as crop yield \nare not considered. Socio-economic factors affecting sensitivity and adaptive capacity are fixed at \npresent-day conditions. \n\nThe ensemble-mean baseline HCVI calculated with the high-resolution bias-corrected \nHadGEM3 ensemble is shown in figure 1. The spatial pattern is compatible with HCVI values \ncalculated using reanalysis data at the CMIP5 grid-scale resolution [23]; the most vulnerable \nregions are sub-Saharan Africa and South Asia. This higher-resolution climate data enables \ninclusion of additional countries which were not resolved in the lower-resolution CMIP5 data. ", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed11.pdf" + }, + { + "text": "The preparation for lodgement of an EIS to the \nNSW Department of Planning continues. It is \nenvisaged that the EIS will be completed and \nlodged in 2014. Data for flora and fauna, surface \nwater, groundwater, meteorology, ambient \nnoise and dust levels are collected routinely. \nFurther investigations of cultural heritage, \nsocial-economic impact, traffic impact, soil \ntype and agricultural suitability have also been \nundertaken. ", + "page_start": 43, + "page_end": 43, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "*a research project about openness of*\n*public data in EU local*\n*administration*\n\n*by Marco Fioretti*\n*for the*\n*Laboratory of Economics and Management*\n*of*\n*Scuola Superiore Sant'Anna, Pisa*", + "page_start": 0, + "page_end": 0, + "source_file": "Open_Data_Report.pdf" + }, + { + "text": "\n\nNAVWEPS 00-8OT-80 \nINDEX \n\nPsge \n305 \n192 \n196 \n300 \n294 ", + "page_start": 432, + "page_end": 432, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Units ( 1 )Number of Properties% of Apartment NOI and Equity Income
Nova Scotia
Halifax ( 2 )4.9705447.1 %
Sydney13921.2 %
5.1095648.3 %
New Brunswick
Moncton1.593309.8 %
Fredericton1.394209.9 %
Saint John1.143135.6 %
Miramichi9610.7 %
4.2266426.0 %
Ontario ( 3 )
Ottawa49262.7 %
London26422.8 %
Cambridge22523.4 %
Toronto37821.5 %
1.3591210.4 %
Newfoundland and Labrador
St. John ' s813117.3 %
Grand Falls14821.1 %
961138.4 %
Prince Edward Island
Charlottetown906176.6 %
Summerside8620.3 %
992196.9 %
Total12.647164100.0 %
", + "page_start": 29, + "page_end": 29, + "source_file": "TSX_KMP_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed2.pdf", + "query": "In these mice, which lumbar levels were the dorsal root ganglion removed from?", + "target_page": 3, + "target_passage": "L3 to L5 DRGs were removed and postfixed for another 2 hours", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Acknowledgments \n\nThe authors thank Dr Mark Hoon for providing the Trpm8-Flp \ntransgenic mouse line and Prof Andrew Todd and Dr David \nHughes for their critical feedback on the manuscript. Neuron and \nganglion illustrations in Figure 1 and S1 (http://links.lww.com/ \nPAIN/C84) were adapted from images provided by Servier \nMedical Art, licensed under CC BY 4.0. The research was funded \nby an MRC Fellowship grant awarded to GAW. (MR/T01072X/1) \nand a Tenovus Scotland Pilot Grant awarded to AHC and GAW \n(S22-17). This work was also funded by the Wellcome Trust (DPhil \nscholarship to AMB, 215145/Z/18/Z) and a Wellcome Investiga- \ntor Grant to D.L.B. (223149/Z/21/Z), as well as the MRC (MR/ \nT020113/1), and with funding from the MRC and Versus Arthritis \nto the PAINSTORM consortium as part of the Advanced Pain \nDiscovery Platform (MR/W002388/1). AMB further \nreceived \na GTC MSDTC Scholarship. ", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed2.pdf" + }, + { + "text": "3.3. Spared nerve injury induces a loss of Trpm81 and \ncalcitonin gene-related peptide1 but not myelinated dorsal \nroot ganglion neurons \n\nloss of Trpm81 (cold- \ninduced loss. To investigate potential \nsensitive), calcitonin gene-related peptide1 (CGRP) (peptider- \ngic), and myelinated subpopulations of DRG neurons following \nnerve injury, we applied our FB-labelling approach in Trpm8FlpO; \nRC::FLTG (FlpO-dependent tdTom expression), CalcaCreERT2; \nAi32 (Cre-dependent ChR2-YFP expression) and Thy1-CFP \nmice, respectively (Figs. 4A–D). Trpm8-tdTom was expressed Loss restricted to nonpeptidergic nociceptors would not fully \naccount for the degree of total neuron loss that we observed. \nTherefore, we studied a range of other subpopulations, both \nsmall and large in diameter, for their vulnerability to injury- ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed2.pdf" + }, + { + "text": "Abstract \nThere is a rich literature describing the loss of dorsal root ganglion (DRG) neurons following peripheral axotomy, but the vulnerability \nof discrete subpopulations has not yet been characterised. Furthermore, the extent or even presence of neuron loss following injury \nhas recently been challenged. In this study, we have used a range of transgenic recombinase driver mouse lines to genetically label \nmolecularly defined subpopulations of DRG neurons and track their survival following traumatic nerve injury. We find that spared \nnerve injury leads to a marked loss of cells containing DRG volume and a concomitant loss of small-diameter DRG neurons. Neuron \nloss occurs unequally across subpopulations and is particularly prevalent in nonpeptidergic nociceptors, marked by expression of \nMrgprd. We show that this subpopulation is almost entirely lost following spared nerve injury and severely depleted (by roughly 50%) \nfollowing sciatic nerve crush. Finally, we used an in vitro model of DRG neuron survival to demonstrate that nonpeptidergic \nnociceptor loss is likely dependent on the absence of neurotrophic support. Together, these results profile the extent to which DRG \nneuron subpopulations can survive axotomy, with implications for our understanding of nerve injury–induced plasticity and pain. ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed2.pdf" + }, + { + "text": "3. Results \n\n3.1. Peripheral nerve injury induces a loss of small neurons \nfrom the dorsal root ganglion \n\nTogether, our data derived from several different experimental \napproaches show that a population of small-diameter afferents \nare lost following peripheral nerve injury. \n\n3.2. Spared nerve crush or transection results in death of \nMrgprd-expressing neurons \n\nTo date, determining cell \nloss among specific populations of \nafferent neurons has proved challenging due to the down- \nregulation of subpopulation-specific marker genes following \ntransection.37,44 To overcome this issue, we took \naxonal \nadvantage of \ntransgenic strategies to label populations in \na manner that persisted after injury. Owing to the bias for the \nloss of small neurons and the known loss of IB4-binding central \nterminals postinjury,36 we initially focused on nonpeptidergic \nnociceptive neurons. We used MrgDChR2-YFP mice to identify \nneurons belonging to the largest of \nthe 3 classes of non- \npeptidergic nociceptors, NP1.55,59 To determine whether these \nneurons are lost following nerve injury, we used a stereological \nmethod to quantify L4 DRG MrgD-YFP1 (yellow fluorescent ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed2.pdf" + }, + { + "text": "While we made efforts to profile the loss of several molecularly \ndiscrete sensory neuron populations, we acknowledge that not all \nsubtypes were profiled. Furthermore, recent single-cell RNA \nsequencing has given us a more granular appreciation of the \nheterogeneity of sensory neurons.42 Future studies could \nleverage our experimental approach and new transgenic lines \nto characterize the loss of neurons in more detail. Such \nexperiments may be pertinent before embarking on molecular \nor functional profiling of populations post–nerve injury. \n\nRodents develop marked mechanical and thermal hypersen- \nsitivity rapidly following nerve injury and before timepoints at \nwhich neuron loss is observed.10 This lack of a temporal \ncorrelation may suggest a limited contribution to evoked hyper- \nsensitivities. The temporal profile of ongoing tonic pain (eg, pain \naversiveness as measured by condition place preference \nassays26) is less defined and so is its correlation to the timing of \nneuron loss. \n\n4.5. Conclusions \n\nIn sum, we have provided data from multiple complementary \nexperimental approaches to support the hypothesis that DRG \nneurons are lost following nerve injury in mice. We describe \na substantial loss, which is biased towards specific subpopula- \ntions and particularly present in small-diameter nonpeptidergic \nnociceptive neurons. ", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed2.pdf" + }, + { + "text": "Figure 2. Spared nerve crush and transection lead to a loss of small DRG neurons. (A) Approach to restrict analysis to damaged afferents: a subcutaneous \ninjection of the tracer FB into both hindpaws labelled tibial afferents, before unilateral SNItrans or SNIcrush surgery. (B) Representative image of FB labelling and NeuN \nimmunostaining in the L4 DRG. The image is a projection of optical sections at 3-mm intervals through the entirety of a 30-mm-thick tissue section. Scale bar 5 \n100 mm. (C and D) Quantification of the cross-sectional area of FastBlue labelled DRG neurons ipsilateral and contralateral to SNItrans (C) or SNIcrush injury (D) \nreveals a loss of small afferents and subsequent shift in population distribution. Kolmogorov–Smirnov tests of cumulative distributions; SNItrans: D 5 0.25, P , \n0.001; n 5 183 or 191 neurons from 3 mice; SNIcrush: D 5 0.22, P , 0.001, n 5 319 or 325 neurons from 3 mice. (E) Experimental approach for whole DRG \nvolumetric analyses after SNItrans. (F) Representative 3D rendering of TDP-43 profiles and corresponding nuclear spot profiles following Imaris-based spot \ndetection feature. Scale bar 5 100 mm. (G) Quantification of DRG nuclear spot volume ipsilateral and contralateral to SNItrans. Kolmogorov–Smirnov tests of \ncumulative distribution: D 5 0.06, P , 0.001, n 5 30,206 (contra) or 32,544 (ipsi) nuclei from 4 (contra) or 5 (ipsi) mice. (H) Total number of nuclear spots, by size, \nper DRG. Two-way RM ANOVA; size bin 3 injury interaction: F2,145 8.26, P 5 0.004; n 5 4 to 5 mice; ˇS´ıd ´ak multiple comparisons tests:**P , 0.01. ANOVA, \nanalysis of variance; DRG, dorsal root ganglion; FB, FastBlue; RM, repeated measures. ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed2.pdf" + }, + { + "text": "1. Introduction \n\nDorsal root ganglion (DRG) neurons represent a molecularly \nand functionally heterogeneous population. Under normal \nconditions, \nthe \nsomatosensory nervous system to detect a myriad of sensory \nstimuli that result in the perceptions of touch, temperature, \nitch, and pain. Following nerve injury, physiological changes in \nDRG neurons lead to hyperexcitability,57 which is a key \npathological driver of neuropathic pain.20,63 Concomitant \nmolecular changes in discrete subpopulations also occur, \nand these have recently been comprehensively described in \nsingle-cell37,44 and subpopulation-specific sequencing stud- \nies.3 These studies describe a transient and generalized \nreduction in the expression of subpopulation-specific genes \nfollowing nerve injury.3,37,44 \n\nthis diversity contributes to the ability of \n\nIn addition to molecular changes, there is a rich literature \ndescribing the frank loss of DRG neurons following traumatic ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed2.pdf" + }, + { + "text": "Figure 4. Spared nerve injury induces a loss of Trpm81 and CGRP1 but not myelinated DRG neurons. (A) Schematic of experimental approach. (B–D) FastBlue \nlabelling and Trpm8-tdTom (B), Calca-YFP (C), or Thy1-CFP expression (D) 28 days after SNItrans in the L4 DRG, contralateral (top) or ipsilateral (bottom) to injury. \nImages are projections of optical sections at 3-mm intervals through the entirety of 30-mm-thick tissue sections. Scale bars 5 100 mm. (E–G) Quantification of the \nproportion of FB-labelled neurons also expressing Trpm8-tdTom (E), Calca-YFP (F), or Thy1-CFP (G) in L4 DRG contralateral or ipsilateral to SNItrans. Paired t tests; \nTrpm8-tdTom: t2 5 5.31, P 5 0.034, n 5 3 mice; Calca-YFP: t3 5 4.12, P 5 0.026, n 5 4 mice; Thy1-CFP: t3 5 4.42, P 5 0.022, n 5 4 mice.*P , 0.05. CFP, cyan \nfluorescent protein; CGRP, calcitonin gene-related peptide; DRG, dorsal root ganglion; FB, FastBlue. ", + "page_start": 8, + "page_end": 8, + "source_file": "pubmed2.pdf" + }, + { + "text": "Figure 1. SNItrans induces death of small primary afferent neurons, accompanied by a reduction in volume, not cell density, of the dorsal root ganglion. (A) \nApproach to differentially labelled intact afferents with tdTomato and damaged afferents with GFP after peripheral nerve injury using the AvilFlpO;Atf3CreERT2;RC:: \nFLTG mouse line and schematic of experimental timeline. (B) Representative image of GFP, tdTomato, and NeuN expression in an L4 DRG, 2 weeks after SNItrans. \nScale bars 5 100 mm. (C and D) Stereological quantification of the total number of DRG neurons (C) or number of axotomized and intact neurons (D) in the L4 DRG \n1, 2, 4, and 8 weeks after SNItrans or contralateral (contra) to injury. (C) One-way ANOVA with Tukey posttests; F4,10 5 37.98, P , 0.001. (D) Two-way RM ANOVA; \nTimepoint 3 Color interaction F4,10 5 39.04, P , 0.001, n 5 3 mice; Tukey posttests (between injured groups): †P , 0.05 vs contra, ‡P , 0.05 vs 1-week. (E) \nVolume of DRG-containing cells (ie, excluding white matter tracts) following SNItrans. One-way ANOVA with Tukey posttests; F4,10 5 21.25, P , 0.001, n 5 3. (F) \nNeuronal density within the DRG following SNItrans. One-way ANOVA; F4,10 5 2.77, P 5 0.09, n 5 3. (G) Population distribution of uninjured and injured afferents by \ncross-sectional area, 1 and 8 weeks post-SNItrans. Kolmogorov–Smirnov tests of cumulative distributions; Uninjured: D 5 0.08, P 5 0.18; Injured: D 5 0.32, P , \n0.001; n 5 310 to 427 neurons from 3 mice.*P , 0.05,**P , 0.01,***P , 0.001 vs contra. ANOVA, analysis of variance; DRG, dorsal root ganglion; GFP, green \nfluorescent protein. ", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed2.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
[ 53 ]
Tandrup T, Woolf CJ, Coggeshall RE. Delayed loss of small dorsal root ganglion cells after transection of the rat sciatic nerve. J Comp Neurol 2000 ; 422 : 172 – 80.
[ 54 ]
Terenghi G, Hart A, Wiberg M. The nerve injury and the dying neurons : diagnosis and prevention. J Hand Surg Eur Vol 2011 ; 36 : 730 – 4.
[ 55 ]
Uncekin D, Furier A, Islam S, Abdo H, Lonnetterg P, Lox D, Herling - Leffer J, Heaggthon J, Kharchenko O, Kharcherko Pai, Linnansson S, Emfors P : Unbiased classification of sensory neuron types by large - scale single - cell RNA sequencingi
[ 56 ]
Vestergaard S, Tandrup T, Jakobsen J. Effect of permanent awotomy on number and volume of dorsal root ganglion cell bodies. J Comp Neurol 1997.388 - 307 - 12.
[ 57 ]
Wall PD, Gutnick M. Properties of afferent nerve impulses originating from a neuroma. Nature 1974 ; 248 : 740 – 43.
[ 58 ]
WangCr, Gx L. PluenY, GengX, Xx, M, YangN, YvLL, BengY, ZhurC, Yang Y, Zhox Y, Gvan X, Luo W, LuG, DongK, YvLG, LanL, TlengZ, Fleolifation of MrgprD by TRP - A1 promotes neuropathic pain, FASEB, J 2019.33 : 1360 – 73.
[ 59 ]
Wang H, Zyka MJ. Mrgprd - expressing polymodal nociceptive neurons imervate most. known classes of substantia gelatinosa neurons. J Neurosoi 2009 ; 29 : 13202 – 9.
[ 60 ]
Wang R, Guo W, Ossipox MH, Vanderah TW, Porreca F, La J. Glial cell line - derived neurotrophic factor normalizes neurochemical changes in injured dorsal root ganglion neurons and preventis the expression of experimental neuropathic pa
[ 61 ]
Wang X, Archibald ML, Sitevens K, Baidridge WH, Chauhan BC. Qyan fluorescent protein ( CFP ) expressing cells in the refina of Thy1 - CFP transgenic mice before and after optic nerve injury. Neurosci Lett 2010 ; 468 : 110 – 4.
[ 62 ]
Warwick C, Cassidy C, Hachisulia J, Wright MC, Baunbauer HM, Adelman PC, LaskH, Shrahian TO, Ross SE, Koerbe HR, MrgordOre Ineage neurons mediate optogenetic alodynia through an emergent polynaptic circuit, PAN 2021 ; HS2 ; 2120 – 31.
", + "page_start": 13, + "page_end": 13, + "source_file": "pubmed2.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed2.pdf", + "query": "Did the researcher responsible for quantifying the cells in the dorsal root ganglion know which group each mouse belonged to?", + "target_page": 4, + "target_passage": "During all image quantification, the experimenter was blind to the experimental groups.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "While we made efforts to profile the loss of several molecularly \ndiscrete sensory neuron populations, we acknowledge that not all \nsubtypes were profiled. Furthermore, recent single-cell RNA \nsequencing has given us a more granular appreciation of the \nheterogeneity of sensory neurons.42 Future studies could \nleverage our experimental approach and new transgenic lines \nto characterize the loss of neurons in more detail. Such \nexperiments may be pertinent before embarking on molecular \nor functional profiling of populations post–nerve injury. \n\nRodents develop marked mechanical and thermal hypersen- \nsitivity rapidly following nerve injury and before timepoints at \nwhich neuron loss is observed.10 This lack of a temporal \ncorrelation may suggest a limited contribution to evoked hyper- \nsensitivities. The temporal profile of ongoing tonic pain (eg, pain \naversiveness as measured by condition place preference \nassays26) is less defined and so is its correlation to the timing of \nneuron loss. \n\n4.5. Conclusions \n\nIn sum, we have provided data from multiple complementary \nexperimental approaches to support the hypothesis that DRG \nneurons are lost following nerve injury in mice. We describe \na substantial loss, which is biased towards specific subpopula- \ntions and particularly present in small-diameter nonpeptidergic \nnociceptive neurons. ", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed2.pdf" + }, + { + "text": "The issue of whether neuron loss occurs, and if so, in what \nsubpopulations, is important. It will likely have implications for our \nunderstanding of reinnervation and functional recovery in patients. \nFurthermore, better insight will provide critical context for those \ninvestigating the plasticity that occurs following nerve injury and \nmay inform therapeutic targeting of sensory neuron populations. \n\nAn expanding repertoire of transgenic recombinase driver lines \nnow makes it possible to permanently label DRG neuron \nsubpopulations and study their fate in rodent nerve injury paradigms. \nThe aim of this study was to use this technology to characterize \n\nwww.painjournalonline.com 2863 ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed2.pdf" + }, + { + "text": "Nv ¼ Nsec \nVsec \n\nFinally, \ncalculated: \nthe total number of cells per DRG (NDRG) was \n\nNDRG ¼ Nv 3 VDRG \n\nFor quantification of the proportion of FB-labelled cells co- \nlabelled with afferent subpopulation markers, initially, the total \nnumber of FB-filled neuronal cell profiles with a visible nucleus \nanywhere within the section was counted, with the observer blind \nto other channels. The other channel was then revealed, and \ninstances of co-labelling were quantified. No stereological \ncorrection was applied, given that the similar size of neuronal \nnuclei would prevent over-counts of large neurons and that no \ncomparisons of the total number of labelled cells were made. For \nsoma area analyses, the area of neuronal soma expressing the \nappropriate marker was measured in the optical section within \nthe Z-stack in which that neuron was at its largest, by drawing \naround the perimeter of the neuron in Fiji/ImageJ v2.14.0/1.54f. \n\n2.7. Gene Ontology \n\nGene Ontology term analyses were performed on previously \npublished mouse subtype RNA-seq after SNI (GSE2164443). In \nthis study, subtype-specific bulk RNA-seq was performed on 5 \ntransgenic mouse lines through reporter labelling and fluores- \ncence activated cell sorting. spliced transcripts alignment to \na reference was used to map reads to the GRCm38 (mm10) \nMouse Genome,14 and Samtools was used to sort, index, and \nmerge Binary Alignment Map files in line with published reports.28 \nQuality control was performed as per Barry et al.3 Downstream \nanalyses were performed using DESeq2 on grouped male and \nfemale samples.31 For differentially expressed genes (false \ndiscovery rate) (FDR , 0.05, LFC .1) (log-fold change), GO \nanalyses were performed using the Wallenius method using \ngoSeq (R). In this study, significantly regulated terms related to ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed2.pdf" + }, + { + "text": "3. Results \n\n3.1. Peripheral nerve injury induces a loss of small neurons \nfrom the dorsal root ganglion \n\nTogether, our data derived from several different experimental \napproaches show that a population of small-diameter afferents \nare lost following peripheral nerve injury. \n\n3.2. Spared nerve crush or transection results in death of \nMrgprd-expressing neurons \n\nTo date, determining cell \nloss among specific populations of \nafferent neurons has proved challenging due to the down- \nregulation of subpopulation-specific marker genes following \ntransection.37,44 To overcome this issue, we took \naxonal \nadvantage of \ntransgenic strategies to label populations in \na manner that persisted after injury. Owing to the bias for the \nloss of small neurons and the known loss of IB4-binding central \nterminals postinjury,36 we initially focused on nonpeptidergic \nnociceptive neurons. We used MrgDChR2-YFP mice to identify \nneurons belonging to the largest of \nthe 3 classes of non- \npeptidergic nociceptors, NP1.55,59 To determine whether these \nneurons are lost following nerve injury, we used a stereological \nmethod to quantify L4 DRG MrgD-YFP1 (yellow fluorescent ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed2.pdf" + }, + { + "text": "Abstract \nThere is a rich literature describing the loss of dorsal root ganglion (DRG) neurons following peripheral axotomy, but the vulnerability \nof discrete subpopulations has not yet been characterised. Furthermore, the extent or even presence of neuron loss following injury \nhas recently been challenged. In this study, we have used a range of transgenic recombinase driver mouse lines to genetically label \nmolecularly defined subpopulations of DRG neurons and track their survival following traumatic nerve injury. We find that spared \nnerve injury leads to a marked loss of cells containing DRG volume and a concomitant loss of small-diameter DRG neurons. Neuron \nloss occurs unequally across subpopulations and is particularly prevalent in nonpeptidergic nociceptors, marked by expression of \nMrgprd. We show that this subpopulation is almost entirely lost following spared nerve injury and severely depleted (by roughly 50%) \nfollowing sciatic nerve crush. Finally, we used an in vitro model of DRG neuron survival to demonstrate that nonpeptidergic \nnociceptor loss is likely dependent on the absence of neurotrophic support. Together, these results profile the extent to which DRG \nneuron subpopulations can survive axotomy, with implications for our understanding of nerve injury–induced plasticity and pain. ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed2.pdf" + }, + { + "text": "Figure 2. Spared nerve crush and transection lead to a loss of small DRG neurons. (A) Approach to restrict analysis to damaged afferents: a subcutaneous \ninjection of the tracer FB into both hindpaws labelled tibial afferents, before unilateral SNItrans or SNIcrush surgery. (B) Representative image of FB labelling and NeuN \nimmunostaining in the L4 DRG. The image is a projection of optical sections at 3-mm intervals through the entirety of a 30-mm-thick tissue section. Scale bar 5 \n100 mm. (C and D) Quantification of the cross-sectional area of FastBlue labelled DRG neurons ipsilateral and contralateral to SNItrans (C) or SNIcrush injury (D) \nreveals a loss of small afferents and subsequent shift in population distribution. Kolmogorov–Smirnov tests of cumulative distributions; SNItrans: D 5 0.25, P , \n0.001; n 5 183 or 191 neurons from 3 mice; SNIcrush: D 5 0.22, P , 0.001, n 5 319 or 325 neurons from 3 mice. (E) Experimental approach for whole DRG \nvolumetric analyses after SNItrans. (F) Representative 3D rendering of TDP-43 profiles and corresponding nuclear spot profiles following Imaris-based spot \ndetection feature. Scale bar 5 100 mm. (G) Quantification of DRG nuclear spot volume ipsilateral and contralateral to SNItrans. Kolmogorov–Smirnov tests of \ncumulative distribution: D 5 0.06, P , 0.001, n 5 30,206 (contra) or 32,544 (ipsi) nuclei from 4 (contra) or 5 (ipsi) mice. (H) Total number of nuclear spots, by size, \nper DRG. Two-way RM ANOVA; size bin 3 injury interaction: F2,145 8.26, P 5 0.004; n 5 4 to 5 mice; ˇS´ıd ´ak multiple comparisons tests:**P , 0.01. ANOVA, \nanalysis of variance; DRG, dorsal root ganglion; FB, FastBlue; RM, repeated measures. ", + "page_start": 6, + "page_end": 6, + "source_file": "pubmed2.pdf" + }, + { + "text": "1. Introduction \n\nDorsal root ganglion (DRG) neurons represent a molecularly \nand functionally heterogeneous population. Under normal \nconditions, \nthe \nsomatosensory nervous system to detect a myriad of sensory \nstimuli that result in the perceptions of touch, temperature, \nitch, and pain. Following nerve injury, physiological changes in \nDRG neurons lead to hyperexcitability,57 which is a key \npathological driver of neuropathic pain.20,63 Concomitant \nmolecular changes in discrete subpopulations also occur, \nand these have recently been comprehensively described in \nsingle-cell37,44 and subpopulation-specific sequencing stud- \nies.3 These studies describe a transient and generalized \nreduction in the expression of subpopulation-specific genes \nfollowing nerve injury.3,37,44 \n\nthis diversity contributes to the ability of \n\nIn addition to molecular changes, there is a rich literature \ndescribing the frank loss of DRG neurons following traumatic ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed2.pdf" + }, + { + "text": "4.4. Study limitations \n\nOur efforts focused on traumatic nerve injury paradigms owing to \nprevious contrasting results using these robust and reproducible \nexperimental models. We did not extend our studies to systemic \nneuropathy models, such as chemotherapy or diabetic neurop- \nathy. A recent postmortem analysis reported a neuronal loss in \nthe DRG from patients with painful diabetic peripheral neurop- \nathy.19 Transcriptional \nresponses vary substantially across \ndifferent nerve insults,44 so it would be of interest to test whether \nneuronal loss and the subpopulation vulnerability reported in this \nstudy are common features across different types of insults. \n\nUsing multiple approaches, we assess the na¨ıve mouse L4 \nDRG to contain approximately 8000 neurons, consistent with \na previous estimate,67 and observed a frank loss of small- \ndiameter neurons following injury. However, the extent of loss \nobserved using our semiautomated approach was less than that \nobserved using manual techniques.67 Two major limitations in \nthis study may explain this discrepancy: First, owing to technical \nissues, the cleared DRG dataset is unpaired ipsilateral–contra- \nlateral which adds larger variability. Second, the analysis method \nis prone to undercounting deep nuclei. The signal-to-noise is \nbetter for superficial nuclei and smaller tissue volumes. Given the \nreduction in DRG volume after SNItrans, nuclei \nin larger \ncontralateral DRG may be undercounted. ", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed2.pdf" + }, + { + "text": "Acknowledgments \n\nThe authors thank Dr Mark Hoon for providing the Trpm8-Flp \ntransgenic mouse line and Prof Andrew Todd and Dr David \nHughes for their critical feedback on the manuscript. Neuron and \nganglion illustrations in Figure 1 and S1 (http://links.lww.com/ \nPAIN/C84) were adapted from images provided by Servier \nMedical Art, licensed under CC BY 4.0. The research was funded \nby an MRC Fellowship grant awarded to GAW. (MR/T01072X/1) \nand a Tenovus Scotland Pilot Grant awarded to AHC and GAW \n(S22-17). This work was also funded by the Wellcome Trust (DPhil \nscholarship to AMB, 215145/Z/18/Z) and a Wellcome Investiga- \ntor Grant to D.L.B. (223149/Z/21/Z), as well as the MRC (MR/ \nT020113/1), and with funding from the MRC and Versus Arthritis \nto the PAINSTORM consortium as part of the Advanced Pain \nDiscovery Platform (MR/W002388/1). AMB further \nreceived \na GTC MSDTC Scholarship. ", + "page_start": 12, + "page_end": 12, + "source_file": "pubmed2.pdf" + }, + { + "text": "loss of nonpeptidergic \nnociceptors, we re-analyzed a previous population-specific \ntranscriptomic dataset of mouse DRG neurons following nerve \ninjury for potential upregulation of cell death pathways (Fig. S7, \nhttp://links.lww.com/PAIN/C84).3 We found that early after injury \n(3 days post-SNItrans), nonpeptidergic (MrgDCreERT2-expressing) \nneurons showed enhanced enrichment of GO terms associated \nwith apoptosis, in contrast to a broad population of nociceptors \n(labelled with Scn10aCreERT2), peptidergic nociceptors (Calca- \nCreERT2), C-LTMRs (ThCreERT2), and Ab-RA (rapidly adapting) and \nAd-LTMRs (Ad/Ab-LTMR, Ntrk2CreERT2;AdvillinFlpO), \nin which \nthere was less or no enrichment of cell death pathways. By \n4 weeks, only C-LTMR and Ad/Ab-LTMR subtypes show any \noverrepresentation of cell death pathways (in the populations \nstudied). Both injury-specific and apoptotic signatures in non- \npeptidergic neurons were no longer significantly enriched, \nconsistent with a loss of axotomized nonpeptidergic afferents \nby this late timepoint postinjury. These data suggest \nthat \napoptotic pathways are upregulated acutely after injury in a cell- \ntype-specific manner. ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed2.pdf" + } + ] + }, + { + "references": { + "source_file": "basic-english-language-skills.PDF", + "query": "Does the Oxbridge Academy have a guide on how to apply to college?", + "target_page": 21, + "target_passage": "To make the college registration process easier for you, we’ve compiled a comprehensive guide on how to register at Oxbridge Academy (www.oxbridgeacademy.co.za/enrol-now/).", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "To make the college registration process easier for you, we’ve compiled a \ncomprehensive guide on how to register at Oxbridge Academy \n(www.oxbridgeacademy.co.za/enrol-now/). The guide also includes general \ntips that will be relevant to the application and registration processes at \nother colleges. \n\n**There are 4 steps you need to follow when you want to**\n**register as a student at Oxbridge Academy:**\n\n**1.**Select Your Course \n\n**2.** Fill in Your Student Details \n\n**3.**Select Your Delivery Option \n\n**4.** Pay Your Registration Fee and Send in Your Form ", + "page_start": 20, + "page_end": 20, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Applying for college (www.oxbridgeacademy.co.za/enrol-now/) can be a \ndaunting experience. Not only do you need to choose a course, but you \nalso need to make sure that you: \n• meet the entry requirements \n• meet the deadlines \n• \n• \n• fill in the forms correctly \nsend the forms to the right address \ninclude all the necessary attachments ", + "page_start": 20, + "page_end": 20, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "If you are under the age of 18, your parent or guardian will need to sign \nthis section of the form to state that they are aware of your registration \nwith Oxbridge Academy, and that they do not have any objections. If you \nare unemployed, you will need a guarantor to sign this section of the \nform. Your parent or guarantor will be held responsible if you miss any of \nyour payments in relation to your course fees. ", + "page_start": 25, + "page_end": 25, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "1. Read (and follow) the instructions carefully. \nIf you are an Oxbridge Academy student, the general assignment \nguidelines will be provided in your “Success” Study Guide. Specific \ninstructions will also be included at the beginning of each of your \nassignments. \n\n2. Read the questions carefully. \nMake sure you understand what is being asked of you, so that you \nfocus on answering the right questions, instead of providing irrelevant \ninformation. \n\n3. Remember that presentation is important. \nNeatness, spelling, and the structure of your assignment will all count \ntoward the mark that you receive for your assignment. \n\n4. \nto the assignment questions. \nBut make sure to use your own words – don’t just copy. You need to show \nthe person marking your assignment that you have developed a sound \nunderstanding of the subject. \n\nUse your course material and other external sources to find answers ", + "page_start": 37, + "page_end": 37, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "SEND YOUR REGISTRATION FORM \n\nSend your registration form to the \nregistrations office at Oxbridge Academy via \none of the following channels: \n\nFax: \nPost: \nE-mail: registrar@oxbridgeacademy.co.za \n086 262 5550 \nPO Box 12723, Die Boord, 7613 ", + "page_start": 26, + "page_end": 26, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "If you are an Oxbridge Academy student, we’d like you to know \nthat we are here to help you every step of the way, and that we will \ngive you the opportunity to resubmit your assignments if you don’t \nachieve a pass mark the first time around. ", + "page_start": 36, + "page_end": 36, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Different courses have different registration fees. Please check the course \nfees list (www.oxbridgeacademy.co.za/Documents/ Price-list-2015.pdf) to \nfind out how much you need to pay to register for your chosen course, and \npay this amount using the banking details provided at the bottom of the \nregistration form. Remember to attach your proof of payment. ", + "page_start": 25, + "page_end": 25, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "We are registered with the Department of Higher Education and Training as a Private College in terms of Section \n31(6)(a) of the Continuing Education and Training Act, 2006 (Act No. 16 of 2006). Registration No. 2009/FE07/070. \n\n*Developed for Oxbridge Academy*", + "page_start": 58, + "page_end": 58, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Please make sure to check the accreditation status of your chosen course. \nSome of our courses are non-credit bearing skills development courses, \nwhich are neither accredited by external bodies nor registered on the NQF. \nPlease go to our website:*oxbridgeacademy.co.za*for more \nabout our skills development courses. \n\ninformation ", + "page_start": 21, + "page_end": 21, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "To be successful in your studies, you need to learn how to create \nmeaningful summaries of your course material. This is especially \nimportant if you are a distance learning student (www.oxbridgeacademy. \nco.za/distance-learning/), as you won’t have a teacher or lecturer to \npoint out key concepts, or to give you tips about the types of questions \nyou can expect in the exams. ", + "page_start": 27, + "page_end": 27, + "source_file": "basic-english-language-skills.PDF" + } + ] + }, + { + "references": { + "source_file": "basic-english-language-skills.PDF", + "query": "I have trouble writing effective summaries in English, do you have any tips?", + "target_page": 29, + "target_passage": "To make a good summary, you need to: • Keep it brief. • Make sure to use main headings and keywords. • Focus on the main ideas. • Classify and organise the information in a logical manner. • Use your own words where possible. • Include examples. • Remember that your summaries are there to help you", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "To make a good summary, you need to: \n\n\n \n \n \n \n [html]\n
Keep it brief.
Make sure to use main headings and keywords.
Focus on the main ideas.
Classify and organise the information in a logical manner.
Use your own words where possible.
Include examples.
Remember that your summaries are there to help you.
", + "page_start": 28, + "page_end": 28, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "SUMMARIES \n\nGeneral Tips for Making Summaries \n\n• Underline or highlight key points as you work through your study \n\nmaterial, and make notes. \n\n• When you come across a word or concept you don’t understand, \n\nlook it up in a dictionary, or do some research on the concept, and \nadd your own definition to your summary. ", + "page_start": 31, + "page_end": 31, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "**25**. Zhang Y, Merck D, Tsai EB, Manning CD, Langlotz CP. Optimizing the factual correctness of a summary: a study \nof summarizing radiology reports. arXiv. Preprint posted online November 6, 2019. doi:10.48550/arXiv.1911.02541 \n\n**26**. Mukherjee S, Gamble P, Ausin MS, et al. Polaris: a safety-focused LLM constellation architecture for healthcare. \narXiv. Preprint posted online March 20, 2024. doi:10.48550/arXiv.2403.13313 \n\n**27**. Hegselmann S, Shen SZ, Gierse F, Agrawal M, Sontag D, Jiang X. A data-centric approach to generate faithful \nand high quality patient summaries with large language models. arXiv. Preprint posted online February 23, 2024. \ndoi:10.48550/arXiv.2402.15422 \n\n**28**. Krishna K, Khosla S, Bigham JP, Lipton ZC. Generating SOAP Notes from Doctor-Patient Conversations Using \nModular Summarization Techniques. In: Proceedings of the 59th Annual Meeting of the Association for \nComputational Linguistics and the 11th International Joint Conference on Natural Language Processing (Volume 1: \nLong Papers); 2021. Accessed October 23, 2024. https://aclanthology.org/2021.acl-long.0/ ", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed8.pdf" + }, + { + "text": "29. List 3 methods you can use to summarise your study material. (3) \n\n30. Give 2 examples of how good language skills can benefit your ca- \nreer. (2) \n\n31. Complete the following sentence: ", + "page_start": 57, + "page_end": 57, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "Chin-Yew Lin. 2004. ROUGE: A package for auto- \nmatic evaluation of summaries. In Text Summariza- \ntion Branches Out, pages 74–81, Barcelona, Spain. \nAssociation for Computational Linguistics. ", + "page_start": 9, + "page_end": 9, + "source_file": "arxiv4.pdf" + }, + { + "text": "summaries that outperform standard physician documentation in completeness and error \nfrequency.35 However, factual inconsistencies in the summaries produced by LLMs increase as the \ncontext length increases,36 and for medium- to long-context tasks, fine-tuning an open-source \nmodel has been shown to perform better than a prompt-learning approach.37 In prior work, \nmembers of this study team demonstrated 62% of LLM-generated hospital course summaries met \nstandard-of-care for a formal inpatient discharge summary.24 However, recently published clinical \n\nJAMA Network Open. 2024;7(12):e2448723. doi:10.1001/jamanetworkopen.2024.48723 (Reprinted) ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed8.pdf" + }, + { + "text": "• Write your e-mail in clear and simple language. \n\nDon’t try to sound too formal, and don’t use complicated words \nwhen simple ones would work just fine. As far as possible, write in \nthe active voice. \n\n• Structure your message clearly, and include only the necessary \n\ninformation. \nTake care not to confuse the message by including too many topics \nin one e-mail. Respect your colleagues’ time, and try to keep your \nmessages as short as possible. ", + "page_start": 52, + "page_end": 52, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "To be successful in your studies, you need to learn how to create \nmeaningful summaries of your course material. This is especially \nimportant if you are a distance learning student (www.oxbridgeacademy. \nco.za/distance-learning/), as you won’t have a teacher or lecturer to \npoint out key concepts, or to give you tips about the types of questions \nyou can expect in the exams. ", + "page_start": 27, + "page_end": 27, + "source_file": "basic-english-language-skills.PDF" + }, + { + "text": "lyMail dataset. Each article has 11 human-written \nsummaries and 16 machine-generated summaries \nannotated by 8 people with a score for coherence, \nconsistency, fluency, and relevance. We trans- \nlated it from English to French using DeepL API6. \nSince MTEB evaluation is based on the embedding \nsimilarity between machine-generated and human- \ngenerated summaries, we propose to compute the \nROUGE (Lin, 2004) and BLEU (Papineni et al., \n2002) metrics between machine and human sum- \nmaries for both French and English version. In Ta- \nble 2, we report the average of the scores as well as \ntheir correlations between the two languages. The \ncorrelation is high (above 0.7), showing that the \nword and n-gram overlap between human and ma- \nchine summaries is highly preserved in the French \nversion. One may argue that computing the met- \nric on fully translated texts (human and machine \nsummaries are both translated from English) may \nintroduce biases and not assess the quality of the \ntranslations. For this purpose, we ensure the French \nhuman summaries are correctly translated from En- \nglish. We use an LLM as-a-judge (Zheng et al., ", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv4.pdf" + }, + { + "text": "**41**. Zaretsky J, Kim JM, Baskharoun S, et al. Generative artificial intelligence to transform inpatient discharge \nsummaries to patient-friendly language and format. JAMA Netw Open. 2024;7(3):e240357. doi:10.1001/ \njamanetworkopen.2024.0357 \n\n**42**. Zhou C, Liu P, Xu P, et al. Lima: less is more for alignment. arXiv. Preprint posted online May 18, 2023. doi:10. \n48550/arXiv.2305.11206 ", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed8.pdf" + } + ] + }, + { + "references": { + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf", + "query": "Is exposure to risk factors that may affect mental wellbeing at work comparable across European countries?", + "target_page": 25, + "target_passage": "The country data vary significantly. Sweden, Greece and Luxembourg report over two-thirds such exposures, and Germany, Lithuania and Czechia one-third or less.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "In 2007, 2013 and 2020,**Eurostat**asked employed persons in its ad hoc surveys to the Labour Force \nSurvey (LFS) whether they had**‘… exposure to risk factors that can adversely affect mental well-**\n**being’**.10 In 2007 and 2013, the questions covered four items (time pressure and overload of work, \nviolence or threat of violence, harassment and bullying, other factors). In the 2020 survey,11 ‘Mental \nwell-being’ was operationalised by an additional four response options, resulting in a total of eight \noptions:12 \n\n*1. Severe time pressure or overload of work;*\n*2. Violence or threat of violence;*\n*3. Harassment or bullying;*\n*4. Poor communication or cooperation within the organisation;*\n*5. Having to deal with difficult customers, patients, pupils etc.;*\n*6. Job insecurity;*\n*7. Lack of autonomy, or lack of influence over the work pace or work processes; and*\n*8. Another significant risk factor for mental well-being.*\n\nForty-five per cent of the employed persons reported being exposed to risk factors that can adversely \naffect mental wellbeing. The country data vary significantly. Sweden, Greece and Luxembourg report \nover two-thirds such exposures, and Germany, Lithuania and Czechia one-third or less.13 ", + "page_start": 24, + "page_end": 24, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**List of figures**\nFigure 1: Risk factors present (% of establishments) – ESENER 2014 and 2019................................ 23 \n\nFigure 2: Risk factors that can adversely affect mental wellbeing – EWCS and ESENER ................. 24 \n\nFigure 3: ‘Exposure to risk factors adversely affecting mental wellbeing’ – LFS Ad hoc survey 2020 . 26 \n\nFigure 4: Psychosocial risk factors – Differences between skill groups (Job strain)............................. 27 \n\nFigure 5: Psychosocial risk factors – Differences between skill groups (Psychological demand) ........ 28 \n\nFigure 6: Psychosocial risk factors – Differences between skill groups (Decision authority) ............... 28 \n\nFigure 7: Psychosocial risk factors – Differences between skill groups (Skill discretion) ..................... 29 \n\nFigure 8: Hours worked per week of full-time employment, EU27 – Eurostat ...................................... 31 \n\nFigure 9: Average working time and work during unsocial hours – Eurostat LFS ................................ 32 \n\nFigure 10: Development of work intensity indicators between 1991 and 2015 – Eurofound ................ 33 \n\nFigure 11: Establishment size and ‘Pressure due to time constraints’ – ESENER 2014 and 2019 ...... 34 ", + "page_start": 4, + "page_end": 4, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "14 Eurostat: Persons reporting exposure to risk factors that can adversely affect mental well-being by sex, age and \neducational attainment level \n\n*15 Rigó et al., 2021: Work stress on rise? Comparative analysis of trends in work stressors using the European*\n*working conditions survey*\n16 WHO/ILO, 2021: WHO/ILO joint estimates of the work-related burden of disease and injury, 2000–2016: Global \nmonitoring report (p. 35ff). \n\n*17 Eurostat provide data for the periods before and after the NACE revision in 2008.**Data for 2019:**Average number*\n*of usual weekly hours of work in main job, by sex, professional status, full-time/part-time and economic activity*\n*(from 2008 onwards, NACE Rev. 2), here Filter: Full-time, 15-64 years, all NACE sectors.**Data for 2006:**Average*\n*number of usual weekly hours of work in main job, by sex, professional status, full-time/part-time and economic*\n*activity (1998-2008, NACE Rev. 1.1), here*\n\n18 Eurostat, 2018: How many hours do Europeans work per week? Average number of usual weekly hours of work \nin main job, by sex, professional status, full-time/part-time and economic activity (from 2008 onwards, NACE Rev. \n2) - hours[lfsa_ewhun2], here ", + "page_start": 140, + "page_end": 140, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "7 EU-OSHA, 2007: Expert forecast on emerging psychosocial risks related to occupational safety and health \n8 Eurofound, 2017: Sixth European Working Conditions Survey – Overview report (2017 Update) (p. 48). Raw \ndata for 2015: Eurofound: European Working Conditions Survey - Data Visualisation; Data for 2005: Eurofound: \nFourth European Working Conditions Survey \n9 EU-OSHA: ESENER Data visualisation, Comparisons 2014-2019. \n10 Due to the change of possible response items, the data for the three surveys cannot be compared; the number \nof mental risk factors increased from three in 2007 and 2013 to eight in 2020. \n11 Eurostat, 2021: EU labour force survey 2020 module on accidents at work and other work-related health \nproblems : assessment report : 2021 edition \n\n*12 Eurostat: Persons reporting exposure to risk factors that can adversely affect mental well-being by sex, age and*\n*factor, data here and explanatory metadata here*\n13 It has to be noted that in 2007 and 2013 the interviews were done face-to-face. In 2020 the interviews were \nconducted either face-to-face or by phone, depending on the public health measures in each country. The \nresponses were influenced by work under conditions of the pandemic. ", + "page_start": 140, + "page_end": 140, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**Figure 3: ‘Exposure to risk factors adversely affecting mental wellbeing’ – LFS Ad hoc survey 202014**\n\n", + "page_start": 25, + "page_end": 25, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Concerning the complaints about**poor communication and cooperation**within the organisation, all \nthree Nordic EU Member States are represented in the seven countries with the highest burden, together \nwith several central European countries. This is valid for both selected groupings, ‘All sectors’ and \n‘HHSW’. \n\nRegarding**long or irregular working hours**, we see a mix of countries from all regions. The order of \ncountries in the sector HHSW — a mixture of countries from the East, South and North — is probably \ndue to specific sectoral regulations of working times. Sweden is at the top in HHSW with 57%, followed \nby Denmark, Cyprus, Latvia and Czechia, all between 44% and 48%. \n\nMany analyses of psychosocial risks include**other relevant factors like decision latitude**(or decision \nauthority) and**skill discretion**(level of skill and creativity required on the job). In a long-term analysis \nof the responses to the EWCS between 1995 and 2015, the authors conclude:15 \n\n*‘Our findings suggest that work stress generally increased from 1995 to 2015, and that the increase was*\n*mostly driven by psychological demands. People working in lower-skilled occupations had generally higher*\n*levels of job strain and effort-reward imbalance, as well as they tend to have a steeper increase in job*\n*strain than people working in higher-skilled occupations. Most of the change occurred from 1995 to 2005.’*\n\nAccording to this study, the**differences between the skills groups**are significant, below illustrated for \nthe development of**‘Psychological demands’**and**‘Job strain’**; for these two indicators high-skilled \nand low-skilled manual workers are at the top of the scale. ", + "page_start": 26, + "page_end": 26, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**Wellbeing and satisfaction at work**show similar patterns as health and work accidents and work- \nrelated health issues. Sectors with high physical demands and high customer and client orientation and \noccupations with a lower skill level report lower wellbeing and satisfaction levels; these groups report a \ngood health status — mostly being younger — but fewer expectations to be able to work in this \noccupation until the age of 60. Professions with strong customer and client orientation have lower-than- \naverage wellbeing and satisfaction rates. \n\n**Workers in manual occupations**265 have higher accident rates, lower life expectancy and less \nexpectancy to do the job until age 60.**Administrative workers (clerical, managerial)**have a better \nstatus in the above-mentioned aspects but report a worse health situation. For many items the eastern \nEU Member States — often all of them — report the least positive data. The**healthy worker effect and**\n**cultural differences**— to express not being healthy — probably strongly influence the self-assessment. \n\nConcerning the levels of**self-reported ‘Health at risk’**, the comparison between 2005 and 2015 \nsuggests that the situation has slightly improved for all EU Member States; sector differences remain \nsignificant, but the East-West divide has become much smaller. Still, in some respect eastern and some \nsouthern European countries show worse data compared to central/western and northern European \ncountries. ", + "page_start": 98, + "page_end": 98, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**3.6 Conclusions**\nThe exposure**to psychosocial risks**is increasing, with mental health prevalence still emerging. Major \nwork-related exposures have grown in the past 15 to 25 years that is, time pressure, difficult clients, \nlonger working hours and poor communication. There is also some evidence that countries with over- \naverage employment in sectors like health and care or other human and client-oriented services \n(education, social work, tourism, entertainment) suffer from longer working hours and more mental \nburden. The northern countries are at the top of the countries with highest mental burden. The southern \ncountries have a high share of specific psychosocial risks related to work in tourism and entertainment, \ncharacterised by atypical working times and issues with difficult clients. ", + "page_start": 58, + "page_end": 58, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Please note that Eurostat employment data and ICOH data were retrieved in 2023. Current figures \nmight slightly deviate due to updates and corrections. \n\n**Working conditions – Risk factors at work**\n\n**Shifts in work tasks and workforce between sectors, technological progress and the develop-**\n**ment of higher skill levels**have led to less work in manual occupations and more work in administrative \n(clerical, professional, managerial, etc.) occupations as well as in client-oriented and communicative \noccupations. \n\nConsequently, these developments caused a**shift of risks to psychosocial and emotional**\n**challenges**. This can be documented by the growing percentage of workers who report difficult clients \n(60%), long or irregular working hours (22%), and poor communication in the organisation (18%) (all \ndata from ESENER 2019 or EWCS 2015) The OSH risks for these occupations — gradually but also \nsignificantly — shifted from safety risks to health risks. The psychosocial risks for mental health and the \nemotional challenges increased; they clearly correlate with more work in emotionally demanding and/or \nclient-oriented sectors, be it in tourism, entertainment or education, public transport, social work, or \nhealth and care. ", + "page_start": 9, + "page_end": 9, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "The impact of work — as one essential element of the socioeconomic status — on health was the subject \nof numerous academic studies, often performed as specific case studies. The authors of an overview \nstudy on ‘Cross-country inequality in the EU’ summarise (more references in the original text): \n\n*‘Occupational grade and labour market status are among the factors most often studied in relation to*\n*health and mortality. Occupational grade has been found to be associated with self-rated health, mental*\n*and physical health, such as the presence of long-standing illness and a number of diseases. Lower*\n*occupation might affect health through poor working conditions, such as the higher exposure to*\n*occupational hazards and toxic compounds, health-damaging behaviours and psychosocial stress.*\n*Work-based stress combined with a lack of autonomy over one’s work are believed to be the*\n*psychosocial factors that can cause physiological changes, such as increased risk of cardiovascular*\n*diseases and reduced immune system response. It has been shown that the gaps in mortality between*\n*different occupational grades persist in old age and tend to widen with age.*202 \n\nEurostat provides in the LFS**2020 Ad hoc module**on ‘Accidents at work and other work-related health \nproblems’ a rough overview on such relations, with some specification, for example, for sectors, \nattainment levels, professional status, size of enterprise or occupation. 203 The differences between four \naggregated occupational groups and work-related health problems is shown in the next table. ", + "page_start": 79, + "page_end": 79, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + } + ] + }, + { + "references": { + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf", + "query": "Has the average working week for employees working full-time decreased since 2006?", + "target_page": 31, + "target_passage": ". The statistical data (Eurostat) show a slight decrease of the average weekly working time for full-time employees (15-64 years) from 40.2 to 39.9 hours between 2006 and 2019.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "The length of the daily or weekly working time, its allocation over the 24 hours of a day or at night are \nimportant factors for health and wellbeing. The statistical data (Eurostat) show a slight decrease**of the**\n**average weekly working time for full-time employees**(15-64 years) from 40.2 to 39.9 hours between \n2006 and 2019.22 The data also document slight increases and decreases of work at atypical times \n(response option for frequency: ‘usual’).23 In 2006 and 2019, the following percentages of all employed \npersons worked at atypical times: on**Saturdays**the percentage decreased from 28% to 25%,**working**\n**on Sundays**remained stable at around 13.5%,**working in the evenings**decreased from 19% to 15%, \n**work at night**fell from 7% to 5% and**shift work**increased slightly from 17% to 18%.24 ", + "page_start": 30, + "page_end": 30, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "Eurostat reports for all types of**‘employment at atypical working time’**a minor decrease between \n2011 and 2019, from 38.8% to 37.2% (EU27 average), for all employed workforce and all types of such \natypical time. The data also document slight increases or decreases of the different types of work during \natypical times > on Saturdays the percentage decreased from 28% to 25%, working in the evenings \ndecreased from 19% to 15%, working on Sundays remained stable at around 13.5%, work at night fell \nfrom 7% to 5%, and shift work increased slightly from 17% to 18%. Some**groups of self-employed**\nshow a higher rate of atypical working times: for**high-managerial self-employed**, this rate is 43.2% \nand for**low-managerial self-employed**64.5%. \n\n**Significant differences also exist between eastern/southern and central/northern/western**\n**European countries.**More physical and ergonomic risks (except inactivity) are reported from eastern \nand southern EU Member States but more emotional demands (e.g. difficult clients, poor communication \nand long working hours) in northern and central European countries. One of the major reasons might \nbe the reallocation of industrial production to eastern countries after the EU extension to 24 and later to \n27 Member States. ", + "page_start": 10, + "page_end": 10, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**Figure 9: Average working time and work during unsocial hours – Eurostat LFS**\n\nTwo country examples might illustrate these developments (all data for 2019): Slovakia, a country with \na high share of process-based industries, reports that 15.0% of its workforce is working at night and 29% \nin shifts; for the EU27 this rate is 5.2% respectively and 18.3%.25 Regarding work on Sundays three \nother countries are at the top of the EU27, the Netherlands, Ireland and Spain; they report between 18% \nand 21% (EU27 average = 13.5%); all three countries have an above-average share of sectors like \ntransport, tourism and agriculture.26 \n\nFor all these types of work it should be take into account that other groups of**workers under non-**\n**standard types of employment contracts**(self-employed, agency workers, students, pensioners, \nundeclared workers) might have taken over work at these atypical working times. \n\nConcluding, it can be stated that there is a**slight trend towards a reduction of weekly working hours**\n**for regularly employed**workers, including a stable commuting time. Working hours at atypical times \nshow a mixed picture. Looking at most types of employees,**atypical working time decreased, except**\n**work on Sundays**. For self-employed with employees, the working time at atypical hours is in general \nat a higher level. The number of employees in night work is decreasing. More employees in service and \nclient-related occupations at night or in shifts but also here the atypical times are slightly decreasing. ", + "page_start": 31, + "page_end": 31, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "After that first period between 1991 and 2005,**this development seems to stagnate between 2005**\n**and 2015**.30 The responses ‘Almost all of the time’ or ‘All of the time’ vary only slightly, between 33% \nand 37% depending on year and question (‘Working at high speed’ or ‘Working to tight deadlines’). \n\nDifferences can be seen regarding sector, company size and occupation.**Regarding work intensity**, \nESENER enterprise data on time pressure for the EU27 indicate a slight increase of 2.3% between 2014 \nand 2019 from 43% to 45%.31 Interestingly, according to ESENER, time pressure drastically**increases**\n**with the size of the enterprise**. In enterprises with 5 - 9 employees, 39% report time pressure, and in \nenterprises with above 250 employees 69%. 32 The same applies for long working hours, where \nenterprises with 5 - 9 employees report 19% ‘long working hours’, and in enterprises with above 250 \nemployees this percentage increases to about 39% (EU27, 2019).33 ", + "page_start": 32, + "page_end": 32, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**Work at atypical working times**is in general regarded as a working condition with negative health \nimpact, called**work extensity**. The two major indicators of atypical working times are work at**‘atypical**\n**working times’**and**‘long working hours’**. \n\nEurostat reports for**‘Employment at atypical working time’**20 a minor decrease between 2011 and \n2019, from 38.8% to 37.2% (EU27), for all employed workforce and all types of such atypical time. 21 \nSome**groups of self-employed**show a higher rate of atypical working times but also for most of the \ncategories of self-employed the rates decreased during the period 2011 to 2019.**High managerial self-**\n**employed**had a slight increase from 42.1% to 43.2% in this period. For the**low managerial self-**\n**employed**Eurostat finds a decrease from 69.2% to 64.5%. The figures for**small entrepreneurs**\ndropped slightly from 56.6% to 54.1%, the same applies for employed persons in**personal care work**\nwith a minor change (50.6% to 49.8%).**Agricultural self-employed**had the highest level of such \nworking times; they showed a decrease from 68.4% to 63.4%. ", + "page_start": 30, + "page_end": 30, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "***3.1.1 Working time in hours and at atypical times***\n\n**Too many hours of working time and/or working hours at atypical or unsocial times**can put**the**\n**mental**and**the physical health**of humans at risk. It is also regarded as a major**contributing factor**\n**to work accidents**, due to fatigue or exhaustion.16 \n\nThe main indicator to describe working time is the**number of the weekly average working hours**of \nfull-time employees. However, regarding its impact on health and safety,**other aspects of working**\n**time are of the same relevance**: \n\n• How long is the average working day? \n• At which times and days is this work done (typical, atypical times)? \n• How often do long working hours take place? \n• \n• How flexible are start and end? \n• How intense is the work during this time (breaks, deadlines)? \n• Which groups of workers have standard working times and which do not (e.g. depending on the \n\nIs the work split between two jobs? \n\nsector or the type of contract, e.g. sub-contracted workers or self-employed)? \n\nThere is a**slight trend towards fewer working hours**for full-time**employees**(not ‘Employed persons’) \nin the EU27; between 2006 and 2019 the average weekly working time dropped from 40.2 to 39.9 hours, \na decrease of approximately 15 minutes.17 ", + "page_start": 28, + "page_end": 28, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**Figure 8: Hours worked per week of full-time employment, EU27 – Eurostat**\n\n", + "page_start": 30, + "page_end": 30, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "22 Eurostat Data for 2019: Average number of usual weekly hours of work in main job, by sex, professional status, \nfull-time/part-time and economic activity (from 2008 onwards, NACE Rev. 2). here Filter: Employees, Full-time, All \nNACE, EU27 2019 Q4. \nEurostat Data for 2006: Average number of usual weekly hours of work in main job, by sex, professional status, \nfull-time/part-time and economic activity (1998-2008, NACE Rev. 1.1), here Filter: Employees, Full-time, All \nNACE, EU27 2019 Q4. \n23 Eurostat definition of atypical work: The atypical work distinguishes between “evening or night work”, “Saturday \nor Sunday working”, and “shift work”. \n24 All data were retried from tables in: Labour market > Employment and unemployment (Labour force survey) M \n> LFS series - detailed annual survey results M > Population in employment working during unsocial hours - LFS \nseries \n25 Eurostat: Employed persons working at nights as a percentage of the total employment, by sex, age and \nprofessional status (%) \n26 Eurostat: Employed persons working on Sundays as a percentage of the total employment, by sex, age and \nprofessional status (%) \n27 Fiz Perez et al., 2019: Shift and night work management in European companies \n28 OSHWiki, 2022: Psychosocial issues – the changing world of work \n29 Eurofound, 2003: Time and work: Work intensity \nEurofound, 2009: Working conditions in the European Union: Working time and work intensity \n30 Eurofound, 2017: Sixth European Working Conditions Survey – Overview report (2017 Update) (p. 48). ", + "page_start": 141, + "page_end": 141, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "During the past decades, and especially after 1990, a much**greater variety of such contractual**\n**relations**has emerged. However, in 2019 the conventional employment contract (part- or full-time) still \naccounts for around 86% of the workforce (EU27), they are employees. Seventeen per cent of these \nemployed persons have a part-time contract, 13% of the employees have a temporary contract, or both \ncombined. Nine per cent are self-employed without employees. The remaining 4% are self-employed \nwith employees (employers) and 1% are contributing family workers. The number of self-employed in \nagriculture halved between 2005 and 2019, which is the biggest factor in the reduction of contributing \nfamily workers and the stagnation of the number of self-employed. ", + "page_start": 45, + "page_end": 45, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "In 2007, 3.2% of the respondents reported an accident, in 2013 this fell to 2.8%, and in 2020 2.3% of \nthe ‘Person in labour force’, aged 15-64, responded with a ‘Yes’. This corresponds to a decline of 28% \nfrom 2007 to 2020. The decline of the total estimated number of work accidents shows a similar trend, \na 24% decrease from 5.89 million to 4.46 million (if the persons with more than one accident from the \n2020 survey are not taken into account to achieve a better comparability with 2007 and 2013). \n\nFor 2020,**an estimate of the number of accidents based on the Ad hoc module results in a figure**\n**of 5.24 million**. The number of ESAW-registered non-fatal accidents in 2019 was 3.14 million, \napproximately 60% of the self-reported. One reason for this difference surely is that the respondents to \nthe question in the LFS Ad hoc module**might refer to every work accident**, including those resulting \nin under four days of absence.153 ", + "page_start": 67, + "page_end": 67, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + } + ] + }, + { + "references": { + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf", + "query": "What is the definition of a work accident according to the International Labour Organisation?", + "target_page": 38, + "target_passage": "ILO Definition of accident: ‘An occupational accident is an unexpected and unplanned occurrence, including acts of violence, arising out of or in connection with work, which results in one or more workers incurring a personal injury, disease or death.’", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**3.2 Physical health risks at work**\nRisks at work that can result in physical harm can be divided into**safety**and**health risks**. \n\nThe main result of insufficient safety is a work accident. A**work accident**has as immediate \nconsequences either a personal injury, a disease, or death of one or more workers. Eurostat \ndistinguishes between non-fatal and fatal work accidents, and for the majority of sectors it provides also \nthe duration of the absence due to the accident — an indicator for the severity of the injury. Non-fatal \naccidents at work can cause medium- or long-term health consequences, and in the worst case a \npermanent disability. \n\nILO Definition of accident: ‘An occupational accident is an unexpected and unplanned occurrence, \nincluding acts of violence, arising out of or in connection with work, which results in one or more workers \nincurring a personal injury, disease or death.’51 ", + "page_start": 37, + "page_end": 37, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "***4.1.1 Non-fatal work accidents***\n\n\n \n \n \n \n [html]\n
DEFINITIONS
[ Curotaxt has developed the European Statistics on Accidents at Work, or ESAIR, methodology to harmonise the
Imantamized work accidents. This methodology describes how accidents at work have to be reported and defines [ several terms and conditions ].
| What is an accident?
[ Accident at work ’ is defined in the ESAIN methodology [ 39 ] as a ‘ discrete occurrence in the course of work which ‘ leads to physical or mental harm.’
| When is a non - fatal work accident counted?
ESSNAR counts were accolent it the neuropation of work accumed ( 1 days after the early acceler ). Chapter 4. CE if [ Tw ] fund / behindrating [ 101 / seplans : Incolent alerthore these calender days ( alware for early ). Days full calender days a
[ Exempted are : Commuting accidents, self - infilcted injuries ( e. g. suicides ), and strictly natural causes that injure [ secple at their workplaces ( e. g. earthquakes, floods ).
", + "page_start": 63, + "page_end": 63, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "***4.1.2 Serious non-fatal and fatal work accidents***\n\nEurostat defines a fatal work accident as follows*: ‘A “fatal accident” means an accident which leads to*\n*the death of a victim within one year of the accident’.*160 \nFatal commuting accidents are excluded, or when counted at national level, excluded from the ESAW \ndata. \n\nIn the last decade, most EU Member States registered a**significant decrease of fatal work**\n**accidents**.161 From 2010 to 2019, for the EU27, the**incidence rate of fatal accidents decreased over**\n**all sectors from 2.31 to 1.74**, or a minus of 25%. In the period between 2010 and 2019 the sectoral \nfigures of five major sectors developed as follows: ", + "page_start": 70, + "page_end": 70, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "International data show the**comparatively low level of work accidents in the EU**. Other countries like \nthe United States showed a similar development during this period. 124 While it is estimated that work \naccidents contribute worldwide to 19% of all work-related deaths, this figure is 5% for the EU27. When \ncounting DALYs, the work-related injuries account for 17% of all DALYS for injuries and diseases in the \nEU27, and for 29% globally.125 \n\nIt is evident that**better technical and organisational prevention at workplaces**contributed to this \nstrong reduction of accidents;**prominent examples**of**such improvements**are: ", + "page_start": 61, + "page_end": 61, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**Work accidents**are probably the**most widely used indicator**for assessment of the effectiveness of \nthe OSH systems and the working conditions in general, also in a broader public; thus, this report will \ntackle this topic more extensively than other topics. Work accidents are regarded as a result of \n**insufficient safety prevention**.**Occupational and work-related diseases**are regarded as**short- or**\n**long-term outcomes**of all disease-generating circumstances or exposures at work, caused by any \ntype of material or substance, by unhealthy physical activity or unhealthy inactivity, or by disease- \ncausing aspects of human interaction at work. Occupational and work-related diseases are categorised \nand assessed by experts, particularly by medical professions.**Wellbeing**is the newest concept, \ncovering the individual or group perception of the working conditions. \n\nThe**presence of risk factors**and — if possible — the**level of exposure**makes up the largest block \nof datasets in the OSH Barometer that is used to assess working conditions. ", + "page_start": 60, + "page_end": 60, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**Table 18: People reporting an accident by group of occupations (ISCO) – LFS Ad hoc 2020156**\n\n\n \n \n \n \n [html]\n
Self - reported work accidents2020
Managers, professionals, technicians and associate professionals1.5 %
Clerical support workers, service and sales workers2.1 %
Skilled agricultural, forestry and fishery workers, craft and related trades workers4.1 %
Plant and machine operators and assemblers, elementary occupations3.4 %
Total2.3 %
", + "page_start": 68, + "page_end": 68, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "There have always been concerns in national or sectoral case studies about**underreporting of work**\n**accidents**for different reasons: accidents suffered by self-employed who are not obliged to notify or \nare insured via private or non-occupational public health insurances, work-related traffic accidents that \nare reported as traffic accidents only, declaration of less severe accidents as private to avoid \nadministrative burden, administrative burden in general. This leads to several approaches to estimate \nthe true number of accidents at work. Currently, these estimates result in figures of around 5.45 million \nwork accidents at EU27 level in 2019 for all economic sectors and all types of employment. That means \nthat the reported 3.14 million accidents represent approximately 57.5% of all work accidents resulting in \nmore than three days of absence, while 42.5% are not reported. \n\nThe pure distinction between fatal and non-fatal work accidents does not reveal that a very large part of \nthe human and financial burden is caused**by severe but not fatal accidents**. In 2019, 232,892 work \naccidents resulted in an absence of more than three months or caused a permanent disability, compared \nto 3,008 fatal accidents (NACE Rev. 2 activity A, C-N). That is, in addition to every worker who dies, \nanother 77 suffer injuries resulting in at least three months off work or in permanent disability. ", + "page_start": 11, + "page_end": 11, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "ESAW provides more detailed data about the**severity of non-fatal accidents**. 164 According to \nEurostat’s evaluation of ‘Causes and circumstances’ of work accidents (**data from 2005, EU-15 and**\n**Norway**), in 2005, 3.9% of the non-fatal work accidents or 157,494 non-fatal accidents led to**permanent**\n**incapacity**(full or partly), and 138,568 (3,4% of all accidents) to absences from three to six months. 165 \n**In 2019**, the**outcome**‘Permanent incapacity or 183 days*(of time-off)*or over’**made up 4.4% of all**\n**non-fatal work accidents or a little more than 100,000 cases**.**As serious outcomes**we regard at \nleast the cases in the ESAW category: non-fatal accidents involving these consequences are more than \n**34 times more frequent than fatalities**. These detailed time-off and outcome data are only available \nfor the sectors A and C-N, not for the other sectors with lower accident rates. If we include in the \ndefinition of a serious accident also the**ESAW category ‘Time off between 3 and 6 months’, another**\n**5.4% or 129,150 non-fatal accidents**would be added to the category ‘Serious accident’. ", + "page_start": 71, + "page_end": 71, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "**Accidents at work**\n\n**Accidents at work**are the most common indicator regarding the quality of prevention in an enterprise, \na sector or a country. Between 1998 and 2019 (EU level),**the incidence**rate of**non-fatal work**\n**accidents**fell about 58%, from 4,089 to 1,713. Most of this decrease took place in the first half of this \ndecade. Between 1998 and 2008, the incidence rate fell by 54%, and between 2009 and 2019 by 9%. \n\nBetween 1998 and 2019, the**incidence rate for fatal accidents**dropped about 57% from 5.03 to 2.17, \nalmost the same decrease as for non-fatal accidents. \n\nFour major sectors,**agriculture, manufacturing, construction and transport**, employed just under \n40% of the workforce (in 1998 as well as in 2019). However, in 1998, more than 60% of the accidents \nat work took place in these sectors, thus the reduction of accidents in these sectors was crucial for the \noverall reduction. In addition, economic developments — sector decline and shift of workforce between \nsectors — reduced the number of workers exposed to common safety risks in these sectors. ", + "page_start": 11, + "page_end": 11, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "If an accident takes place, the technical and organisational measures were either not perfect for all \nconceivable situations or not fully implemented. Based on ESAW, Eurostat analysed the**physical**\n**activities per sector**that trigger non-fatal and fatal accidents at work in the EU27 (in 2019).127 ", + "page_start": 62, + "page_end": 62, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + } + ] + }, + { + "references": { + "source_file": "infographic5.pdf", + "query": "Was knowledge domain agnosticism a goal in the development of OLAF?", + "target_page": 1, + "target_passage": "Though an ideal ontology should model a domain in an application-independent manner, in practice, concepts and relations represented largely depend on one or more business use cases. As we designed our framework with industry application in mind, we need to consider it within its real-world usage context.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**OLAF : Ontology Learning Applied Framework**\nMarion SCHAEFFER (marion.schaeffer@insa-rouen.fr) - Matthias SESBOUE (matthias.sesboue@insa-rouen.fr) \nJean-Philippe KOTOWICZ - Nicolas DELESTRE - Cecilia ZANNI-MERK ", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "Among the most difficult problems in knowledge representation are the breadth of commonsense \nknowledge (the set of atomic facts that the average person knows is enormous);[29] and the sub-symbolic \nform of most commonsense knowledge (much of what people know is not represented as \"facts\" or \n\"statements\" that they could express verbally).[16] There is also the difficulty of knowledge acquisition, \nthe problem of obtaining knowledge for AI applications.[c] ", + "page_start": 1, + "page_end": 1, + "source_file": "wikipedia3.pdf" + }, + { + "text": "pp. 190–191) \n\n373. Dreyfus' critique of AI: Dreyfus (1972), Dreyfus & Dreyfus (1986) Historical significance and \n\nphilosophical implications: Crevier (1993, pp. 120–132), McCorduck (2004, pp. 211–239), \nRussell & Norvig (2021, pp. 981–982), Fearn (2007, chpt. 3) \n\n374. Crevier (1993), p. 125. \n375. Langley (2011). \n376. Katz (2012). \n377. Neats vs. scruffies, the historic debate: McCorduck (2004, pp. 421–424, 486–489), Crevier \n(1993, p. 168), Nilsson (1983, pp. 10–11), Russell & Norvig (2021, p. 24) A classic example \nof the \"scruffy\" approach to intelligence: Minsky (1986) A modern example of neat AI and its \naspirations in the 21st century: Domingos (2015) \n\n378. Pennachin & Goertzel (2007). \n379. Roberts (2016). \n380. Russell & Norvig (2021), p. 986. \n381. Chalmers (1995). \n382. Dennett (1991). \n383. Horst (2005). \n384. Searle (1999). \n385. Searle (1980), p. 1. \n386. Russell & Norvig (2021), p. 9817. ", + "page_start": 49, + "page_end": 49, + "source_file": "wikipedia3.pdf" + }, + { + "text": "170. Clocksin & Mellish 2003, pp. 237–238, 252–255, 257, The Relation of Prolog to Logic; \n\nDaintith & Wright 2008, Logic Programming Languages (https://www.encyclopedia.com/com \nputing/dictionaries-thesauruses-pictures-and-press-releases/logic-programming-languages). \n\n171. O'Regan 2016, p. 49; Calderbank & Sloane 2001, pp. 768. \n172. Daintith & Wright 2008, Logic Gate (https://www.encyclopedia.com/computing/dictionaries-th \n\nesauruses-pictures-and-press-releases/logic-gate). \n\n173. Janssen & Zimmermann 2021, pp. 3–4; Partee 2016; King 2009, pp. 557–8; Aloni & Dekker \n\n2016, pp. 22–23 (https://books.google.com/books?id=ltSgDAAAQBAJ&pg=PT22). \n\n174. Warren 2020, 6. The Epistemology of Logic; Schechter. \n175. Warren 2020, 6. The Epistemology of Logic. \n176. Schechter. \n177. Gómez-Torrente 2019. \n178. Warren 2020, 6. The Epistemology of Logic; Gómez-Torrente 2019; Warren 2020, 1. What is ", + "page_start": 23, + "page_end": 23, + "source_file": "wikipedia1.pdf" + }, + { + "text": "Yu Sun, Shuohuan Wang, Yukun Li, Shikun Feng, \nXuyi Chen, Han Zhang, Xin Tian, Danxiang \nZhu, Hao Tian, and Hua Wu. 2019b. ERNIE: \nEnhanced Representation through Knowledge \nIntegration. arXiv:1904.09223 [cs]. James Yi Tian, Alexander P Kreuzer, Pai-Hung \nChen, and Hans-Martin Will. 2019. WaL- \nDORf: Wasteless Language-model Distillation ", + "page_start": 19, + "page_end": 19, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "We designed the proposed framework focusing on**automation**with very little, if any, human involvement in mind. Unlike most existing approaches, \nparticular attention is brought to the**learned ontology final production use case**. We implement the framework as an open-source and open- \naccess python library. We aim to**gather feedback and grow a community**to develop and test multiple algorithms. Various satellite tools could be \ndeveloped to enhance the framework implementation. However, we should focus on developing**axiom extraction**and**automatic ontology**\n**evaluation**. One exciting research area might be the adaptation of the software industry's \"DevOps\" concepts to knowledge management. The latter \nfield is known as \"SemOps\". ", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "The*epistemic approach*to informal logic, on the other hand, focuses on the epistemic role of \narguments.[148] It is based on the idea that arguments aim to increase our knowledge. They achieve this \nby linking justified beliefs to beliefs that are not yet justified.[149] Correct arguments succeed at \nexpanding knowledge while fallacies are epistemic failures: they do not justify the belief in their \nconclusion.[150] For example, the fallacy of begging the question is a*fallacy*because it fails to provide \nindependent justification for its conclusion, even though it is deductively valid.[151] In this sense, logical \nnormativity consists in epistemic success or rationality.[149] The Bayesian approach is one example of an \nepistemic approach.[152] Central to Bayesianism is not just whether the agent believes something but the \ndegree to which they believe it, the so-called*credence*. Degrees of belief are seen as subjective \nprobabilities in the believed proposition, i.e. how certain the agent is that the proposition is true.[153] On \nthis view, reasoning can be interpreted as a process of changing one's credences, often in reaction to new ", + "page_start": 12, + "page_end": 12, + "source_file": "wikipedia1.pdf" + }, + { + "text": "14. Uncertain reasoning: Russell & Norvig (2021, chpt. 12–18), Poole, Mackworth & Goebel \n\n(1998, pp. 345–395), Luger & Stubblefield (2004, pp. 333–381), Nilsson (1998, chpt. 7–12) \n15. Intractability and efficiency and the combinatorial explosion: Russell & Norvig (2021, p. 21) \n16. Psychological evidence of the prevalence of sub-symbolic reasoning and knowledge: \n\nKahneman (2011), Dreyfus & Dreyfus (1986), Wason & Shapiro (1966), Kahneman, Slovic \n& Tversky (1982) \n\n17. Knowledge representation and knowledge engineering: Russell & Norvig (2021, chpt. 10), \nPoole, Mackworth & Goebel (1998, pp. 23–46, 69–81, 169–233, 235–277, 281–298, 319– \n345), Luger & Stubblefield (2004, pp. 227–243), Nilsson (1998, chpt. 17.1–17.4, 18) \n\n18. Smoliar & Zhang (1994). \n19. Neumann & Möller (2008). \n20. Kuperman, Reichley & Bailey (2006). ", + "page_start": 30, + "page_end": 30, + "source_file": "wikipedia3.pdf" + }, + { + "text": "This tutorial is just the entry point to a technology that is entering the*Slope of Enlightenment*in the \nGartner technology hype cycle [Gartner Hype Cycle]. Tim Berners-Lee published his paper on the \nSemantic Web [Berners-Lee 2001] way back in 2001. At least in my experience for most large US \ncorporations the excitement around Machine Learning seemed for a while to eclipse serious interest in \nOWL, SPARQL, and other Semantic Web technologies in the United States. Then influential technology \ncompanies such as Google [Singhal 2012], Facebook [Olanof 2013], and Amazon [Neptune 2017] started \nto embrace the technology using the term Knowledge Graphs [Noy 2019] and the corporate world is \nfinally realizing that machine learning and knowledge graphs are complimentary not competitive \ntechnologies. \n\nThe term knowledge graph itself can be used in different ways. The best definition I’ve heard is that an \nontology provides the vocabulary (i.e., essentially the T-Box) and a knowledge graph is an ontology \ncombined with data (A-Box). Although in the corporate world I often hear people simply talk about \nknowledge graphs without much interest in the distinction between the vocabulary and the data. ", + "page_start": 88, + "page_end": 88, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "3.3 World knowledge \n\nThe bulk of evidence about commonsense knowl- \nedge captured in BERT comes from practitioners \nusing it to extract such knowledge. One direct prob- \ning study of BERT reports that BERT struggles \nwith pragmatic inference and role-based event \nknowledge (Ettinger, 2019). BERT also struggles \nwith abstract attributes of objects, as well as visual \nand perceptual properties that are likely to be as- \nsumed rather than mentioned (Da and Kasai, 2019). \nThe MLM component of BERT is easy to \nadapt for knowledge induction by filling in the Furthermore, different probing methods may \nlead to complementary or even contradictory con- \nclusions, which makes a single test (as in most stud- ", + "page_start": 2, + "page_end": 2, + "source_file": "arxiv2_taclccby4_license.pdf" + } + ] + }, + { + "references": { + "source_file": "infographic5.pdf", + "query": "Is OLAF a specific strategy for ontological learning or is it a toolbox of different strategies?", + "target_page": 1, + "target_passage": "Our vision is to implement a toolbox of methods we can gather to build pipelines. ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**OLAF : Ontology Learning Applied Framework**\nMarion SCHAEFFER (marion.schaeffer@insa-rouen.fr) - Matthias SESBOUE (matthias.sesboue@insa-rouen.fr) \nJean-Philippe KOTOWICZ - Nicolas DELESTRE - Cecilia ZANNI-MERK ", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "Since the beginning of the century, research on ontology learning has gained popularity. Automatically**extracting and structuring knowledge**\nrelevant to a domain of interest from unstructured data is a major scientific challenge. We propose a new approach with a**modular ontology**\n**learning framework**considering tasks from data pre-processing to axiom extraction. Whereas previous contributions considered ontology learning \nsystems as tools to help the domain expert, we developed the proposed framework with**full automation**in mind. An implementation as an**open-**\n**source and collaborative python library**is available at https://gitlab.insa-rouen.fr/msesboue/ontology-learning. ", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/351037551 \n\nA Practical Guide to Building OWL Ontologies Using Protégé 5.5 and Plugins \n\n**Preprint**· April 2021 \n\nCITATIONS \n0 READS \n36,030 ", + "page_start": 0, + "page_end": 0, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "We designed the proposed framework focusing on**automation**with very little, if any, human involvement in mind. Unlike most existing approaches, \nparticular attention is brought to the**learned ontology final production use case**. We implement the framework as an open-source and open- \naccess python library. We aim to**gather feedback and grow a community**to develop and test multiple algorithms. Various satellite tools could be \ndeveloped to enhance the framework implementation. However, we should focus on developing**axiom extraction**and**automatic ontology**\n**evaluation**. One exciting research area might be the adaptation of the software industry's \"DevOps\" concepts to knowledge management. The latter \nfield is known as \"SemOps\". ", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "Cimiano P, Völker J. Text2Onto. Natural Language Processing and Information Systems. Berlin, Heidelberg: Springer Berlin Heidelberg; 2005.p. 227-238. ISBN: 978-3-540-32110-1 \nDrymonas E, Zervanou K, Petrakis EGM. Unsupervised Ontology Acquisition from Plain Texts: The OntoGain System. Natural Language Processing and Information Systems. Berlin, Heidelberg: \nSpringer Berlin Heidelberg; 2010. p. 277-87. ISBN: 978-3-642-13881-2 \nPaola Velardi, Stefano Faralli, Roberto Navigli; OntoLearn Reloaded: A Graph-Based Algorithm for Taxonomy Induction. Computational Linguistics 2013; 39 (3): 665–707. DOI: \n10.1162/COLI_a_00146 \nMuhammad Nabeel Asim, Muhammad Wasim, Muhammad Usman Ghani Khan, Waqar Mahmood, Hafiza Mahnoor Abbasi, A survey of ontology learning techniques and applications, \nDatabase, Volume 2018, 2018, bay101, DOI: 10.1093/database/bay101 ", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "Neumann, Bernd; Möller, Ralf (January 2008). \"On scene interpretation with description logics\". \n*Image and Vision Computing*.**26**(1): 82–101. doi:10.1016/j.imavis.2007.08.013 (https://doi. \norg/10.1016%2Fj.imavis.2007.08.013). S2CID 10767011 (https://api.semanticscholar.org/Co \nrpusID:10767011). \n\nNilsson, Nils (1995), \"Eyes on the Prize\",*AI Magazine*, vol. 16, pp. 9–17 ", + "page_start": 60, + "page_end": 60, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Yu Sun, Shuohuan Wang, Yukun Li, Shikun Feng, \nXuyi Chen, Han Zhang, Xin Tian, Danxiang \nZhu, Hao Tian, and Hua Wu. 2019b. ERNIE: \nEnhanced Representation through Knowledge \nIntegration. arXiv:1904.09223 [cs]. James Yi Tian, Alexander P Kreuzer, Pai-Hung \nChen, and Hans-Martin Will. 2019. WaL- \nDORf: Wasteless Language-model Distillation ", + "page_start": 19, + "page_end": 19, + "source_file": "arxiv2_taclccby4_license.pdf" + }, + { + "text": "Most ontology learning systems do not consider the targeted ontology- \nbased system. Though an ideal ontology should model a domain in an \napplication-independent manner, in practice,**concepts and relations**\n**represented largely depend on one or more business use cases**. As \nwe designed our framework with industry application in mind, we need \nto consider it within its**real-world usage context**. ", + "page_start": 0, + "page_end": 0, + "source_file": "infographic5.pdf" + }, + { + "text": "This chapter describes how to create an ontology of Pizzas. We use Pizzas because it is something almost \neveryone is familiar with. \n\n**Exercise 1: Create a new OWL Ontology**\n\n__ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ____ ___", + "page_start": 10, + "page_end": 10, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "[130] Yu Sun, Shuohuan Wang, Yukun Li, Shikun Feng, Xuyi Chen, Han Zhang, \nXin Tian, Danxiang Zhu, Hao Tian, and Hua Wu. 2019. ERNIE: Enhanced \nRepresentation through Knowledge Integration. arXiv:1904.09223 [cs.CL] \n[131] Yu Sun, Shuohuan Wang, Yu-Kun Li, Shikun Feng, Hao Tian, Hua Wu, and \nHaifeng Wang. 2020. ERNIE 2.0: A Continual Pre-Training Framework for \nLanguage Understanding. In The Thirty-Fourth AAAI Conference on Artificial \nIntelligence, AAAI 2020, The Thirty-Second Innovative Applications of Artificial \nIntelligence Conference, IAAI 2020, The Tenth AAAI Symposium on Educational ", + "page_start": 12, + "page_end": 12, + "source_file": "arxiv5_ccby4license.pdf" + } + ] + }, + { + "references": { + "source_file": "infographic5.pdf", + "query": "Is Text2Onto still updated nowadays?", + "target_page": 1, + "target_passage": "But it is not maintained since 2011.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Note: this document may get updates frequently. It is a good idea to check my blog at: \nhttps://www.michaeldebellis.com/post/new-protege-pizza-tutorial to make sure you have the latest \nversion. \n\nIf you have questions or comments feel free to contact me at mdebellissf@gmail.com ", + "page_start": 1, + "page_end": 1, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "**Availability**\n\nThe information in this article is applicable to the following versions of Word. \n\nWord for Windows Version 2408 and later. \n\nWord for Mac Version 16.89 and later. \n\nWord for iOS Version 2.89 and later. \n\nWord for Android Build 16.0.18025.XXXXX or later. \n\nWord for the web Build 16.0.18025.XXXXX or later. \n\nIt is available to customers with Office 2024 or Office LTSC 2024 and to customers with a \n\nMicrosoft 365 subscription on Current Channel or Monthly Enterprise Channel. For \n\ncustomers with a Microsoft 365 subscription on Semi-Annual Enterprise Channel it will \n\nbe available on January 14, 2025. ", + "page_start": 60, + "page_end": 60, + "source_file": "office-pdf.pdf" + }, + { + "text": "\n\nIOO- \n\ngo- \n\n00- \n\n70- \n\n60- \n\n50- \n\n40- \n\n30- \n\n20- \n\nIO- \n\nOr \n0 ", + "page_start": 258, + "page_end": 258, + "source_file": "00-80T-80.pdf" + }, + { + "text": "\n\nWIRELESS \nVOICE & DATA ", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "\n\nWIRELESS \nVOICE & DATA ", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "**13.4 Software update**\n\nThis section describes the operations to update your Storwize V7000 software to V8.1. \n\nThe format for the software update package name ends in four positive integers that are \nseparated by dots. For example, a software update package might have the following name: \n\nIBM_2145_INSTALL_8.2.1.0 \n\n**13.4.1 Precautions before the update**\n\nThis section describes the precautions that you should take before you attempt an update. \n\n\n \n \n \n \n [html]\n
Important : Before you attempt any IBM Storwize V7000 code update, read and
understand the Storwize VT000 concurrent compatibility and code cross - reference matrix.
For more information, see this website and click Latest Storwize V7000 code.
", + "page_start": 708, + "page_end": 708, + "source_file": "sg247938.pdf" + }, + { + "text": "The operation is successful. If you do not specify task=\"update\" in the input XML file, you \nsee a message that indicates that the object exists, as shown in bold in Example 3-5. In this \nscenario, user User1 is not updated with the new query restriction. \n\n*Example 3-5 Output of updating the user without using task=“update”*\n\n\n \n \n \n \n [html]\n
ARS68221 Attempt ing_1ogin_for_userid' User1 '
on serverodserver \" Updatingapp1icationGroup,
", + "page_start": 99, + "page_end": 99, + "source_file": "sg246915.pdf" + }, + { + "text": "***Figure 15. Sign out screen***\n\n", + "page_start": 12, + "page_end": 12, + "source_file": "maiis-user-manual.pdf" + }, + { + "text": "Figure 13-16 New V8.1 update pause options \n\n7. After the update packages upload, the update test utility looks for any known issues that \nmight affect a concurrent update of your system. Click**Read more**(see Figure 13-17 on \npage 692). ", + "page_start": 712, + "page_end": 712, + "source_file": "sg247938.pdf" + }, + { + "text": "***Figure 16. Sign out screen***\n\n", + "page_start": 12, + "page_end": 12, + "source_file": "maiis-user-manual.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_RCI_2013.pdf", + "query": "What was the proportion of revenue generated by wireless telecommunications operations in 2009?", + "target_page": 91, + "target_passage": "6,685", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Results of Continuing Operations**\n\n**2003 compared to 2002**\n\nTotal revenue was $105.9 million in 2003, an increase of $12.9 million or 13.9%. Total revenues included $70.0 \nmillion of wireless revenues, an increase of $12.0 million or 20.7%; wireline revenues of $29.0 million, an increase of \n$0.3 million or 0.9%; and other revenues of $7.0 million, an increase of $0.6 million or 9.7%. \n\nWithin wireless revenues, the PCS operation contributed $69.8 million, an increase of $11.6 million, or 20.8%. PCS \nservice revenues were $44.4 million, an increase of $10.9 million or 32.4%. Service revenue growth was driven by the \nincrease in subscribers, totaling 85,139 at December 31, 2003, an increase of 17,297 or 25.5%, compared to 67,842 \nsubscribers at year-end 2002. The company had churn of 2.1% in 2003 compared to 2.8% in 2002. The decline in the \nchurn rate is the result of tightening the credit screening for new subscribers as well as continued efforts to improve the \nafter sales support. Competition in the wireless industry continues to have a significant impact on the results of the \nCompany’s PCS operation. ", + "page_start": 46, + "page_end": 46, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**ADJUSTED OPERATING PROFIT**\n($ IN BILLIONS) \n**2013 REVENUE**\n$12.7 billion \n\nWIRELESS**57%** **5.0**\n\n$12.7 \nCABLE**27%**\n**4.8**\nBILLION \n\nMEDIA**13%**\nBUSINESS \nSOLUTIONS**3%**\n**4.7**", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "**CONTINUING OPERATIONS**\n\n**2002 compared to 2001**\n\nTotal revenue was $93.0 million in 2002, an increase of $24.3 million or 35.3%. Total revenues included $57.9 million \nof wireless revenues, an increase of $21.7 million or 60.2%; wireline revenues of $28.7 million, an increase of $1.3 \nmillion or 4.6%; and other revenues of $6.4 million, an increase of $1.2 million or 24.5%. \n\nWithin wireless revenues, the PCS operation contributed $55.5 million, an increase of $21.4 million, or 63.0%. PCS \nservice revenues were $37.4 million, an increase of $18.3 million or 95.7%. The increase in the subscriber base, which \ntotaled 67,842 at December 31, 2002, was an increase of 20,524 or 43% from the prior year end. \n\nPCS travel revenue, which is compensation between Sprint and its PCS Affiliates for use of the other party’s network, \nwas $16.5 million, an increase of $2.9 million or 21.3%. Travel revenue is impacted by the geographic size of the \nCompany’s network service area, the overall number of Sprint wireless customers, and the travel exchange rate. The \nrate received on travel was $0.10 per minute in 2002. The rates in 2001 were $0.20 per minute from January 1, 2001 \nthrough April 30, 2001; $0.15 per minute from May 1, 2001 through September 30, 2001; and $0.12 per minute from \nOctober 1, 2001 through December 31, 2001. ", + "page_start": 50, + "page_end": 50, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "Data revenue was 17% higher \nthe \ncontinued penetration and growing use of smartphones, tablet devices \nand wireless laptops, which increased the use of e-mail, wireless, \nInternet access, text messaging and other wireless data services. Data \nrevenue represented approximately 47% of total network revenue this \nyear, compared to approximately 41% last year. \n\nthis year mainly because of \n\n*Lower Equipment Sales*\nEquipment sales (net of subsidies) include revenue from sales to: \n(cid:129) independent dealers, agents and retailers \n(cid:129) directly to subscribers through fulfillment by Wireless’ customer \nPostpaid churn was 1.24% this year, compared to 1.29% in 2012. The \nlower churn rate is partly attributable to the new simplified plans and \nthe roaming plans we introduced. \nservice groups, websites, telesales and corporate stores. \n\nRevenue from equipment sales was lower this year, mainly because \nfewer existing subscribers upgraded their devices and there were fewer \ngross activations. \n\nGross postpaid subscriber additions were 1.4 million this year, or 3% \nlower than last year, which reduced net postpaid subscriber additions to \n228,000, despite a lower postpaid churn. We believe the industry \ntransition from three year to two year plans resulting from the recent \nadoption of the Canadian Radio-television and Telecommunications \nCommission (CRTC) Wireless Code may have slowed our overall \nwireless subscriber growth from the second half of the year. See \n“Regulation in Our Industry” for more information on the Wireless \nCode. ", + "page_start": 43, + "page_end": 43, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "**Operating Revenue**\nWireless network revenue was higher than last year because of higher \nadoption and usage of wireless data services, partially offset by the \nintroduction of lower priced roaming plans and pricing changes made \nover this year. \n\nCable operating revenue was higher than last year mainly because of \ngrowth in Internet and phone revenues and the acquisition of Mountain \nCable, partially offset by a decline in television revenue related \nprincipally from competitive TV subscriber losses. \n\nBusiness Solutions operating revenue was higher than last year mainly \nbecause we completed the acquisitions of Blackiron Data and Pivot \nData Centres earlier this year combined with the continued growth in \non-net and next generation services, partially offset by planned decline \nin legacy voice and data services. \n\nMedia operating revenue was higher than last year mainly because of \nrevenue growth at Sportsnet, higher attendance at Toronto Blue Jays \ngames and higher sales at The Shopping Channel. \n\n**Adjusted Operating Profit**\nWireless adjusted operating profit was higher this year because of \nhigher network revenue, our continued cost management and \nproductivity initiatives implemented across various areas and lower cost \nof equipment. \n\nCable adjusted operating profit was higher than last year because of \nthe continued growth in revenue combined with a shift in our product \nmix towards higher margin Internet and phone products. \n\nMedia’s adjusted operating profit was lower compared to last year. The \nincrease in operating revenue this year was more than offset by the \ncombined impact of higher player salaries at the Toronto Blue Jays, the \nNHL player lockout in 2012 and the costs associated with broadcasting \nmore NHL hockey games in 2013 because of the condensed 2012-2013 \nseason which started in January 2013 and the compressed 2013-2014 \nseason schedule associated with the upcoming winter Olympics. \n\nAdjusted operating profit relating to Corporate items and intercompany \neliminations was lower compared to last year because of continued \ninvestment in growth initiatives such as Rogers’ credit card, Outrank, \nRogers Alerts and other digital opportunities. ", + "page_start": 39, + "page_end": 39, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "The Company reports revenues as wireless, wireline and other revenues. These revenue classifications are defined as \nfollows: Wireless revenues are made up of the Personal Communications Company (a PCS Affiliate of Sprint), and the \nMobile Company. Wireline revenues include the following subsidiary revenues in the financial results: Telephone \nCompany, Network Company, Cable Television Company, and the Long Distance Company. Other revenues are \ncomprised of the revenues of ShenTel Service Company, the Leasing Company, ShenTel Communications Company \nand the Holding Company. For additional information on the Company's business segments, see Note 14 to audited \nconsolidated financial statements appearing elsewhere in this report. \n\nThe Company participates in the telecommunications industry, which requires substantial investment in fixed assets or \nplant. This significant capital requirement may preclude profitability during the initial years of operation. The strategy \nof the Company is to grow and diversify the business by adding services and geographic areas that can leverage the \nexisting plant, but to do so within the opportunities and constraints presented by the industry. For many years the \nCompany focused on reducing reliance on the regulated telephone operation, which up until 1981 was the primary \nbusiness within the Company. This initial diversification was concentrated in other wireline businesses, such as the \ncable television and regional fiber facility businesses, but in 1990 the Company made its first significant investment in \nthe wireless sector through its former investment in the Virginia 10 RSA Limited partnership. By 1998, revenues of \nthe regulated telephone operation had decreased to 59.2% of total revenues. In that same year more than 76.6% of the \nCompany’s total revenue was generated by wireline operations, and initiatives were already underway to make wireless \na more significant contributor to total revenues. ", + "page_start": 40, + "page_end": 40, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**ADJUSTED OPERATING PROFIT BY SEGMENT**\n(IN MILLIONS OF DOLLARS) **REVENUE BY SEGMENT**\n(IN MILLIONS OF DOLLARS) \n\n**2013** **$161** **$106** **$1,718** **$3,157** **2013**\n\n2012 $190 $89 $1,605 $3,063 2012 $1,620 $351 $3,358 $7,280 \n\n2011 $180 $86 $1,549 $3,036 2011 $1,611 $405 $3,309 $7,138 \n\nMedia Business Solutions Cable Wireless Media Business Solutions Cable Wireless ", + "page_start": 31, + "page_end": 31, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "2013 CONSOLIDATED REVENUE AND ADJUSTED OPERATING PROFIT PROFILE \n\n**REVENUE** **ADJUSTED OPERATING PROFIT**\n\nWIRELESS**57%**\n\n$12.7 $5.0 \n\nCABLE**27%**\n\nBILLION BILLION \n\nMEDIA**13%**\nBUSINESS SOLUTIONS**3%**", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Wireless revenues included tower leases of $2.6 million, an increase of $0.5 million or 24.8%. The increase was the \nresult of other wireless carriers executing additional leases to use space on the Company’s portfolio of towers. Of the \n88 towers and poles owned by the Company as of December 31, 2003, 52 towers have one or more external tenants, \ncompared to 46 towers with external tenants at the end of 2002. \n\nWireless revenues from the Company’s paging operation were $0.2 million, a decrease of $0.1 million as the customer \nbase increasingly chose alternative wireless services. Paging service subscribers declined by 32.3% in 2003 from \n2,940 subscribers to 1,989 subscribers. The paging operation continues to decline as more areas are covered by \nwireless voice services, which have features that surpass those of paging technologies. The Company anticipates that \nits paging customer base will continue to decline in the future. \n\nWithin wireline revenues, the Telephone operation contributed $22.7 million, an increase of $0.3 million, or 1.2%. \nTelephone access revenues were $11.6 million, an increase of $0.7 million or 6.7%. During 2003, the Company \nrecorded a $1.2 million reduction to access revenue, of which $0.7 million was related to 2002, resolving disputes with \ninterexchange carriers on the rating of long distance calls transiting the Telephone switching network for termination \non wireless networks. ", + "page_start": 47, + "page_end": 47, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**Wireless**\nThe trends in Wireless revenue and adjusted operating profit reflect: \n(cid:129) the growing number of wireless voice and data subscribers \n(cid:129) decreased churn \n(cid:129) higher usage of wireless data \n(cid:129) higher handset subsidies as more consumers shift to smartphones \n(cid:129) a slight decrease in blended ARPU due to changes in wireless price \nMedia operating revenue was higher this quarter compared to the same \nperiod last year, mainly because of revenue growth at Sportsnet and \nhigher sales at The Shopping Channel. \n\n**Adjusted Operating Profit**\nWireless adjusted operating profit was higher this quarter compared to \nthe same period last year, mainly because of cost management and \nproductivity initiatives implemented across various areas, including cost \nof equipment, offset by reduced network revenue described above. \n\nCable adjusted operating profit was higher this quarter compared to \nthe same period last year because of the continued shift in our product \nmix towards higher margin Internet and phone products. \n\nMedia’s adjusted operating profit was lower this quarter compared to \nthe same period last year. The increase in Media’s operating revenue \nthis year was more than offset by the combined impacts of the lower \nnumber of games broadcast in the fourth quarter of 2012 resulting \nfrom the NHL lockout compared with having to broadcast more NHL \nhockey games in the fourth quarter of 2013 because of the compressed \n2013-2014 schedule associated with the upcoming winter Olympics. \nExcluding the impact of these items, Media’s consolidated adjusted \noperating profit would have increased by 22%. ", + "page_start": 58, + "page_end": 58, + "source_file": "NYSE_RCI_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_RCI_2013.pdf", + "query": "What has Rogers Communications done to improve its television platform?", + "target_page": 2, + "target_passage": "Launched NextBox 3.0 delivering a superior TV experience and leveraged the success of Rogers AnyPlace TV, our Internet and mobile on-demand TV service.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "ROGERS IS COMMITTED TO DELIVERING WORLD-CLASS \nCONTENT AND EXPERIENCES TO CONSUMERS AND \nADVERTISING SOLUTIONS TO BUSINESSES. THE COMPANY \nHAS A STRONG LEGACY OF BUILDING POWERFUL MEDIA \nBRANDS WITH COMPELLING CONTENT THAT RESONATES WITH \nAUDIENCES ACROSS MULTIPLE PLATFORMS ON ANY DEVICE. \n\nToday, businesses across Canada connect with customers through Rogers \ncategory-leading television and radio assets, sports entertainment, \ntelevised and online shopping, publishing, and digital media properties as \nthe one-stop solution for all their local and national advertising needs. \n\nRogers Media is Canada’s premier combination of diversified broadcast, \nspecialty, sports, print and online media assets which together touch \nnearly 90% of Canadians every week. This includes over 50 popular AM \nand FM radio stations across Canada. In television, it includes the seven \nstation City network which broadcasts intensely local, urban-oriented ", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "\n\n**ROGERS COMMUNICATIONS**\n\n**MEDIA**", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "INNOVATION AND A DRIVE TO BE FIRST TO DELIVER THE \nMOST ADVANCED INFORMATION, COMMUNICATIONS, \nENTERTAINMENT AND TRANSACTION SERVICES, SOLUTIONS \nAND DEVICES ARE AT THE VERY CORE OF ROGERS. \n\nAs one of the first carriers in the world to offer the telecommunications \n“quadruple play” of wireless, television, Internet and telephony services \nover its own networks, few have more capabilities or success in enabling \nsubscribers to enjoy their experiences across multiple screens. \n\nRogers has a long history of firsts, including the first cellular call in Canada, \nthe world’s first high-speed cable modem service, the first digital cellular \nnetwork in North America, Canada’s first video-on-demand and mobile \nTV services, the first HSPA and LTE networks and the first to offer iPhone, \nAndroid, BlackBerry and Windows 8 in Canada. With the combination of \nour advanced next-generation national wireless network, our powerful \nbroadband cable infrastructure and our category-leading media assets, \nwe are in a unique position to help Canadians to live like never before. ", + "page_start": 17, + "page_end": 17, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "4. STRENGTHEN THE CUSTOMER EXPERIENCE \nConstantly improve the experience that customers have using our \nproducts and services by making it easier for them, providing the tools \nand resources customers need to use our products with confidence, \nbeing attuned to our customers’ evolving needs and continuing to \nsimplify our product offerings. OUR PROGRESS IN 2013 \nWe continued to evolve our wireless offering this year, redesigning and \nsimplifying wireless offerings and pricing tiers, and introducing \nCanada’s first wireless Share Everything plan. We also launched a hybrid \nwireless home and small business phone solution that operates on our \nnational wireless network. \n\nOUR PROGRESS IN 2013 \nWe launched several new programs this year to improve the customer \nexperience, \nfor \nindividuals, families and small businesses, our “worry free” $7.99 per \nday US wireless data roaming plan, a new suite of simplified travel value \npacks of voice, text and data roaming, and the Rogers First Rewards \nloyalty program, and we received regulatory approval for the Rogers \ncredit card. Connected for Success, our new broadband Internet pilot \nproject \nis designed to provide affordable broadband Internet, \ncomputers and software to residents of Toronto Community Housing as \npart of the Rogers Youth Fund program. \n\nincluding Canada’s first Share Everything plans ", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "ROGERS CONTINUES TO DEFINE HOW FAMILIES COME \nTOGETHER AND CONNECT WITH THEIR WORLD. MILLIONS OF \nCANADIANS DEPEND ON ROGERS TO KEEP THEM INFORMED, \nCONNECTED AND ENTERTAINED WITH A COMBINATION OF \nTHE FASTEST INTERNET SPEEDS AND THE MOST INNOVATIVE \nTELEVISION, TELEPHONY AND HOME MONITORING \nSOLUTIONS AVAILABLE. \n\nThe core of Rogers connected home strategy is to provide customers \nwith the fastest broadband connections, together with the ability to \nseamlessly shift – to shift time, to shift screens and to shift places so they \naccess what they want, when they want, on the screen of their choice. \n\nRogers offers the best in on-demand, sports, movies, specialty, episodic \nand multicultural programming. Customers can schedule, pause, rewind ", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Executive Summary \n\nABOUT ROGERS COMMUNICATIONS INC. \n\nRogers Communications is one of Canada’s leading diversified communications and media companies. \n\nWe provide a broad range of services: wireless and wired voice and data \ncommunications, cable television, high-speed Internet, cable telephony, \nwired telecom and data networking services \nto consumers and \nbusinesses. We also compete in television and radio broadcasting, \nmulti-platform shopping, sports media and entertainment, digital media \nand consumer, trade and professional publications. \n\n**2013 CONSOLIDATED REVENUE BY SEGMENT**\n(%) \n\nWIRELESS**57%**\n\nCABLE**27%**\n\n$12.7 \n\nAlmost all of our operations and sales are in Canada. We have a highly \nskilled and diversified workforce of approximately 28,000 employees. \nOur head-office is in Toronto, Ontario and we have numerous offices \nacross Canada. \n\nBILLION \nMEDIA**13%**\n\nBUSINESS SOLUTIONS**3%**\n\n**2013 CONSOLIDATED ADJUSTED OPERATING PROFIT BY SEGMENT**\n(%) \n\nWIRELESS**61%**\n\nCABLE**33%**\n\n$5.0 \nBILLION \n\nMEDIA**4%**\nBUSINESS SOLUTIONS**2%**", + "page_start": 29, + "page_end": 29, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Understanding Our Business \n\nRogers Communications is one of Canada’s leading diversified communications and media companies. \n\n**Our vision**is to be known for leading the enablement and delivery of seamless, customer-driven communications, \nentertainment, information and transactional experiences across any device, place or time. \n\nNewfoundland. We also operate a North American transcontinental \nfibre-optic network that extends over 41,000 route kilometres that is \nused to serve enterprise customers, including government and other \ntelecommunications service providers. In Canada, the network extends \ncoast to coast and includes local and regional fibre, transmission \nelectronics and systems, hubs, POPs and IP Routing and switching \ninfrastructure. The network also extends to the US, from Vancouver \nsouth to Seattle, \nthrough \nMinneapolis, Milwaukee and Chicago, and from Toronto, through \nBuffalo, and Montreal, through Albany, to New York City, allowing us \nto connect Canada’s largest markets, while also reaching key US \nmarkets for the exchange of data and voice traffic. \n\ntelevision and high-speed Internet services \n\nfrom the Manitoba-Minnesota border ", + "page_start": 32, + "page_end": 32, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "CABLE AND BUSINESS SOLUTIONS SEGMENTS \n\nRogers Cable is a leading Canadian cable services provider, whose service \nterritory covers approximately 4.0 million homes in Ontario, New Brunswick and \nNewfoundland representing approximately 30% of the Canadian cable market. \nOur advanced digital hybrid fibre-coax network provides market leading high- \nspeed broadband Internet access speeds, the most innovative selection of digital \ntelevision and online viewing and telephony services to millions of residential \nand small business customers. Together with Rogers Business Solutions, it also \nprovides scalable carrier-grade business telecom, networking, hosting and \nmanaged data services, and IP connectivity and solutions to medium and large \nenterprise, government and carrier customers. ", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "\n\nROGERS COMMUNICATIONS INC. \n2013 ANNUAL REPORT ", + "page_start": 0, + "page_end": 0, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "OUR STRATEGY \nTo achieve our vision and drive our future growth, we have six strategic objectives. We made significant progress this year \nagainst each of these, across all business segments. See “Key Highlights” for more detail about individual highlights. \n\n1. DELIVER DIFFERENTIATED END-TO-END \nCUSTOMER EXPERIENCES \nFocus on evolving our cross-device, multi-screen integration to enable \nseamless, \nreliable and easy-to-use product experiences anytime, \nanyplace and anywhere; on delivering a differentiated range of devices \nand device-related services; and on enabling greater integration of our \nmedia assets across screens. We launched new products, including Rogers Smart Home Monitoring, \nto customers in Ontario’s Golden Horseshoe area and Atlantic Canada. \nWe completed several strategic acquisitions this year that strengthened \nour offering of cable television, Internet and telephony services in the \nHamilton, Ontario area, established Business Solutions as a leader in \nCanadian data centre and hosting services and increased the reach of \nour television broadcast network to over 80% of Canadian households. ", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_RCI_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_RCI_2013.pdf", + "query": "Until what NHL season will the Vancouver's ice hockey team be a Rogers Communications partner?", + "target_page": 39, + "target_passage": "Sportsnet announced a 10-year partnership extension with the Vancouver Canucks through the 2022-2023 NHL seasons", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "ROGERS IS COMMITTED TO DELIVERING WORLD-CLASS \nCONTENT AND EXPERIENCES TO CONSUMERS AND \nADVERTISING SOLUTIONS TO BUSINESSES. THE COMPANY \nHAS A STRONG LEGACY OF BUILDING POWERFUL MEDIA \nBRANDS WITH COMPELLING CONTENT THAT RESONATES WITH \nAUDIENCES ACROSS MULTIPLE PLATFORMS ON ANY DEVICE. \n\nToday, businesses across Canada connect with customers through Rogers \ncategory-leading television and radio assets, sports entertainment, \ntelevised and online shopping, publishing, and digital media properties as \nthe one-stop solution for all their local and national advertising needs. \n\nRogers Media is Canada’s premier combination of diversified broadcast, \nspecialty, sports, print and online media assets which together touch \nnearly 90% of Canadians every week. This includes over 50 popular AM \nand FM radio stations across Canada. In television, it includes the seven \nstation City network which broadcasts intensely local, urban-oriented ", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "\n\n**ROGERS COMMUNICATIONS**\n\n**MEDIA**", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "(cid:129) Sportsnet 360 was launched, which is comprised of the rebranded \ntheScore assets. The acquisition of theScore received final regulatory \napproval in the first half of this year. \nCABLE \n(cid:129) Acquisition of Mountain Cable, Shaw Communications’ (Shaw) cable \n\n(cid:129) Sportsnet announced a 10-year partnership extension with the \nVancouver Canucks through the 2022-2023 NHL seasons, continuing \na 14-year network tradition as the regional television broadcaster of \nCanucks hockey. The new agreement features a comprehensive suite \nof multimedia rights \nincluding television, online and mobile, \ndelivering up to 60 regular season Vancouver Canucks games each \nseason. Sportsnet is also the official regional television broadcast \nrights holder for the Toronto Maple Leafs, Calgary Flames and \nEdmonton Oilers. \n\nsystem in Hamilton, Ontario was completed. \n\n(cid:129) Next generation TV experience was unveiled with NextBox 3.0 giving \nviewers access to record up to eight HD programs at one time and \nstore up to 240 hours of HD content. The NextBox 3.0 experience \nincludes Whole Home PVR capability and becomes a wireless TV \nexperience allowing viewers to navigate their cable guide, use a \nvirtual remote, set PVR recordings and live stream channels all from a \ntablet or smartphone while at home or away. ", + "page_start": 38, + "page_end": 38, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Cable unveiled the next generation of TV experience with NextBox 3.0, \nand Media made significant progress this year, announcing a landmark \nexclusive 12-year \nto broadcast national NHL \ngames, launching a subscription digital magazine service, upgrading \nThe Shopping Channel, and including adding a mobile app and social \nIt also launched Sportsnet 360, and announced a 10-year \nmedia. \npartnership extension with the Vancouver Canucks. \n\nlicensing agreement ", + "page_start": 35, + "page_end": 35, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "linear and digital highlights, including \n\n**Higher Operating Revenue**\nMedia generates revenue in five areas: \n(cid:129) advertising sales across its television, radio, publishing and digital \nmedia properties \n\n(cid:129) circulation \n(cid:129) subscriptions \n(cid:129) retail product sales \n(cid:129) ticket sales, receipts of MLB revenue sharing and concession sales inventories for the television \nassociated with Rogers Sports Entertainment. \n\nOperating revenue was 5% higher this year, mainly because of: \n(cid:129) higher \nsubscription and advertising revenue generated by the \ntheScore, and \nincluding the acquisition of \nSportsnet properties, \noverall growth in distribution of our other specialty channels \n\nThrough this agreement, Rogers plans to provide Canadians with a \nunique viewing experience that will feature expanded pre- and post- \ngame coverage of \nregular season and playoff games and other \nenhanced NHL content. We expect this agreement to drive Sportsnet \nsubscriber growth and to provide highly sought after content \nin \nmultiple languages across all of Rogers’ platforms. \n\n(cid:129) higher advertising revenue of $21 million resulting from timing of \nNHL hockey games. Advertising revenue last year was lower than \nnormal due to the NHL player lockout which resulted in no NHL \ngames being aired, and higher than normal this year due to the \ncompressed 2012-2013 season which started in January 2013 and \nthe \nthe compressed 2013-2014 NHL schedule in advance of \nupcoming winter Olympics ", + "page_start": 51, + "page_end": 51, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "MEDIA SEGMENT \n\nRogers Media is Canada’s premier destination for category-leading television and \nradio broadcasting, sports entertainment, publishing, and digital media properties. \nTelevision assets include national City network which reaches more than 80% of \nCanadians, five OMNI Television multilingual channels, seven regional and national \nSportsnet channels, as well as specialty channels FX Canada, OLN, The Biography \nChannel and G4. Rogers Media also owns The Shopping Channel, Canada’s only \nnationally televised and online shopping service. It operates more than 50 Canadian \nradio stations, publishes 50+ well known consumer and business magazines, and \nowns a suite of digital media properties. Media owns the Toronto Blue Jays Baseball \nClub and Rogers Centre, Canada’s largest sports and entertainment facility. Rogers \nalso holds a 37.5% investment in Maple Leaf Sports & Entertainment, owner of NHL \nToronto Maple Leafs, NBA Toronto Raptors and MLS Toronto FC. ", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "NHL \n(cid:129) Advanced our strategy of delivering highly sought-after sports \ncontent anywhere, anytime, on any platform and strengthening the \nvalue of our sports brand by entering into an exclusive 12-year \nlicensing agreement with the NHL which begins with the 2014-2015 \nseason and grants Rogers the following: \n\n1 Results of operations include theScore’s operating results as of April 30, 2013 (the \ndate of acquisition). \n\n**MEDIA REVENUE**\n(IN MILLIONS OF DOLLARS) \n\n- \n\nnational \nmobile tablets and Internet streaming \nnational rights to all regular season games, all playoff games \nand the Stanley Cup Final, and all special events and non- \ngame events (e.g. NHL All-Star Game, NHL Draft) – in multiple \nlanguages \nout-of-market rights for all regional games \nownership of all \ncondensed games and video archives \nNHL broadcast assets: Rogers to operate NHL Centre Ice and \nNHL Game Centre Live \nsponsorship rights to the NHL Shield logo as an official partner \nof the NHL \nCanadian representation of ad sales for NHL.com \nownership of all commercial \nbroadcasts \nrights to sublicense broadcasting rights to TVA and CBC \nrights to use the Hockey Night In Canada brand through the \nCBC sublicense agreement. \n\nrights across television broadcasts, wireless and \n**2013** **$1,704**", + "page_start": 51, + "page_end": 51, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "\n\nWHAT’S NEXT? \nIF YOU’RE WITH ROGERS, \nYOU’LL BE THE FIRST TO KNOW. ", + "page_start": 130, + "page_end": 130, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Understanding Our Business \n\nRogers Communications is one of Canada’s leading diversified communications and media companies. \n\n**Our vision**is to be known for leading the enablement and delivery of seamless, customer-driven communications, \nentertainment, information and transactional experiences across any device, place or time. \n\nNewfoundland. We also operate a North American transcontinental \nfibre-optic network that extends over 41,000 route kilometres that is \nused to serve enterprise customers, including government and other \ntelecommunications service providers. In Canada, the network extends \ncoast to coast and includes local and regional fibre, transmission \nelectronics and systems, hubs, POPs and IP Routing and switching \ninfrastructure. The network also extends to the US, from Vancouver \nsouth to Seattle, \nthrough \nMinneapolis, Milwaukee and Chicago, and from Toronto, through \nBuffalo, and Montreal, through Albany, to New York City, allowing us \nto connect Canada’s largest markets, while also reaching key US \nmarkets for the exchange of data and voice traffic. \n\ntelevision and high-speed Internet services \n\nfrom the Manitoba-Minnesota border ", + "page_start": 32, + "page_end": 32, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "228,000 and lower churn of 1.24%. \n\n(cid:129) Cable high-speed Internet subscribers grew by 97,000 and cable \ntelephony lines grew by 79,000, while television households \ndecreased by 87,000 compared to 2012. \n\n**New CEO**\n(cid:129) Guy Laurence joined Rogers in December 2013, as our new President \nand Chief Executive Officer, succeeding Nadir Mohamed who retired \nfrom Rogers. Mr. Laurence brings 30 years of global experience in \nthe telecommunications and media industries. \n\n**Strong Cash Flow**\n(cid:129) Pre-tax free cash flow, defined as adjusted operating profit less \nspending on property, plant and equipment, and interest on long- \nterm debt (net of capitalized interest), increased by 1% compared to \n2012 to $2,044 million due to a 3% increase in adjusted operating \nprofit offset by higher spending on property, plant and equipment. \nAfter-tax cash flow decreased by 6% from 2012 levels to $1,548 due \nto a 31% increase in cash taxes. \n\n**Significant Developments**\n(cid:129) Exclusive 12-year licensing agreement to broadcast national NHL \ngames, beginning with the 2014-2015 season was signed. The \nagreement grants Rogers the exclusive distribution rights of all \nnational regular season and playoff games within Canada, in multiple \nlanguages, across all platforms. At the same time, we executed \nseparate agreements to sublicence certain of these broadcasting \nrights to TVA Sports and CBC. ", + "page_start": 31, + "page_end": 31, + "source_file": "NYSE_RCI_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_EMMS_2004.pdf", + "query": "I am a shareholder of Emmis Communication, but I will be available from the 20th of June to the 4th of July, will the Annual Meeting take place during this period?", + "target_page": 6, + "target_passage": "The Annual Meeting of shareholders will be held at 10 a.m. Central Time on Wednesday, June 30, 2004, at Emmis’ Corporate office.", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "Transfer Agent Register \nWachovia Bank N.A., Shareholder Services Group, \n1525 West W.T. Harris Blvd., 3c3, Charlotte, North Carolina 28288-1153. \n\nAnnual Meeting \nThe Annual Meeting of shareholders will be held at 10 a.m. Central Time on \nWednesday, June 30, 2004, at Emmis’ Corporate office. \n\nForm 10-K \nA copy of the Annual Report on Form 10-K for the fiscal year ended February 29, \n2004, which was filed with the Securities and Exchange Commission, will be sent \nto shareholders without charge upon written request to Kate Healey, Emmis \nCommunications Corporation, One Emmis Plaza, 40 Monument Circle, Suite 700, \nIndianapolis, Indiana 46204, or ir@emmis.com. \n\nMarket and Dividend Information \nThe Company’s Class A Common Stock is traded in the over-the-counter market \nand is quoted on the National Association of Securities Dealers Automated \nQuotation (NASDAQ) National Market System under the symbol EMMS. \n\nThe following table sets forth the high and low bid prices of the Class A Common \nStock for the periods indicated. No dividends were paid during any such periods. ", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "I would like to thank all Killam employees for their contributions and \ncommitment over the last year and our board of directors for their governance. \nAlso, I would like to thank you, our shareholders, for your continued investment \nin Killam. I invite you to attend the Company’s annual meeting on May 7, 2014 \nat 2:00 pm Atlantic Time at the Halifax Marriott Harbourfront Hotel, either in \nperson or via webcast. ", + "page_start": 10, + "page_end": 10, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "Dear Shareholders, \n\ntion, we gained revenue share at 11 of our 13 measured \nstations and held the line on expenses, giving us a 1.2 \npercent increase in fiscal-year cash flow. \n\nOn our year-end conference call, I said that last year was the \nbest in Emmis Communications’ history. And while that might \nhave sounded like the usual Wall Street hyperbole – like any \nother CEO bragging about his company’s performance – the \ndifference is, I believed it. And I still do. \n\nOur publishing and international divisions also posted strong \nresults. In a tough publishing market, our magazines boosted \ntheir division’s revenues by 4.6 percent over last year and \nincreased cash flow by 3.3 percent. Our international division \nturned in a revenue increase of 27 percent and a cash flow \nincrease of 31 percent. \n\nBut I’ve been in this business long enough to know two \nthings for sure: What I believe is not as important as what I \ncan prove, and what we did last year is only meaningful if it \nreflects on how we will do in the coming year. The good \nnews is, Emmis does have the results to back up my high \npraise, and what we did to perform last year does directly \nrelate to how we’ll perform in the year ahead. ", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "There is no inherent right arising from these options to participate in any new issue of shares in \n\nthe Company which may be offered to shareholders from time to time prior to the exercise of \n\nthe options. The Company will ensure however, that during the exercise period, for the purpose \n\nof determining entitlement to any new issue, the relevant record date will be at least 12 business \n\ndays after the new issue is exercised, so as to give the holder of options an opportunity to exercise \n\ntheir options prior to the relevant record date of any new issue. \n\nIn accordance with the provisions of the E M P L O Y E E S H A R E O P T I O N I N C E N T I V E P L A N \n\nMermaid Marine Australia Limited Employee Share Option Incentive Plan (the “Employee \n\nOption Plan”), as at the date of this report a total of 42 employees have under option an aggregate \n\nof 615,000 ordinary shares in the Company. Of the 615,000 ordinary shares under option pursuant \n\nto the Employee Option Plan, half (307,500) may be purchased within 12 months of 18 June 2000 \n\nat an issue price of 60 cents per share and half (307,500) may be purchased within 12 months of \n\n18 June 2000 at an issue price of 70 cents per share. ", + "page_start": 34, + "page_end": 34, + "source_file": "ASX_MRM_2000.pdf" + }, + { + "text": "**SHAREHOLDERS' QUESTIONS AND STOCK TRANSFERS**\n**SHAREHOLDERS' QUESTIONS AND STOCK TRANSFERS**\nCALL (540) 984-5200 \nCALL (540) 984-5200 \nTransfer Agent - Common Stock \nTransfer Agent - Common Stock \nShenandoah Telecommunications Company \nShenandoah Telecommunications Company \nP.O. Box 459 \nP.O. Box 459 \nEdinburg, VA 22824 \nEdi b \nVA 22824 \n\n*This Annual Report to Shareholders contains forward-looking statements. These statements are subject to certain risks*\n*and uncertainties that could cause actual results to differ materially from those anticipated in the forward-looking*\n*statements. Factors that might cause such a difference include, but are not limited to: changes in the interest rate*\n*environment; management's business strategy; national, regional, and local market conditions; and legislative and*\n*regulatory conditions. Readers should not place undue reliance on forward-looking statements which reflect*\n*management's view only as of the date hereof. The Company undertakes no obligation to publicly revise these*\n*forward-looking statements to reflect subsequent events or circumstances, except as required by law.*", + "page_start": 58, + "page_end": 58, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**SHAREHOLDER INFORMATION**\n\n", + "page_start": 58, + "page_end": 58, + "source_file": "NASDAQ_SHEN_2003.pdf" + }, + { + "text": "**Item 12. Security Ownership of Certain Beneficial Owners and Management and Related Shareholder Matters.**\n\nThe information required under this item is included in the following sections of our Proxy Statement for our 2015 Annual Meeting of \nShareholders, the sections of which are incorporated by reference herein and will be filed within 120 days after the end of our fiscal year: \n\nSecurity Ownership of Certain Beneficial Owners and Management \nEquity Compensation Plans ", + "page_start": 79, + "page_end": 79, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "**Item 13. Certain Relationships and Related Transactions, and Director Independence.**\n\nThe information required under this item is included in the following sections of our Proxy Statement for our 2015 Annual Meeting of \nShareholders, the sections of which are incorporated by reference herein and will be filed within 120 days after the end of our fiscal year: \n\nElection of Directors \nCertain Relationships and Related Transactions ", + "page_start": 79, + "page_end": 79, + "source_file": "NYSE_JWN_2014.pdf" + }, + { + "text": "It is available to customers with Office 2024 or Office LTSC 2024 and to customers with a \n\nMicrosoft 365 subscription on Current Channel or Monthly Enterprise Channel. For \n\ncustomers with a Microsoft 365 subscription on Semi-Annual Enterprise Channel it will \n\nbe available on January 14, 2025. ", + "page_start": 48, + "page_end": 48, + "source_file": "office-pdf.pdf" + }, + { + "text": "\nDaichi, Eva, +2 \nYes, that should work for us \n11:00 AM \n\nMarketing Sync \nSharing notes after the meeting \n10:45 AM ", + "page_start": 3, + "page_end": 3, + "source_file": "MSTeams_QuickStartGuide_EN_Final_4.18.22.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_EMMS_2004.pdf", + "query": "Who is the President of the TV Department of Emmis Communications?", + "target_page": 6, + "target_passage": "Randall Bongarten Television Division President", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "Business \nEmmis Communications (NASDAQ: EMMS) is a diversified media firm with award- \nwinning radio broadcasting, television broadcasting and magazine publishing \noperations. Emmis’ 23 FM and 4 AM domestic radio stations serve the nation’s largest \nmarkets of New York, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, \nIndianapolis and Terre Haute, Ind. The company’s 16 television stations are located in \nAlbuquerque, N.M.; Fort Myers, Fla.; Green Bay, Wis.; Honolulu; Huntington, W.Va.; \nMobile, Ala./Pensacola, Fla.; New Orleans; Omaha, Neb.; Orlando, Fla.; Portland, Ore.; \nTerre Haute, Ind.; Topeka, Kan.; Tucson, Ariz.; and Wichita, Kan. Emmis also publishes \n*Indianapolis Monthly, Texas Monthly, Cincinnati, Atlanta, Los Angeles*and Country \nSampler Group magazines; has a 59.5% interest in Sláger Rádió, a national radio \nnetwork in Hungary; operates nine FM radio stations serving more than 50 percent of \nthe population in the Flanders region of Belgium; and has ancillary businesses in \nbroadcast sales, publishing and interactive products. ", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "about emmis \n\nEmmis Communications (NASDAQ: EMMS) owns 23 FM and 4 AM \ndomestic radio stations serving the nation’s largest markets of New \nYork, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, \nIndianapolis and Terre Haute, Ind. In addition, Emmis owns 16 television \nstations, award-winning regional and specialty magazines, a radio net- \nwork, international radio interests, and ancillary businesses in broadcast \nsales and publishing. \n\nEmmis was founded in 1980, and the company launched its first radio \nstation, WENS-FM, in July 1981. As Emmis (the Hebrew word for \n“truth”) acquired more radio stations across the nation, it established a \nreputation for sound operations and emerged as a radio industry leader \nand innovator. Emmis was the first broadcast company to own top- \nrated radio stations in both L.A. and New York, and it pioneered such \nconcepts as the all-sports format. \n\nThe company launched its magazine division in 1988 with the purchase \nof*Indianapolis Monthly*, and moved into the world of international radio \nin 1997, when it was awarded a license to operate a national radio \nnetwork in Hungary. In 1998, Emmis expanded into television by buying \nsix television stations in markets throughout the United States. In the last \nsix years, the company has added properties in each of its divisions. ", + "page_start": 1, + "page_end": 1, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Our TV performance was even more impressive. The Emmis \ntelevision group’s revenues were up 0.5 percent in calendar \n2003, a year when our markets saw a 2.3 percent decrease \nin revenues, and the industry experienced a 4.7 percent \nrevenue decline. This industry-leading result made us one of \nthe few groups in the nation to post positive growth. In addi- ", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Executive Officers \nJeffrey H. Smulyan \nChairman of the Board, \nPresident and Chief Executive Officer \n\nWalter Z. Berger \nExecutive Vice President, \nChief Financial Officer and Treasurer \n\nRandall Bongarten \nTelevision Division President \n\nRichard F. Cummings \nRadio Division President \n\nGary L. Kaseff \nExecutive Vice President, \nGeneral Counsel \n\nPaul W. Fiddick \nInternational Division President \n\nMichael Levitan \nSenior Vice President, \nHuman Resources \n\nGary Thoe \nPublishing Division President \n\nBoard of Directors \nJeffrey H. Smulyan \nChairman of the Board, \nPresident and Chief Executive Officer \n\nSusan B. Bayh \nFormer Commissioner of the International Joint \nCommission of the United States and Canada \n\nWalter Z. Berger \nExecutive Vice President, \nChief Financial Officer and Treasurer \n\nGary L. Kaseff \nExecutive Vice President, \nGeneral Counsel \n\nRichard A. Leventhal \nPresident and Majority Owner, \nLMCS, LLC \n\nPeter A. Lund \nMedia consultant and former \nPresident of CBS Inc. \n\nGreg A. Nathanson \nMedia consultant and former \nPresident of Fox Television Stations and \nEmmis Television \n\nFrank V. Sica \nSenior Advisor \nSoros Fund Management LLC ", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "\n\nOutperform \n\nEmmis Communications 2004 Annual Report ", + "page_start": 0, + "page_end": 0, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "**How we did it**\nOperationally, we were on top of our game last year. However, \nas I said, I know that the past year’s performance really only \nmatters if it reflects on what we’ll do in the coming year. The \ngood news is, it does. We performed at these high levels not \nby doing something unusual, but by operating the way Emmis \nhas always operated, and the way we always will. \n\nBut our people refused to be slowed by those challenges. \nInstead, they worked through them. They innovated, hustled \nand focused. And they produced. \n\nOur radio division’s revenue growth led our markets and the \nindustry – in our fiscal year, our group was up 4.5 percent \nwhile our markets were up 2.7 percent and the industry only \n1 percent. Based on this kind of performance, we have con- \nsistently ranked among the nation’s leaders in per-station \nrevenue, and we continue to produce top-rated programming \nin markets across the nation. \n\nFirst of all, we focus on assembling and maintaining the best \nteams in our markets. We have traditionally had the top \nsalespeople, creative and technical professionals, news \nstaffs, managers and support staff in every city where we \noperate. Their peers turn to them for industry leadership, \nhonor them with awards and copy them at every opportunity. \nWe invest in these people, giving them industry-leading ben- \nefits packages, great opportunities and the tools they need to \nsucceed. This has always been a hallmark of Emmis, and it \nwon’t change. ", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Transfer Agent Register \nWachovia Bank N.A., Shareholder Services Group, \n1525 West W.T. Harris Blvd., 3c3, Charlotte, North Carolina 28288-1153. \n\nAnnual Meeting \nThe Annual Meeting of shareholders will be held at 10 a.m. Central Time on \nWednesday, June 30, 2004, at Emmis’ Corporate office. \n\nForm 10-K \nA copy of the Annual Report on Form 10-K for the fiscal year ended February 29, \n2004, which was filed with the Securities and Exchange Commission, will be sent \nto shareholders without charge upon written request to Kate Healey, Emmis \nCommunications Corporation, One Emmis Plaza, 40 Monument Circle, Suite 700, \nIndianapolis, Indiana 46204, or ir@emmis.com. \n\nMarket and Dividend Information \nThe Company’s Class A Common Stock is traded in the over-the-counter market \nand is quoted on the National Association of Securities Dealers Automated \nQuotation (NASDAQ) National Market System under the symbol EMMS. \n\nThe following table sets forth the high and low bid prices of the Class A Common \nStock for the periods indicated. No dividends were paid during any such periods. ", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "\n\nBenjamin J. Mondics \nPresident & Chief Operating Officer ", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_AIT_2012.pdf" + }, + { + "text": "In addition to boosting performance in our divisions, we \nhoned our corporate operations by continuing to build one \nof the most adept and hardest-working corporate groups in \nAmerican media. With this team in place, we’ve brought \nour leverage and cost of capital down to more manageable \nlevels, found ways to combat the continually increasing \ncosts of health insurance and, in a truly top-notch effort, \nsmoothly integrated our new Austin radio properties – in just \nunder a year as a part of Emmis, the Austin properties are \nenjoying significant ratings and revenue increases. **The best year**\nThe bottom line is this: Emmis Communications turned in a \nremarkable performance last year. Again and again, and by a \nnumber of measures, we outperformed our peers, our mar- \nkets and our own solid track record. \n\nAnd we did this in a year that was challenging in just about \nevery way. The economy was unstable, public companies \ncame under continuing scrutiny, indecency issues hounded \nbroadcasters, competition for tight ad dollars increased and \ntechnology continued to reshape the media world. Of course, for you, the real bottom line on our performance is \nits impact on your investment. I’m proud to say that we saw \na 27 percent increase in our share price over the course of \nthe last fiscal year – we ended fiscal ’03 at 19.79, and closed \nthe book on fiscal ’04 at 25.17. ", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "With its emphasis on solid operations, integrity, community involvement \nand fun, the company’s culture has been repeatedly lauded by both its \nemployees and its peers. Trade publications have regularly cited the \ncompany’s leaders as being among the best in the business. \n\nEmmis became a public company in 1994. It maintains its worldwide \nheadquarters in Indianapolis, where the company was founded. \n\n*This annual report contains certain non-GAAP measures. For a presen-*\n*tation of the directly comparable GAAP measure and a reconciliation of*\n*the non-GAAP measures to the GAAP measures, see the attachment to*\n*the back of our Form 10-K in this Annual Report.*", + "page_start": 1, + "page_end": 1, + "source_file": "NASDAQ_EMMS_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "NASDAQ_EMMS_2004.pdf", + "query": "Does the radio station 93.7 in Austin belong to Emmis Communication?", + "target_page": 7, + "target_passage": "KLBJ-FM (93.7), Album Oriented Rock", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Business \nEmmis Communications (NASDAQ: EMMS) is a diversified media firm with award- \nwinning radio broadcasting, television broadcasting and magazine publishing \noperations. Emmis’ 23 FM and 4 AM domestic radio stations serve the nation’s largest \nmarkets of New York, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, \nIndianapolis and Terre Haute, Ind. The company’s 16 television stations are located in \nAlbuquerque, N.M.; Fort Myers, Fla.; Green Bay, Wis.; Honolulu; Huntington, W.Va.; \nMobile, Ala./Pensacola, Fla.; New Orleans; Omaha, Neb.; Orlando, Fla.; Portland, Ore.; \nTerre Haute, Ind.; Topeka, Kan.; Tucson, Ariz.; and Wichita, Kan. Emmis also publishes \n*Indianapolis Monthly, Texas Monthly, Cincinnati, Atlanta, Los Angeles*and Country \nSampler Group magazines; has a 59.5% interest in Sláger Rádió, a national radio \nnetwork in Hungary; operates nine FM radio stations serving more than 50 percent of \nthe population in the Flanders region of Belgium; and has ancillary businesses in \nbroadcast sales, publishing and interactive products. ", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "about emmis \n\nEmmis Communications (NASDAQ: EMMS) owns 23 FM and 4 AM \ndomestic radio stations serving the nation’s largest markets of New \nYork, Los Angeles and Chicago as well as Phoenix, St. Louis, Austin, \nIndianapolis and Terre Haute, Ind. In addition, Emmis owns 16 television \nstations, award-winning regional and specialty magazines, a radio net- \nwork, international radio interests, and ancillary businesses in broadcast \nsales and publishing. \n\nEmmis was founded in 1980, and the company launched its first radio \nstation, WENS-FM, in July 1981. As Emmis (the Hebrew word for \n“truth”) acquired more radio stations across the nation, it established a \nreputation for sound operations and emerged as a radio industry leader \nand innovator. Emmis was the first broadcast company to own top- \nrated radio stations in both L.A. and New York, and it pioneered such \nconcepts as the all-sports format. \n\nThe company launched its magazine division in 1988 with the purchase \nof*Indianapolis Monthly*, and moved into the world of international radio \nin 1997, when it was awarded a license to operate a national radio \nnetwork in Hungary. In 1998, Emmis expanded into television by buying \nsix television stations in markets throughout the United States. In the last \nsix years, the company has added properties in each of its divisions. ", + "page_start": 1, + "page_end": 1, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "In addition to boosting performance in our divisions, we \nhoned our corporate operations by continuing to build one \nof the most adept and hardest-working corporate groups in \nAmerican media. With this team in place, we’ve brought \nour leverage and cost of capital down to more manageable \nlevels, found ways to combat the continually increasing \ncosts of health insurance and, in a truly top-notch effort, \nsmoothly integrated our new Austin radio properties – in just \nunder a year as a part of Emmis, the Austin properties are \nenjoying significant ratings and revenue increases. **The best year**\nThe bottom line is this: Emmis Communications turned in a \nremarkable performance last year. Again and again, and by a \nnumber of measures, we outperformed our peers, our mar- \nkets and our own solid track record. \n\nAnd we did this in a year that was challenging in just about \nevery way. The economy was unstable, public companies \ncame under continuing scrutiny, indecency issues hounded \nbroadcasters, competition for tight ad dollars increased and \ntechnology continued to reshape the media world. Of course, for you, the real bottom line on our performance is \nits impact on your investment. I’m proud to say that we saw \na 27 percent increase in our share price over the course of \nthe last fiscal year – we ended fiscal ’03 at 19.79, and closed \nthe book on fiscal ’04 at 25.17. ", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "\n\nOutperform \n\nEmmis Communications 2004 Annual Report ", + "page_start": 0, + "page_end": 0, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Outperform. \n\nemmis communications 2004 abbreviated financial highlights \n*in thousands except where noted*\n\n’00 \n325,265 \n125,477 \n38.6% \n2.5x ’01 \n473,345 \n174,213 \n36.8% \n6.8x ’02 \n539,822 \n185,665 \n34.4% \n9.3x ’03 \n562,363 \n213,112 \n37.9% \n6.5x ’04 \n591,868 \n220,445 \n37.2% \n6.7x *year ended Feb. 28 (29)*\nnet revenues \nstation operating income*\nstation op income margin \nleverage \n\n**excluding noncash compensation*", + "page_start": 2, + "page_end": 2, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Transfer Agent Register \nWachovia Bank N.A., Shareholder Services Group, \n1525 West W.T. Harris Blvd., 3c3, Charlotte, North Carolina 28288-1153. \n\nAnnual Meeting \nThe Annual Meeting of shareholders will be held at 10 a.m. Central Time on \nWednesday, June 30, 2004, at Emmis’ Corporate office. \n\nForm 10-K \nA copy of the Annual Report on Form 10-K for the fiscal year ended February 29, \n2004, which was filed with the Securities and Exchange Commission, will be sent \nto shareholders without charge upon written request to Kate Healey, Emmis \nCommunications Corporation, One Emmis Plaza, 40 Monument Circle, Suite 700, \nIndianapolis, Indiana 46204, or ir@emmis.com. \n\nMarket and Dividend Information \nThe Company’s Class A Common Stock is traded in the over-the-counter market \nand is quoted on the National Association of Securities Dealers Automated \nQuotation (NASDAQ) National Market System under the symbol EMMS. \n\nThe following table sets forth the high and low bid prices of the Class A Common \nStock for the periods indicated. No dividends were paid during any such periods. ", + "page_start": 5, + "page_end": 5, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "**How we did it**\nOperationally, we were on top of our game last year. However, \nas I said, I know that the past year’s performance really only \nmatters if it reflects on what we’ll do in the coming year. The \ngood news is, it does. We performed at these high levels not \nby doing something unusual, but by operating the way Emmis \nhas always operated, and the way we always will. \n\nBut our people refused to be slowed by those challenges. \nInstead, they worked through them. They innovated, hustled \nand focused. And they produced. \n\nOur radio division’s revenue growth led our markets and the \nindustry – in our fiscal year, our group was up 4.5 percent \nwhile our markets were up 2.7 percent and the industry only \n1 percent. Based on this kind of performance, we have con- \nsistently ranked among the nation’s leaders in per-station \nrevenue, and we continue to produce top-rated programming \nin markets across the nation. \n\nFirst of all, we focus on assembling and maintaining the best \nteams in our markets. We have traditionally had the top \nsalespeople, creative and technical professionals, news \nstaffs, managers and support staff in every city where we \noperate. Their peers turn to them for industry leadership, \nhonor them with awards and copy them at every opportunity. \nWe invest in these people, giving them industry-leading ben- \nefits packages, great opportunities and the tools they need to \nsucceed. This has always been a hallmark of Emmis, and it \nwon’t change. ", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "\nNATIONAL \nRADIO \nPORTFOLIO ", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Dear Shareholders, \n\ntion, we gained revenue share at 11 of our 13 measured \nstations and held the line on expenses, giving us a 1.2 \npercent increase in fiscal-year cash flow. \n\nOn our year-end conference call, I said that last year was the \nbest in Emmis Communications’ history. And while that might \nhave sounded like the usual Wall Street hyperbole – like any \nother CEO bragging about his company’s performance – the \ndifference is, I believed it. And I still do. \n\nOur publishing and international divisions also posted strong \nresults. In a tough publishing market, our magazines boosted \ntheir division’s revenues by 4.6 percent over last year and \nincreased cash flow by 3.3 percent. Our international division \nturned in a revenue increase of 27 percent and a cash flow \nincrease of 31 percent. \n\nBut I’ve been in this business long enough to know two \nthings for sure: What I believe is not as important as what I \ncan prove, and what we did last year is only meaningful if it \nreflects on how we will do in the coming year. The good \nnews is, Emmis does have the results to back up my high \npraise, and what we did to perform last year does directly \nrelate to how we’ll perform in the year ahead. ", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_EMMS_2004.pdf" + }, + { + "text": "Our TV performance was even more impressive. The Emmis \ntelevision group’s revenues were up 0.5 percent in calendar \n2003, a year when our markets saw a 2.3 percent decrease \nin revenues, and the industry experienced a 4.7 percent \nrevenue decline. This industry-leading result made us one of \nthe few groups in the nation to post positive growth. In addi- ", + "page_start": 3, + "page_end": 3, + "source_file": "NASDAQ_EMMS_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed1.pdf", + "query": "What are the two components considered in the expected free energy?", + "target_page": 4, + "target_passage": "The former (utilitarian) objective is to realize one’s preferences, such as being satiated or safe, by minimizing the discrepancy between preferred sensa- tions (encoded as “priors over observations” in active inference) and current sensations in different modalities (e.g. interoceptive or exteroceptive). The latter (epistemic) objective is to reduce uncertainty about one’s estimated state", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "The excess free-energy density of the original system \nf ex \nv plus a \nβf ex \nv \ncorrection term \nis that of the three component mixture β \n\ne \n\nThis procedure also provides an accurate description of \nthe structure over the whole range of concentrations. A \ndevelopment similar to the one that leads to Eq. (2) de- \nrives the average unpaired RDF from the corresponding \npaired quantities: \n\nβf ex \n\nf ex \nv − \ne \n\nv = β ρ3 ln K0, (4) \n\ne \n\nwhich is due to the change in standard chemical potential \nbetween the two component and three component mod- \nels. It should be noted that the fraction of pairs is now an \nadditional parameter in the minimization scheme, which \nserves to ensure chemical equilibrium. Within this rep- \nresentation, the pair can be modeled as a hard sphere \n(MSA3) or as a dumbbell-like CIP (BIMSA3) [4]. Since \n\nρiρjgij(k) = \n+ (5) \n\n+ \n\ne e e ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2648.pdf" + }, + { + "text": "canonical ensemble. The free energy functional is first defined on the original KMC lattice. How- \n\never, after re-writing the interaction terms employing gradient operators [78] one finally obtains \n\nthe free energy functional for a continuous system \n\n(cid:90) \n(cid:104) \ndr \n(cid:105) \n\nεll \n2 εnn \n2 \n(∇ρl)2 + (∇ρn)2 + εnl(∇ρn) · (∇ρl) − µρl F [ρl, ρn] = f (ρl, ρn) + \n, (4) \n\nwhere \n\nf (ρl, ρn) = kT [ρl ln ρl + (1 − ρl) ln(1 − ρl)] \n\n+ kT [ρn ln ρn + (1 − ρn) ln(1 − ρn)] \n\n− 2εllρ2 \nl − 2εnnρ2 n − 4εnlρnρl. \n(5) \n\nSince the liquid may evaporate from the surface into the vapour above the surface, µ is the (true) \n\nchemical potential of this reservoir and determines the rate of evaporation [condensation] from \n\n[to] the surface. Note that normally a free energy of the form in Eq. (4) is obtained by making a ", + "page_start": 14, + "page_end": 14, + "source_file": "1001.2669.pdf" + }, + { + "text": "which depends only on the free-energy density f (0) \nand \nv \nRDF g(0) of the reference fluid, with β = (kBT )− \n1 and \nρi the concentration of species i. The Gibbs-Bogoliubov \ninequality [15] ensures that the right-hand side of Eq. (1) \nis actually a strict upper bound. Once a reference system \nhas been chosen, the expression on the right-hand side of \nEq. (1) must be minimized with respect to the parameters \ndefining the reference. This procedure yields the best \nfirst-order approximation to the free energy of the system \nunder consideration. \n\nFor a system of charged particles in solution, the nat- \nural reference is the PM, defined in terms of the charge \nand diameter (σi) of each species. In this case, the per- \nturbing potentials are just the short-range effective po- \ntentials computed above (∆Vij = V SR \nij ). We use the \nMSA [3] solution to the PM, since it provides analyti- \ncal expressions for both the free energy and the RDF. \nThe perturbation term is evaluated using an exponential \napproximation to the RDF obtained within the MSA, \ng(r) = exp [gMSA(r) − 1], which removes any unphysical \nnegative regions and improves the comparison with HNC \ncalculations. ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2648.pdf" + }, + { + "text": "by a film of liquid or by a nanoparticle, respectively. Note that the probability densities correspond \n\nto number densities as we use the lattice spacing σ = 1 as our unit of length. \n\nTo develop the DDFT, one must first derive the underlying free energy functional F [ρl, ρn], and \n\nsecondly, devise dynamical equations for both density fields that account for the conserved and the \n\nnon-conserved aspects of their dynamics, i.e., transport and phase change processes, respectively. \n\nFor a system governed by the hamiltonian (3), we may construct a mean-field (Bragg-Williams) \n\napproximation for the free energy of the system [78, 84] which contains an entropic contribution \n\nand contributions from the interactions between the different species (nanoparticles and liquid). \n\nThe free energy is a semi-grand free energy, since the liquid is treated grand canonically (it is \n\ncoupled to a reservoir with chemical potential µ), whereas the nanoparticles are treated in the ", + "page_start": 13, + "page_end": 13, + "source_file": "1001.2669.pdf" + }, + { + "text": "trapolating the original potential at the barrier separat- \ning pairs from free ions (as shown in Fig. 3). We assume \nthat the interaction potential is averaged over the rota- \ntional degrees of freedom of the CIP and thus pairwise \nadditive. Hereafter, the quantities referring to such a \nthree-component model are written with a tilda symbol. \nThe short-range potentials involving the pair can be de- \nrived, in the infinite dilution limit, from an average of \nthe contributing ion interactions. In Fourier space, ", + "page_start": 2, + "page_end": 2, + "source_file": "1001.2648.pdf" + }, + { + "text": "To overcome this difficulty, we have explicitly intro- \nduced the CIP in our model (species 3). Straightforward \ncalculations, based on a characteristic-function formal- \nism, allow us to define an equivalent model in which \nthe free ions and the CIP are explicitly taken into ac- \ncount [19, 20]. We apply this formalism by defining a \npair as an anion and a cation at a distance less than \n4 ˚A, which corresponds to the position of the effective \npotential maximum. The interaction between free, like \ncharges in this new system remains unchanged, and the \ncation-anion interactions are easily approximated by ex- ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2648.pdf" + }, + { + "text": "quantities as its target: the variational free energy (VFE) in the case of perception and the \nexpected free energy (EFE) in the case of action. The VFE is the free energy associated with \na given sensory observation and is resolved perceptually by updating beliefs about the \nenvironment. The EFE is the free energy that is expected in the future, contingent on a \ngiven policy or course of action. Choosing action policies associated with a low EFE lead \nto reducing uncertainty about the environment, as well as making preferred observations \nmore likely. ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "(cid:88) (cid:88) \nE = − \nlilj − µ li \n\ni \n\nwhere (cid:80) \n\n denotes a sum over nearest neighbour pairs and εll, εnn and εnl are the liquid-liquid, \nparticle-particle and liquid-particle interaction energies, respectively. Fixing the three interaction \n\nstrength parameters εll, εnn, εnl and the effective chemical potential µ determines the equilibrium \n\nstate of the system. We choose εll as unit of energy – i.e. we set εll = 1. \n\nThe hamiltonian determines the equilibrium state and the energy landscape of the system. How- \n\never, as the system ‘dries in’ during the course of the solvent evaporation, the final nanoparticle \n\nconfigurations do not necessarily represent equilibrium structures. This implies that the system \n\ndynamics is of paramount importance. It is determined by the possible Monte Carlo moves, their \n\nrelative frequencies, and the probabilities for their acceptance. Two types of moves are allowed: (i) \n\nevaporation/condensation of liquid and (ii) diffusion of nanoparticles within the liquid. A mobility \n\nM corresponds to the ratio of cycles of particle and solvent moves and reflects the physical ratio of ", + "page_start": 8, + "page_end": 8, + "source_file": "1001.2669.pdf" + }, + { + "text": "In thermodynamic equilibrium [27], the coverage of the ac- \ntive sites follows from \n\nK[X]C[X] \nΘ[X] = , (4) \n1 + (cid:80) \nY K[Y ]C[Y ] \n\nwhere K = k+/k− is the ratio of forward and backward rate \nconstants for the adsorption reaction, \n\n(cid:20) (cid:21) \n\nEads[X] + T S[X] \nkBT \n\nThe adsorption energies for N2, O2, H2O, CO, NH3, and \nH2S on the metallic site of the doped (6,6) CNTs are shown in \nFig. 2(a). The adsorption energy of a molecule X is defined \nby \n\nK[X] = exp − . (5) \n\nIn these expressions C[X] is the concentration of species X, \nS[X] is its gas phase entropy and T is the temperature. Ex- \nperimental values for the gas phase entropies have been taken \nfrom Ref. [28]. Eads[X@M@VC] = E[X@M@VC] − E[X] − E[M@VC], \n(3) ", + "page_start": 1, + "page_end": 1, + "source_file": "1001.2538.pdf" + }, + { + "text": "**Keywords:**active inference; free energy principle; predictive processing; Markov decision \nprocess; cognitive modelling; Julia \nAcademic Editor: Astero Provata \n\n**PACS:**87.15.Aa Received: 25 October 2024 \nRevised: 2 January 2025 \nAccepted: 7 January 2025 ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed7_cc4.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed1.pdf", + "query": "How could the heart rate be estimated by means of an active inference paradigm?", + "target_page": 6, + "target_passage": "The second panel of Fig. 2 shows the Shannon surprise of an inference model that estimates the current heart rate using the two standard components of a generative model. The for- mer component is the prior, which encodes the person’s a priori probabilistic belief (i.e. probability distribution) about her “nor- mal” heart rate range; here, the prior is a Gaussian centered on 67 and has a precision of 0.11. The latter component is the likeli- hood, which encodes the probabilistic mapping between sensory (heartbeat) observations and the hidden state (heart rate); here, the likelihood is a Gaussian centered on the current heart rate with an additional bias of 15 pulses, and the panel shows the results for 10 values for precision obtained by subdividing the range [0.1,10] into equal intervals.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "The second panel of Fig. 2 shows the Shannon surprise of \nan inference model that estimates the current heart rate using \nthe two standard components of a generative model. The for- \nmer component is the prior, which encodes the person’s a priori \nprobabilistic belief (i.e. probability distribution) about her “nor- \nmal” heart rate range; here, the prior is a Gaussian centered on \n67 and has a precision of 0.11. The latter component is the likeli- \nhood, which encodes the probabilistic mapping between sensory \n(heartbeat) observations and the hidden state (heart rate); here, \nthe likelihood is a Gaussian centered on the current heart rate \nwith an additional bias of 15 pulses, and the panel shows the \nresults for 10 values for precision obtained by subdividing the \nrange [0.1,10] into equal intervals. The results shown in the second \npanel of Fig. 2 show that Shannon surprise increases dramatically \nduring episodes of tachycardia and bradycardia, which are far \nfrom the normal range. The pattern of results is the same across \nall levels of likelihood precision. However, the inference with a \nvery high precision (a precision of 10) tracks more closely the noise \nsensory signals and can therefore lead to more extreme results. ", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed1.pdf" + }, + { + "text": "Active inference, interoceptive processing, \nand uncertainty reduction \n\nActive inference is based on the idea that in order to engage in \nadaptive allostatic regulation and goal-directed behavior, living \norganisms continuously strive to minimize the surprise of their \nsensations or, more formally, an upper bound to surprise: varia- \ntional free energy (Parr et al. 2022). Notably, the (expected) free \nenergy minimization processes that drive active inference jointly \nconsider two complementary objectives. The former (utilitarian) \nobjective is to realize one’s preferences, such as being satiated \nor safe, by minimizing the discrepancy between preferred sensa- \ntions (encoded as “priors over observations” in active inference) \nand current sensations in different modalities (e.g. interoceptive \nor exteroceptive). The latter (epistemic) objective is to reduce ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed1.pdf" + }, + { + "text": "inference that tracks the noise rather than the correct state of \nthe estimated variable system (i.e. overfitting), whereas assigning \nexcessively low weight to sensations (or excessively high weight to \nprior knowledge) makes the system poorly responsive to incom- \ning observations that might signal a change in the state of the \nsystem—and both are examples of aberrant inference (Friston \net al. 2014). \n\nFigure 2 provides a formal illustration of the above by plot- \nting some examples of Bayesian inference using generative models \nunder various levels of precision of the model components. For \nsimplicity, we focus on a simplified example of inference of an \ninteroceptive variable: one’s heart rate. Heart rate is a “hidden \nvariable” in Bayesian parlance since it is not directly observable \nbut needs to be inferred through two sources of information: \nprior knowledge about the most likely heart rate and sensory \n(heartbeat) observations. The top panel of Fig. 2 shows a series \nof (noisy) heartbeat observations. In the beginning, they are \nin the normal range for an adult (time steps 1–10), then they \nincrease significantly, simulating tachycardia (time steps 11–20), \nthen they go back to the normal range (time steps 21–30), then \nthey decrease significantly, simulating bradycardia (time steps \n31–40), and finally, they go back to the normal range (time steps \n41–50). ", + "page_start": 5, + "page_end": 5, + "source_file": "pubmed1.pdf" + }, + { + "text": "Approach. Stud. Undergrad. Res. E-J.**2019**, 5, 1–5. [CrossRef] \n\n31. van de Laar, T.; ¸Senöz, ˙I.; Özçelikkale, A.; Wymeersch, H. Chance-Constrained Active Inference. Neural Comput.**2021**, \n\n33, 2710–2735. [CrossRef] \n\n32. Busemeyer, J.R.; Diederich, A. Cognitive Modeling; SAGE: Thousand Oaks, CA, USA, 2010; Google-Books-ID: R7KDF35g5LQC. \nSmith, R.; Friston, K.J.; Whyte, C.J. A step-by-step tutorial on active inference and its application to empirical data. J. Math. \n33. \nPsychol.**2022**, 107, 102632. [CrossRef] [PubMed] \n\n34. Lee, M.D.; Wagenmakers, E.J. Bayesian Cognitive Modeling: A Practical Course, 1st ed.; Cambridge University Press: Cambridge, \n\nUK, 2014. [CrossRef] \n\n35. Blei, D.M.; Kucukelbir, A.; McAuliffe, J.D. Variational Inference: A Review for Statisticians. J. Am. Stat. Assoc.**2017**, 112, 859–877. ", + "page_start": 30, + "page_end": 30, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "Article \n**Introducing ActiveInference.jl: A Julia Library for Simulation**\n**and Parameter Estimation with Active Inference Models**\n\n**Samuel William Nehrer 1,†**\n**Christoph Mathys 5**\n\n**, Jonathan Ehrenreich Laursen 1,†** **, Conor Heins 2,3,*** **, Karl Friston 3,4** **,**\n\n**and Peter Thestrup Waade 5**", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "1 \n\nSchool of Culture and Communication, Aarhus University, 8000 Aarhus, Denmark; \n202204724@post.au.dk (S.W.N.); 202204836@post.au.dk (J.E.L.) \n\n2 Department of Collective Behaviour, Max Planck Institute of Animal Behavior, D-78457 Konstanz, Germany \n3 VERSES Research Lab., Los Angeles, CA 90016, USA; k.friston@ucl.ac.uk \n4 Queen Square Institute of Neurology, University College London, London WC1N 3BG, UK \n5 \n\nInteracting Minds Centre, Aarhus University, 8000 Aarhus, Denmark; chmathys@cas.au.dk (C.M.); \nptw@cas.au.dk (P.T.W.) \n\n** ***Correspondence: cheins@ab.mpg.de \n† \nThese authors contributed equally to this work. \n\n**Abstract:**We introduce a new software package for the Julia programming language, \nthe library ActiveInference.jl. To make active inference agents with Partially Ob- \nservable Markov Decision Process (POMDP) generative models available to the grow- \ning research community using Julia, we re-implemented the pymdp library for Python. \nActiveInference.jl is compatible with cutting-edge Julia libraries designed for cognitive \nand behavioural modelling, as it is used in computational psychiatry, cognitive science \nand neuroscience. This means that POMDP active inference models can now be easily \nfit to empirically observed behaviour using sampling, as well as variational methods. In \nthis article, we show how ActiveInference.jl makes building POMDP active inference \nmodels straightforward, and how it enables researchers to use them for simulation, as well \nas fitting them to data or performing a model comparison. ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "Another critical aspect of Fig. 1 is that it illustrates two path- \nways in which prediction errors at the proprioceptive and inte- \nroceptive levels are used to steer physical actions (reflex arcs) \nand autonomic actions (autonomic reflexes). Endowing predictive \ncoding with these reflexes—hence realizing an “active inference” \narchitecture—permits minimizing prediction errors by changing \nthe state of the world (by physically acting) or the internal milieu \n(by engaging in autonomic actions) rather than only by changing \npredictions, as described later. ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed1.pdf" + }, + { + "text": "17. \n18. Waade, P.T.; Mikus, N.; Mathys, C. Inferring in Circles: Active Inference in Continuous State Space Using Hierarchical Gaussian \nFiltering of Sufficient Statistics. In Machine Learning and Principles and Practice of Knowledge Discovery in Databases; Kamp, M., \nKoprinska, I., Bibal, A.; Bouadi, T., Frénay, B., Galárraga, L., Oramas, J., Adilova, L., Krishnamurthy, Y., Kang, B., et al., Eds.; \nCommunications in Computer and Information Science; Springer: Cham, Switzerland, 2021; pp. 810–818. [CrossRef] \n\n19. Weber, L.A.; Waade, P.T.; Legrand, N.; Møller, A.H.; Stephan, K.E.; Mathys, C. The generalized Hierarchical Gaussian Filter. arXiv \n\n**2023**, arXiv:2305.10937. [CrossRef] \nFriston, K.J.; Trujillo-Barreto, N.; Daunizeau, J. DEM: A variational treatment of dynamic systems. NeuroImage**2008**, 41, 849–885. \n[CrossRef] \n\n20. ", + "page_start": 30, + "page_end": 30, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "**Keywords:**active inference; free energy principle; predictive processing; Markov decision \nprocess; cognitive modelling; Julia \nAcademic Editor: Astero Provata \n\n**PACS:**87.15.Aa Received: 25 October 2024 \nRevised: 2 January 2025 \nAccepted: 7 January 2025 ", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed7_cc4.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Pavalus MP, Peinstein JS, Khalsa SS. An active inference approach to interceptive psychopathology Annua Roo. Clin Psychol 2019, IS - 97 - 122Pezzalo G. Why do you fear the Bogerman? An embodied predictive coding model of perceptual inference. Cogn Affect Behwn Newnst 2013 ; 14 : 900 - 11.
Pezzulo G, Barca L, Priston IQ. Active inference and cognitive - emotional interactions in the brain. Behav Brain Sci 2015.38 e85Pezzulo G ; lodice P ; Barca L et al. Increased heart rate after exercise facilitates the processing of fearful but not diagusted faces. So Rep 2018 ; 898.
Pezzulo G, Maisto D, Barcx L et al. Symptom perception from a predictive processing perspective. Clin Psychol Ear 2013 ; 14.Quigley IGS, Kanosiki. S, Grall WM et al. Punctions of isteroception : from energy regulation : to experience of the self. Thenils Neurosi 2021.44 : 29 – 38.
Race RP, Ballard DH. Predictive coding in the visual cortex : a functional interpretation of some extra - classical receptive - faeld effects. Nat Neurosi 1999 ; 2 79 – 87.Reich3 C, Kaess M. Self - barm in the context of horderline personality disorder. Curr Opin Psychol 2021.37 139 – 44.
Sagir E, Grion Y : A multi factorial model of self - harm behaviors in anorexia - nervosa and bulinia - nervosa. Compr Psychiatry 2003 ; 96 : 152142.Schmitz M, Back SN, Seitz KI et al. The impact of traumatic childhood experiences on interception. diaregarding one ’ s own hody Borderline Pers Disord Emet Dyonegulation 2023 ; 1.5.
Sellby EA, Kranzler A, Lindqvist J et al. The dynamics of pain during nonsuicidal self - injury Clin Psychol Sci 2019 ; P. 302 – 20.Serino S. Scorpina F. Dakanalis A et al. The role of age on multisensory hodily experience : an experimental study with a visttual reality full - body illusion. Cylerpsychol Behav Soc Netur 2018.2194 – 10.
Setb AK. Interoceptive inference, emotion, and the embodied self. Thmils Coge Sci 2013 ; 17 : 565 – 73.Setb AK, Priston KJ. Active interoceptive inference and the emotional brain. PhiliosTrans R Soc LowM B Biol Soi 2016.371.2016007.
Setb AK, Suzukii K, Critchley HD An isteroceptive predictive coding model of conscious presence. Pront hychol 2012 ; 2395.Sforza A, Bufalari. 1, Haggard P et al. My face in yours. vissuo - tactile facial stimulation influences sense of identity Sw. Newnaci 2013 $ 148 – 62.
Shinee RL, Klimstra TA, Denississen [] et al. The development of narrative identity and the emergence of personality disorders in adolescence. Carr Opin Psychol 2021 ; BP 49 – 53.Slargg K. Self - barm. Lancet 2005 ; X66 : 1471 – 83. Smith. B, Peinstein J5, Kuplicki R. et al. Perceptual inserusitivity to the modulation of isteroceptive signals in depression, assiety.
and substance use disorders. So. Rep 2021.11 : 1108Smith R, Killgore WD, Lane RD. The structure of emotional experi -ence and its relation to trait emotional awareness : A theoretical review. Dnotion 2018 ; 1B : 670 – 92
Smith R, Euglicki R, Peinstein J et al. A Bayesian computational model revenula a failure to adapt interceptive precision estimates across depression, anxiety, exting, and substance use disorders. PLoS Cowput Biol 2000.06 e10094HHSmith R, Lane RD. The neural basis of one ’ s own conscious and unconscious esotional states. Neuroci. Bidehaviorito15.57 : 1 – 29.
Smith R, Parr T, Prisron XJ Simularizing emotions : an active inference model of emotional state inference and emotion concept learning. I ' writ hydril 2013 ; t0 : t844.
", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed1.pdf" + } + ] + }, + { + "references": { + "source_file": "pubmed1.pdf", + "query": "At what stage of childhood does the construction of narrative identity take place?", + "target_page": 3, + "target_passage": "Among the challenges that adolescents have to face are the structuring of a “narrative identity” or self-story, featuring the development of a sense of personal identity that integrates past experiences with current, and future goals and meanings in a coherent whole over time ", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "reciprocity with caregivers and peers. Thus, in parallel to the \nnegotiation of identity with caregivers (through a relative detach- \nment from them, a renegotiation of intimacy, and the questioning \nof their confirmatory authority), the modifications of friendship \nstructures—from childhood to adolescence—lay the ground for \nthe progressive recognition of social contexts and peer relation- \nships as the elite territories for the modulation and exploration \nof personal identity. The redefinition that the adolescent has to \nface in these territories of exploration (of the self as an individ- \nual separated from the other and of the self with the other) might \npass through a phase of reduced coherence in the narration of \nthe self and hence an increased level of uncertainty. Coherence \nin the self’s narrative is considered a measure of well-being and \nhas been associated with psychopathology in adulthood (Klim- \nstra and Denissen 2017) and adolescence (Lind et al. 2020, Shiner \net al. 2021). For example, narrative incoherence has been found \nto be associated with personality disorders in adolescents (Lind \net al. 2019), where “identity diffusion” (e.g. feelings of emptiness \nand being fragmented and lack of a sense of continuity over time) \nmight be considered an expression of high levels of uncertainty of \nthe self. ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed1.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Liotti G. A model of dissociation based on attachment theory and research. JTnuma Dissoos 2006 ; P35 – 73. Maged : W, Nylsot Terpatoleg A. Schnij41, C. Tregle R. Psrsist
Magerl : W, Burkart D, Fernandez A, Schmidt LG, Treede R. Persistent antinociception through repeated self - injury in patients with borderline personality disorder. Pain 2012 ; 575 – 94.
Maisto D. Barca L. Wan den Bergh O et al. Perception and misperception of bodily symptoms from an active inference perspective. modelling the case of panic disorder. Psyckil Rev 2021.128 – 590 – 710.
Malter Cohen M, Jing D, \" fang \" RR et al. Early - life stress has persistent effects on anygiplala function and development in mice and burnius. Pric Narl Acel Sci 0.5 A. 2013.110 : 182 \" 4 – 8
McAdams DP, McLean KC. Narrative identity. Curr Dir Psychol. Sci 2013 ; Z2 : 233 – 8.
McEvry PM, Mahoney AE. To be sure, to be sure : intolerance of uncertainty mediates symptoms of various araiety disorders and depression. Behav Ther 2012 ; 43 : 533 – 45
McLean RC, Lilgendah1 JP. Narrative identity in adolescence and adulthood : pathways of development. In. Handlook of Pressulty Deorlopment. New Yisrk. United States : The Guilford Press, 2015 ; 418 – 32
Miller M, Kiverstein J, Kietveld E. Embodying addiction : a predictive processing account. Brain Cogn 2000.13.105485.
Moeller FG, Barratt ES, Dougherty DM et al. Psychiatric aspects of impulsivity Am J Psychiatry 2001 ; 158 : 1783 – 93.
Murphy J. Viding E. Bird G. Does atypical intersception following physical change contribute to sex differences in mental illness? Psychol Rev 2015 ; 126 : 787 - 3
Nock MK. Self - injury. Annu. Rev Clin Psychol 2010 ; 6.339 – 63.
Nock MIC, < underline > osiner TTL Gordon XH et al. Non - suicidal self - injury among adolescents : diagnostic correlates and relation to suicide attempts. Psychiatry fies 2006 ; 54 : 65 – 72.
Nock MIC, Mendes WB. Physiological arousal, distress tolerance, and social problem - solving deficits arroong, widolescent self - injurers. J Conswith Clin Psychol 2008a, 7628 – 38.
Nock MIC, Mendes WB. Physiological arousal, distress tolerance, and social : problees - solving deficits among adolescent self - injurees. J Consist Clin Psychol 2008b, 7.28 – 38
Nock MIC, Prinstein MJ A functional approach to the assessment of self - mutilative behavior. J Consult Clin Psychol 2004.72.885 – 90
Nock MIC, Prinstein MI, Sterba SK Revealing the form and function of self - injurious thoughts and behaviors : a real - time enological assessment study among adolescents and yesurg adults ; J Almorm Psychol 2009 ; 11.816 – 27.
Ogawa [ 8, Stoufe LA, Weinfeld NS et al. Development and the fragmented self : longitudinal study of dissociative symptomatology in a nonclinical sample. Doo hys / hystopothol 19978855 – 79 )
Oxmanajpoijha N, Cressrell C, Dodd HF. Intolerance of uncertainty, anxiety, and worry in children and adolescents : a meta - analysis. J Affect Disord 2018.22.80 – 90.
Paluska SA, Schwenk TL Physical activity and mental health : current concepts Sports Med 2000.29 : 167 – 80.
Pair T, Pezzulo G, Trisston IQ. Active Inference. The Tree Dengy Principle in Mind, Body, and Behaviour. Carebridage, Massrachusetts, United States : The MIT Press, 2022
Patton GC, Olsson CA, Skirbekk V et al. Adolescence and the oest generation. Nature 2018.554 : 458 – 466.
", + "page_start": 11, + "page_end": 11, + "source_file": "pubmed1.pdf" + }, + { + "text": "identified meaning units \nand \ncoded them into groups. Condensates of the subgroups were \nwritten by SSHD and discussed by all researchers. SSHD then \nrecontextualized \ncategories \ndescribed as analytical texts supplemented by quotes, a process \nthat was discussed and revised several times by all authors. \nAll \nthe manuscript. \nEnactive theory was used to interpret the results, aiming at \ninformants \nextracting new knowledge beyond what \nhad provided (28). \n\nadhering to these themes \n\nthe material by forming \n\nThe transcribed material was analyzed using systematic text \ncondensation (STC) (30) and was organized utilizing NVivo \n(version 1.7.1). STC is a method for cross-case analysis inspired \nidentification \nby phenomenology. \noverall \nthemes from the empirical material, (2) extraction of \nmeaning units from the text which were then coded into groups, \n(3) condensation of all meaning units within the subgroups into \nrepresents \nan \nparticipants’ voices, (4) recontextualization of the material into \ncategories, presented as analytical texts. The process is iterative, \nresulting in continuous movement between the transcripts and \nwithin different steps of the analysis. An example of the STC \nprocess is illustrated in Figure 1. ", + "page_start": 4, + "page_end": 4, + "source_file": "pubmed13.pdf" + }, + { + "text": "Emotion-wise, a developmental trend toward an increased \nspecificity of emotion-related maps of bodily sensations (Barca \net al. 2023)—a proxy of \ninteroceptive representations of \nemotions—has been reported from children aged 6 years to adult- \nhood (Hietanen et al. 2016). Pubertal changes encompass dramatic \nbodily and neuroendocrine system changes, comprising—but not \nreduced to—changes in the reproductive, adrenal, and growth \naxes (Cameron 2004). Thus, adolescents might face at least four \nsources of uncertainty: (i) the uncertainty due to physiological \nalterations related to bodily changes and to modification in hor- \nmonal levels leading to sexual maturity; (ii) the uncertainty in self- \nidentity (i.e. the structure of self-awareness) and personal identity \n(i.e, the narrative diachronic self) (Drummond 2021), which might \nbe coupled with changes in body image and the development of \ngender identity; (iii) the uncertainty in affect regulation, with the \nemergence of new forms of affectivity as feelings of love and sex- \nual attraction toward a partner; and (iv) uncertainty in the social \ncontext, with respect to their social status and role expectations \nin the adult society. Such high levels of uncertainty might lead \nto a poorly defined sense of self, with unclear boundaries and a \nsense of emptiness. In this context, pain becomes a possible way \nto recover a bodily sense of self, and self-injurious behavior might \nbe instantiated as an attempt to reduce the rise in the levels of \nuncertainty in these (and potentially other) domains, toward the \ntransition to adulthood (see Miller et al. 2020 for a closely related \napproach on addiction). ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed1.pdf" + }, + { + "text": "Extending this idea even further, one can assume that cer- \ntain emotional states, as well as self-awareness and the (embod- \nied) sense of self—and the feeling of continually being the same \nperson—could be constructed similarly: it would be the result of \nan inferential process that integrates bodily sensations and other \nexperiences over time (Gu et al. 2013, Seth 2013, Stephan et al. \n2016, Barrett 2017). Figure 1 illustrates graphically this perspective \nby showing a (schematic) hierarchical generative model that links \n(exteroceptive, interoceptive, and proprioceptive) sensations at \nlower levels with multimodal models of hidden bodily states, such \nas fatigue and hunger at intermediate layers, and, finally, with \ntemporally extended, integrative models of the emotional and \nembodied self at the higher hierarchical level. The hierarchical \ngenerative model recapitulates a simple predictive coding archi- \ntecture, which includes various putative brain areas or networks \n(gray ovals) arranged hierarchically. In the schematic, networks for \nunimodal (exteroceptive, proprioceptive, and interoceptive) pro- \ncessing are situated at the lowest hierarchical level, multimodal \nnetworks are at an intermediate level, and networks for process- \ning a persistent model of the self are at the highest level. Note \nthat this simple schematic is not supposed to recapitulate brain \nanatomy but to illustrate the basic principles of hierarchical gen- \nerative models and predictive coding; (for a discussion of the \nmapping between predictive coding networks and brain anatomy, \nsee Parr et al. 2022). Each network includes cells encoding predic- \ntions (black nodes) and prediction errors (red nodes). These units ", + "page_start": 3, + "page_end": 3, + "source_file": "pubmed1.pdf" + }, + { + "text": "During infancy, a child starts making sense of her internal \nexperiences through the information she gets from the external \nworld, most notably from caregivers whose behavior has a fun- \ndamental regulatory function shaping emotional development, \nstress physiology, and refinement of limbic circuitry (Gee 2016). \nIn addition to the quality of caregivers’ response to the infant’s \nneed for proximity, its “predictability” supports the development \nof emotions’ regulatory capacity (Gee and Cohodes 2021; Wu and \nFeng 2020) and a cohesive sense of self (Arciero and Bondolfi \n2009), increases prosociality (Deneault et al. 2023), and influ- \nences the development of social brain structure (see Ilyka et al. \n2021 for a review). Self-report assessment of exposure to unpre- \ndictability during early life appears to predict symptoms of anx- \niety, depression, and anhedonia in adulthood (Glynn et al. 2019). \nEvidence from cross-species studies indicates that the predictabil- \nity of caregivers’ behavior in rodents may specifically influence \nthe offspring’s development of corticolimbic circuitry involved in \nemotion-related functioning (Glynn and Baram 2019). Rodents \nexposed to unpredictable maternal care exhibit atypical amygdala \nfunctioning (Malter Cohen et al. 2013) and weaker connectivity \nwith the medial prefrontal cortex (Guadagno et al. 2018). ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed1.pdf" + }, + { + "text": "Barca*et al.*\n2 \n\nsituations—from reduced affective reciprocity during parental \ninteractions (Conradt and Ablow 2010). Development theories \nunderscore the role of parental care in shaping the experience of \nself and others and integrative processes of consciousness (Bowlby \n1997, Liotti 2004, 2006, Fonagy et al. 2023). \n\n**Highlights**\n\n• Predictive processing theories assume that the brain \nforms internal body and self-models at multiple levels \nof detail and strives to reduce their uncertainty. \n\n• High levels of uncertainty in internal models of the body \nand the self are common across several clinical condi- \ntions. \n\n• Excessive levels of uncertainty might also be experienced \nin the typical population during development transitions. \n• This excessive uncertainty might hinder the mainte- \nnance of a coherent model of the embodied self and \nconfidently engage in adaptive courses of actions. \n\n• Maladaptive behaviors, such as non-suicidal self-injury, \nmight emerge as paradoxical but effective strategies to \n“act on the body” to reduce uncertainty ", + "page_start": 1, + "page_end": 1, + "source_file": "pubmed1.pdf" + }, + { + "text": "**A significant number of persons engage in paradoxical behaviors, such as extreme food restriction (up to starvation) and non-suicidal**\n**self-injuries, especially during periods of rapid changes, such as adolescence. Here, we contextualize these and related paradoxical**\n**behavior within an active inference view of brain functions, which assumes that the brain forms predictive models of bodily variables,**\n**emotional experiences, and the embodied self and continuously strives to reduce the uncertainty of such models. We propose that not**\n**only in conditions of excessive or prolonged uncertainty, such as in clinical conditions, but also during pivotal periods of developmental**\n**transition, paradoxical behaviors might emerge as maladaptive strategies to reduce uncertainty—by “acting on the body”— soliciting**\n**salient perceptual and interoceptive sensations, such as pain or excessive levels of hunger. Although such strategies are maladaptive**\n**and run against our basic homeostatic imperatives, they might be functional not only to provide some short-term reward (e.g. relief**\n**from emotional distress)—as previously proposed—but also to reduce uncertainty and possibly to restore a coherent model of one’s**\n**bodily experience and the self, affording greater confidence in who we are and what course of actions we should pursue.**", + "page_start": 0, + "page_end": 0, + "source_file": "pubmed1.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
co - etribdiznent to co - bameostasis in early life. Conscious Cogn 2002.1a, 91 : 1091.17Clautica A, Safron A, Delafa6l6 Rutt J. Back to square one : the bodini. ly roots of conscious experiences in early 10 %. Newnsol Conscious 20021. niab037.
Consradt : E, Ablow J. Infant, physiological : response to the still - face paradigm : contributions of : maternal sessitivity and infants ' early regulatory behavior. Infant Behav Des 2013.251 – 65.Craig AD : How do you feel? Interoception : the sense of the physiological crandition of the body. Nat Research 2002 ; B < 55 – 66. Cruziazedili L, Knabe C, Jeskizoon PM et al. Interceptive ingredients of hody ownership : affective touch and ca
rubber band illusion. Cortex, a Journal Devoted to the Study of the Nemsous Sjostem and Behavior 2018.104 : 180 – 92.Deeks AA. Psychological aspects of menopause management. Best Pract. Res Clin Drdocrinol Metab 2003 ; < underline > D 17 – 31.
Denexult A, Hammond Sl, Madigan S. A meta - analysis of child - parent attachment in early childhood and prosceiality. Deolop - mental Psychology 2023 ; 58 : 236 – 55Diegsest S, Lopez C The bodi. ly self. insights from clinical and experimental research. Arm Phys Rehaliil Mell 201.60 : 598 – 207.
Drustsmond JJ, Self - identity and personal identity. Phenomenol Coge Sci 2021.201235 – 67.Dutra L. Bureeus J - F, Holznes B et al. Quality of early care and child - hood trauma. a prospective study of developmental partbways to dissociation. J. Nerv Ment Dis 2009.507.983 – 90.
Forwagy P, Caregibell C, Luyten. P. Attachment, mentalizing and traucess then ( 3993 ) sed now ( 2002 ). Invision So : 2003 : 33.459Fotopoulosa, Tliakiris M. Mentalizing homeostasis the social origins of istereoceptive inference. NewngTriston IC A theory of cortical responses. Philiss Trans R. Soc Lonil B Biol Sci 2005 ; 36.815 – 36.
Priston K, Lin M, Frith CD et al Active inference, curiosity and insight. Noural Comput 2017.29 2633 – 83.Friston KJ, Stephan KE, Montague R et al. Computational psychiatry : the brain as a phantastic organ. Lanort Psychiatry 2014.1148 – 58.
Garfinkel SN, Nagai Y, Seth AK et al. Neuroimaging studies of interroception and self - awareness. In : Neuroimaging of Concinumonas Springer Berlin, Heidelberg Springer, 2013.207 – 24Gee DG. Sensitive periods of emotion regulation : influences of parental rare on frantoamygdala circuitry and plasticity. Nnu Dir Child Adolesc Dev 2016 ; 2016 ; 2016 ; 87 – 210.
Gee DG and Cohodes EM. Influences of Caregiving on Development : A Sensitive Period for Biological Embedding of Predictability and Safety Cues. Cwr Div Psychol Sci 2021, D0 376 – 83.Glynn LM, Biram TZ. The influence of varpredictable, fragmented parestal signals on the developing brain. Pront Neuroeniborinel 2013 ; 53 : 100756.
Glynn LM, Stem IHS, Howland MA et al. Meanaring tovel antecedents of mental illness : tbe questionnaire of unpredictability in child - hood. Neuropsychopharmacol 2013 ; 44 : 876 – 82.Guadagpo A, Kang MS, Deveryi GA et al. Reduced resting - state functional connectivity of the basolateral amygdala to the medial
", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed1.pdf" + }, + { + "text": "References \nAbraham E, Hendler T, Zagoory-Sharon O*et al.*Interoception sensi- \ntivity in the parental brain during the first months of parenting \nmodulates children’s somatic symptoms six years later: the role \nof oxytocin.*Int J Psychophysiol*2019;**136**:39–48. \nAdams RA, Stephan KE, Brown HR*et al.*The computational anatomy \nof psychosis.*Front Psychiatry*2013;**4**:1–26. \n\nArciero G, Bondolfi G.*Selfhood, Identity and Personality Styles*. 1st edn \nHoboken, New Jersey, United States: John Wiley & Sons Inc, 2009. \nBarca L, Candidi M, Lancia GL*et al.*Mapping the mental space \nof emotional concepts through kinematic measures of decision \nuncertainty.*Philos Trans R Soc Lond B Biol Sci*2023;**378**:20210367. \nBarca L, De Marchis MD. The case of Sofia: an example of the dynamic \nproperties of the therapeutic relationship. 2018. \n\nBarca L, Pezzulo G. Keep your interoceptive streams under control: \nan active inference perspective on anorexia nervosa.*Cogn Affect*\n*Behav Neurosci*2020;**20**:427–40. ", + "page_start": 9, + "page_end": 9, + "source_file": "pubmed1.pdf" + } + ] + }, + { + "references": { + "source_file": "OTC_NSANY_2004.pdf", + "query": "What was the indicator related to increasing Nissan's research and development activities in terms of publication of scientific articles in 2004?", + "target_page": 46, + "target_passage": "And the number of research papers we present at societies such as The Japan Society of Mechanical Engineers rose dramatically in fiscal 2004. ", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "**Pursuing Value Through**\n**Technological Excellence**\n\n“I have two prime objectives. The first is to realize our \n\ncorporate vision, ‘Enriching people’s lives,’ from an \n\nengineering standpoint. The second is to create a \n\nfuture vision for people working in R&D. Research and \n\ndevelopment is all about providing practical value to \n\nthe customer via technological excellence, which in \n\nturn creates value for our shareholders. Nissan has \n\nmade a major commitment to technological excellence \n\nso that we can accomplish these objectives. \n\n**Research and Development**\n\nNissan’s investment in R&D has been rising. In fiscal 2004 \n\nwe devoted approximately ¥400 billion to it, equivalent to \n\n4.6 percent of our turnover. We estimate that our financial \n\ncommitment to R&D will continue to range between 4.5 \n\nand 5 percent. R&D investments take a lot of time to pay \n\noff, of course, so it’s difficult to evaluate our evolution \n\nover the short term. Given our expanded output, however, \n\nI believe that we are headed in the right direction. \n\nFor example, the number of patents we have generated \n\nis growing quickly, exceeding 4,000 in fiscal 2003—more \n\nthan twice the fiscal 1999 figure. And the number of \n\nresearch papers we present at societies such as The Japan \n\nSociety of Mechanical Engineers rose dramatically in fiscal \n\n2004. These are direct results of our commitment to \n\nresearch. We are also generating more new technologies \n\nrelated to safety and the environment, such as the Around \n\nView Monitor and the lane-keeping system. ", + "page_start": 45, + "page_end": 45, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**The recovery story is complete**\n\nFiscal 2004 was a tough year, full of both anticipated and unexpected risks, but Nissan lived up \n\nto all the challenges. We had a record year in revenues, operating profit, net income, sales \n\nvolume and production. \n\n**Sales performance**\n\nGlobal sales came to 3,388,000 units, which exceeded our forecast of 3,380,000 units. This \n\nrecord level represents an increase of 10.8 percent, or 331,000 units, over fiscal 2003, and is \n\n281,000 units more than the previous record level set in 1990. In fiscal 2004, we released nine \n\nall-new models globally. \n\nAlong with record sales, we achieved a global production record. Nissan’s manufacturing \n\nplants turned out 3,378,000 units, or 293,000 units more than the previous record. \n\n**Financial performance**\n\n• Consolidated net revenues came to 8 trillion ¥576.3 billion, up 15.4 percent from last year. \n\n• Consolidated operating profit improved by 4.4 percent to a record ¥861.2 billion. As a \n\npercentage of net revenue, our operating profit margin came to 10.0 percent. \n\n• Net income reached ¥512.3 billion, an increase of ¥8.6 billion. ", + "page_start": 7, + "page_end": 7, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**Automotive Debt:**\n\nDespite higher levels incurred for capital expenditures and \n\nR&D, cash generated from operating activities in the \n\nautomotive division eliminated net automotive debt. Nissan \n\nheld a ¥205.8 billion yen net cash position at the close of \n\nfiscal 2004 in this division. \n\n**Rating**\n\nRegarding Nissan’s long-term credit rating, R&I upgraded \n\nNissan from A- to A on May 11, 2005. S&P upgraded their \n\nrating from BBB to BBB+ on July 20, 2004, and Moody’s \n\nupgraded from Baa3 to Baa1 on January 29, 2004. \n\n**Investment Policy**\n\nCapital expenditures increased by ¥50.2 billion to ¥477.5 \n\nbillion, representing 5.6 percent of net revenue. This \n\nincrease included the Canton plant expansion. R&D \n\nexpenditures increased by ¥43.8 billion to ¥398.1 billion. \n\nThis increase went to fund new technologies and product \n\ndevelopment. Our R&D resources are focused on projects \n\nthat add value to our customers and that will deliver an \n\nexpected return, in both the short and long term. ", + "page_start": 15, + "page_end": 15, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**Looking to the New Fiscal Year**\n\nNissan will continue to grow in fiscal 2005. Even assuming a relatively flat total industry volume \n\nof 61 million units globally, Nissan’s sales are forecast to come to 3,618,000 units, a 6.8 percent \n\nincrease over the prior year. \n\nWorldwide, we will launch six all-new models—five in Japan, one in Europe—leading to \n\ntwenty regional product events. \n\n**Our sales objectives**\n\n• Japan: 933,000 units, a 10 percent increase over last year \n\n• U.S.: 1,047,000 units, an increase of 3.3 percent \n\n• Europe: 550,000 units, a 1.1 percent increase over last year \n\n• General Overseas Markets: 1,088,000 units, a 10.7 percent increase \n\n**Our financial outlook**\n\nAny new fiscal year brings risks and opportunities, and 2005 brings very high levels of \n\nuncertainty and risks—volatility in exchange rates, higher interest rates, higher commodity prices, \n\nhigher energy prices, higher incentives and uncertainty about growth in the U.S. and Japan. The \n\nopportunity is in following through on the NISSAN Value-Up plan quickly and effectively. ", + "page_start": 9, + "page_end": 9, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "“Nissan’s performance in \n\nJapan in 2004 was solid. \n\nProfit rose 1.4 percent and \n\nour market share went up \n\n0.4 percent to 14.6 percent. \n\nLaunching six new models in \n\nthe second half boosted our \n\nresults dramatically: we \n\nregistered a 1.1 percent \n\nincrease in market share \n\nK A Z U H I K O T O I D A \nSenior Vice President \nover the previous period. \n\nAnd for the first time in 19 \n\nyears we had four cars—the Tiida, Note, March and \n\nCube—in the top ten. \n\nOur steady growth has continued into 2005, \n\npowered by positive customer response to both the \n\nMurano and Tiida. These are the kinds of attractive, \n\nunique products that have an immediate impact on \n\nconsumers. We’ve also strengthened our position \n\nin the important small car market, and plan to \n\naugment that with the launch of the Otti, an OEM \n\nproject with Mitsubishi, and the Moco, an OEM \n\nproduct with Suzuki. While we do need to raise our \n\ngame in the SUV market, our overall coverage has \n\nimproved recently. ", + "page_start": 61, + "page_end": 61, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**Share Performance in Fiscal 2004**\n\nNissan’s share price began at ¥1,143 at the beginning \n\nof fiscal 2004 and ended the fiscal year at ¥1,099, \n\ngenerating a negative return of 3.85 percent. Total \n\nshareholder return (TSR) was -1.67 percent, while the \n\ndividend yield came to 2.18 percent (¥24 per share dividend, \n\ndivided by the ¥1,099 closing price). Adverse movements \n\nin foreign exchange rates and commodity price hikes \n\nadversely affected Nissan’s profitability, which was reflected \n\nin the share price. In addition, specific events relating \n\ndirectly to the company also had a negative impact. Later in \n\nthis report, corporate officers will explain what actions \n\nNissan has undertaken to ensure better performance. \n\n**Payout Policy**\n\nNissan announced its NISSAN Value-Up three-year dividend \n\npolicy, covering the period from fiscal 2005 to fiscal 2007, at \n\nthe annual general meeting of shareholders on June 23, \n\n2004. Nissan proposes a long-term dividend policy to \n\nprovide more visibility and improve transparency into the \n\nways in which Nissan rewards its shareholders. Nissan \n\nbelieves that a long-term dividend policy reduces uncertainty \n\nfor investors who already own or are considering acquiring \n\nNissan stock. ", + "page_start": 16, + "page_end": 16, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "\n \n \n \n \n [html]on research and development by 50 percent. Over the next three years we will invest a further S percent of net sales annually, creating new and exciting technologies to benefit our customers.During NISSAN Value - Up we will pursue several key business opportunities :• Our Infiniti luxury brand will extend its reach into new markets such as China and Russia and continue to establish its credibility as a Tier - 1 luxury player.• We will develop our Light Commercial Vehicle biomarkers in and supporting ( E. g., 0 ). nursestic, negativebusiness into a fully competitive global operation through new market and product entries.• We will take a more efficient global sourcing approach to maximize our opportunities and minimize\n
Volume : Nissan will achieve global sales of 4.2 million units in fiscal 2008 — an increase of 812.000 units over fiscal 2004.
ROIC : Nissan will achieve a 20 percent or higher return on invested capital on average over the course of the plan, excluding cash on hand.
To meet this commitment, over the NISSAN Value - Up period we will launch 28 new products, including 10 models that are highly innovative in their concept and benefits.
Our investment in advanced technology continues. From facal 2002 to 2005 we have increased spending
our overall costs as we grow. Our engineering, production and purchasing functions will continue
their acceleration towards being fully integrated global operations.
We will continue to invest in new and emerging markets, including China, India and Russia.
NISSAN Value - Up also delivers increased value for our shareholders through a clear and well - defined dividend
strategy. By the end of the plan period, we will pay an annual dividend of no less than 940 per share, a 66
percent increase over fiscal 2004.
", + "page_start": 4, + "page_end": 4, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "NISSAN REPORTED A RECORD YEAR IN TERMS OF REVENUES, OPERATING INCOME, NET INCOME, \n\nSALES AND PRODUCTION VOLUME IN FISCAL 2004. NISSAN ACHIEVED TWO OF ITS THREE COMMITMENTS \n\nFOR NISSAN 180: AN 8 PERCENT OPERATING PROFIT MARGIN AND ZERO NET AUTOMOTIVE DEBT. \n\nTHE REMAINING COMMITMENT IS THE ACHIEVEMENT OF ONE MILLION ADDITIONAL UNIT SALES. ", + "page_start": 13, + "page_end": 13, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "We have succeeded in shortening our production \n\npipeline, too, using a new vehicle development process \n\ncalled V3P that our engineers devised over the past three \n\nyears. V3P, which stands for Value-up innovation of \n\nProduct, Process, and Program, has helped us cut our \n\ndevelopment time almost in half, from 20 months to just \n\n10.5 months. I believe this makes Nissan the world \n\nbenchmark in development. That improvement is having a \n\nmajor effect on the flexibility and execution of R&D at \n\nNissan, and will ultimately boost the company’s profitability. \n\nThe number of new products we have brought to \n\nmarket over the past three years is equally significant— \n\nmore than thirty new vehicles. That’s an impressive \n\nengineering achievement, and the reason you are seeing \n\nso many new Nissan models on the road. \n\nOur R&D infrastructure, however, is still in need of \n\nexpansion. We’ve therefore begun building new facilities at \n\nthe Nissan Technical Center, NTC, and at the Nissan \n\nAdvanced Technical Center, NATC, both of which are in \n\nJapan. These additions represent a major investment, and \n\nshow Nissan’s dedication to maintaining and enhancing its \n\ntechnological skills. \n\nOur technology base is in Japan, where we have some ", + "page_start": 45, + "page_end": 45, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Intellectual Property Rights \nNissan owns a wide variety of proprietary technologies and has the \nexpertise to differentiate Nissan’s products making them unique from \nthose of its competitors. These assets have proven their value in the \ngrowth of Nissan’s business and will, no doubt, continue to be of value in \nthe future. Nissan strives to protect its intellectual property assets; \nhowever, in certain markets, Nissan may encounter difficulty in fully \nprotecting the proprietary rights to its own technologies. Cases may arise \nwhere Nissan finds itself unable to prohibit others from infringing on its \nintellectual property rights. \n\n• Unfavorable political or economic factors \n• Legal or regulatory changes \n• Potentially adverse tax consequences \n• Labor disputes including strikes \n• Difficulties in recruiting and retaining personnel \n• Social, political or economic turmoil due to terrorism, war, or other \nThe Company has established Intellectual Property Rights Management \nDepartment for the purpose of protecting intellectual property rights in \nspecific areas, strengthening activities to protect Nissan’s intellectual \nproperty rights, and abstracting new intellectual property rights. And the \ndepartment has been performing various activities to protect and create \nNissan Brand. \ndestabilizing factors. \n\nResearch and Development \nNissan’s technology must be “real world”—useful, pragmatic and easy to \nuse. Nissan anticipates the nature and scope of the market demand, and \nthen prioritizes and invests in new technologies. Nonetheless, any sudden \nand greater-than-anticipated changes in its business environment or in \ncustomer preferences may impact negatively on customer satisfaction with \nthese new technologies. ", + "page_start": 72, + "page_end": 72, + "source_file": "OTC_NSANY_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "OTC_NSANY_2004.pdf", + "query": "What was Nissan's vehicle production in Mexico in 2003?", + "target_page": 72, + "target_passage": "308,322", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "Nissan Canada, Inc. Mississauga, Ontario \n\n\n \n \n \n \n [html]\n
MexicoNissan Mexicana, S. A. de C. V.Mexico D. F.Manufacture and sales of automobiles and partsP17.056
100.00
\n\nE \nT \nA \nR \nO \nP \nR \nO \nC ", + "page_start": 107, + "page_end": 107, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "NISSAN HAS A GLOBAL PRESENCE. BORN IN JAPAN, WE ARE PERFECTLY \n\nAT HOME IN THE U.S., THE UK, SPAIN, THAILAND, CHINA, EGYPT, BRAZIL \n\nAND WELL OVER 150 OTHER NATIONS WHERE NISSAN CARS AND \n\nTHEIR COMPONENT PARTS ARE PRODUCED, SOLD AND DRIVEN. \n\nWITH NISSAN, DRIVING PLEASURE IS A SENSATION THAT KNOWS NO BORDERS. \n\nTHIS IS THE NISSAN SHIFT_", + "page_start": 59, + "page_end": 59, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**The recovery story is complete**\n\nFiscal 2004 was a tough year, full of both anticipated and unexpected risks, but Nissan lived up \n\nto all the challenges. We had a record year in revenues, operating profit, net income, sales \n\nvolume and production. \n\n**Sales performance**\n\nGlobal sales came to 3,388,000 units, which exceeded our forecast of 3,380,000 units. This \n\nrecord level represents an increase of 10.8 percent, or 331,000 units, over fiscal 2003, and is \n\n281,000 units more than the previous record level set in 1990. In fiscal 2004, we released nine \n\nall-new models globally. \n\nAlong with record sales, we achieved a global production record. Nissan’s manufacturing \n\nplants turned out 3,378,000 units, or 293,000 units more than the previous record. \n\n**Financial performance**\n\n• Consolidated net revenues came to 8 trillion ¥576.3 billion, up 15.4 percent from last year. \n\n• Consolidated operating profit improved by 4.4 percent to a record ¥861.2 billion. As a \n\npercentage of net revenue, our operating profit margin came to 10.0 percent. \n\n• Net income reached ¥512.3 billion, an increase of ¥8.6 billion. ", + "page_start": 7, + "page_end": 7, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "Manufacturing achieved a series of milestones during \n\nNISSAN 180. One of the biggest was opening the Canton \n\nplant in the U.S., which got up to speed quickly, launching \n\nfive new vehicles in a period of just eight months. We built \n\ntwo plants in China, and restarted operations in Egypt. We \n\ndramatically expanded the Decherd, Tennessee engine \n\nplant in the U.S., and all engines for North America are now \n\nbuilt at Decherd or at our plant in Mexico. \n\nWe also commenced cross-production with Renault: \n\nNissan began building Renault’s Platina in Mexico and its \n\nTraffic in Spain, while Renault began building our Pickup \n\nand Xterra at its factory in Brazil. We also started \n\nproduction of common engines with Renault, with our \n\nsubsidiary Aichi Kikai and the Yokohama plant producing \n\nthe four-cylinder engines used in our new Tiida, Note and \n\nLafesta models. In Japan, we launched six new models in \n\njust six months—the Murano, Fuga, Lafesta, Tiida, Tiida \n\nLatio and Note. We also launched three vehicles—the Tiida, \n\nTeana and Tiida Latio—in China. \n\nWhile we were successful in Japan and China, we did ", + "page_start": 51, + "page_end": 51, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "NISSAN REPORTED A RECORD YEAR IN TERMS OF REVENUES, OPERATING INCOME, NET INCOME, \n\nSALES AND PRODUCTION VOLUME IN FISCAL 2004. NISSAN ACHIEVED TWO OF ITS THREE COMMITMENTS \n\nFOR NISSAN 180: AN 8 PERCENT OPERATING PROFIT MARGIN AND ZERO NET AUTOMOTIVE DEBT. \n\nTHE REMAINING COMMITMENT IS THE ACHIEVEMENT OF ONE MILLION ADDITIONAL UNIT SALES. ", + "page_start": 13, + "page_end": 13, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**Europe** **Japan** **GOM** ***/Mexico** **US/Canada**\n\n350Z Roadster \nMurano \nPathfinder \nNavara \nMicra C+C Serena \nOtti \nCompact wagon \nM-class sedan \nMinicar \n\nQuest \nPathfinder \nNavara \nInfiniti M \nTiida hatchback \nTiida sedan \nLafesta \nInterstar \nXterra \n\n*General Overseas Markets ", + "page_start": 10, + "page_end": 10, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "**Looking to the New Fiscal Year**\n\nNissan will continue to grow in fiscal 2005. Even assuming a relatively flat total industry volume \n\nof 61 million units globally, Nissan’s sales are forecast to come to 3,618,000 units, a 6.8 percent \n\nincrease over the prior year. \n\nWorldwide, we will launch six all-new models—five in Japan, one in Europe—leading to \n\ntwenty regional product events. \n\n**Our sales objectives**\n\n• Japan: 933,000 units, a 10 percent increase over last year \n\n• U.S.: 1,047,000 units, an increase of 3.3 percent \n\n• Europe: 550,000 units, a 1.1 percent increase over last year \n\n• General Overseas Markets: 1,088,000 units, a 10.7 percent increase \n\n**Our financial outlook**\n\nAny new fiscal year brings risks and opportunities, and 2005 brings very high levels of \n\nuncertainty and risks—volatility in exchange rates, higher interest rates, higher commodity prices, \n\nhigher energy prices, higher incentives and uncertainty about growth in the U.S. and Japan. The \n\nopportunity is in following through on the NISSAN Value-Up plan quickly and effectively. ", + "page_start": 9, + "page_end": 9, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "and management. To increase service productivity and \n\nefficiency, we send former factory foremen and engineers \n\nto various service workshops to analyze service staff \n\nperformance. This will help cut repair times and improve \n\ncustomer satisfaction. The Nissan Sales and Service Way is \n\nalso a tool used to increase the quality of service provided \n\nby all dealers. Its successful implementation has enhanced \n\ncustomer satisfaction worldwide. \n\nThe conversion business in Japan looks very promising. \n\nWe discovered that 50 percent of car owners want to \n\ncustomize their vehicles, and 28 percent already had. Such \n\na high penetration rate illustrates how much people want a \n\ncar that’s different from everyone else’s. The Rider series— \n\ncustomized versions of Nissan cars developed by our \n\nwholly owned subsidiary Autech—are very popular, \n\nespecially among younger Japanese. The series \n\nexemplifies the major potential of the conversion business. \n\nGlobal Aftersales is a young division, but we’ve \n\nperformed well from the start, meeting our global \n\ncommitments every year during NISSAN 180 and \n\ncontributing to the Company’s growth. We have expanded \n\nnearly 20 percent year-on-year between 2001 and 2004, \n\nand intend to continue this momentum during NISSAN ", + "page_start": 43, + "page_end": 43, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "“Nissan’s performance in \n\nJapan in 2004 was solid. \n\nProfit rose 1.4 percent and \n\nour market share went up \n\n0.4 percent to 14.6 percent. \n\nLaunching six new models in \n\nthe second half boosted our \n\nresults dramatically: we \n\nregistered a 1.1 percent \n\nincrease in market share \n\nK A Z U H I K O T O I D A \nSenior Vice President \nover the previous period. \n\nAnd for the first time in 19 \n\nyears we had four cars—the Tiida, Note, March and \n\nCube—in the top ten. \n\nOur steady growth has continued into 2005, \n\npowered by positive customer response to both the \n\nMurano and Tiida. These are the kinds of attractive, \n\nunique products that have an immediate impact on \n\nconsumers. We’ve also strengthened our position \n\nin the important small car market, and plan to \n\naugment that with the launch of the Otti, an OEM \n\nproject with Mitsubishi, and the Moco, an OEM \n\nproduct with Suzuki. While we do need to raise our \n\ngame in the SUV market, our overall coverage has \n\nimproved recently. ", + "page_start": 61, + "page_end": 61, + "source_file": "OTC_NSANY_2004.pdf" + }, + { + "text": "South Africa \n\nNissan Motor Company \nSouth Africa (Pty) Ltd. \n\nMiddle East \n\nNissan Middle East F.Z.E. \n\nChina \n\nNissan Motor (China) Ltd. \n\nDongfeng Motor Co., Ltd. \n\nTaiwan \n\nYulon Nissan Motor Co., Ltd. \n\nThailand \n\nSiam Nissan Automobile Co., Ltd. ", + "page_start": 108, + "page_end": 108, + "source_file": "OTC_NSANY_2004.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_SEA_2014.pdf", + "query": "Why did Sundance Energy's oil sales improve in 2014?", + "target_page": 18, + "target_passage": "The increase in oil revenues was the result of increased oil production volumes ($81.3 million) offset by a decrease in product pricing ($15.7 million). ", + "chunk_present": { + "presence": true, + "index": 6 + } + }, + "top_chunk": [ + { + "text": "*Dear Fellow Shareholders,*\n\n*I am pleased to present Sundance Energy Australia Limited’s*\n*Annual Report for the 12 months ended 31 December 2014. It*\n*has been another year of significant progress for Sundance*\n*across our portfolio of liquids rich oil and gas assets in the US.*\nCHAIRMAN’S LETTER \n\nThe Company’s strategic focus on growing production, cash flows and reserves from \nlarge, repeatable resource plays in North America continues to deliver positive results \nwith growth in production, cash flows, and reserves. \n\nDuring late 2013 and 2014, we completed the divestment of our interest in the Williston \nBasin in North Dakota for $51 million which realised an internal rate of return of 45 percent; \nand also opportunistically divested our interest in the Denver-Julesburg Basin in Colorado \nfor $114 million which realised an internal rate of return of 104 percent. These divestitures \nof smaller, less scalable positions enabled us to focus on developing and growing our \nassets in the Eagle Ford in Texas and our Mississippian/Woodford assets in Oklahoma. \n\nDespite the reduction in crude oil and liquids prices towards the end of the year \nand continuing into 2015, the operational performance and focused, value-adding \ntransactions during the past year have positioned the Company very favourably for \nfuture growth in net asset value and shareholder returns. \n\n*Despite the reduction in*\n*crude oil and liquids*\n*prices towards the end of*\n*the year and continuing*\n*into 2015, the opertional*\n*performance and focused,*\n*value-adding transactions*\n*during the past year have*\n*positioned the Company*\n*very favourably for future*\n*growth in net asset value*\n*and shareholder returns.*\nCorresponding with the growth in annual production, the Company’s full year revenues \nincreased to $159.8 million and Adjusted EBITDAX increased to $126.4 million. ", + "page_start": 3, + "page_end": 3, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "*Dear Fellow Shareholders,*\n\n*2014 Review — 2014 was a year of stark economic contrasts*\n*in our industry. During the first half as in the past several years,*\n*historically volatile West Texas Intermediate oil prices seemed*\n*range bound between $80 and $110 with geopolitical events*\n*driving prices towards the ceiling and demand risks pushing*\n*prices towards the floor of the range.*\n\nCEO’S REPORT \n\nIn the US, E&P companies were spending record amounts of capital, fueled by cheap \nand plentiful debt, on horizontal drilling and completions to drive production growth \nwhile making material strategic acquisitions in order to increase their long-term \nexposure to oil prices. \n\nThe easy credit environment caused asset prices to increase significantly to the point \nwhere, in our view, risk adjusted returns on new acquisitions were threatening cyclical \nlows. In line with our strategy, Sundance had monetized several mature assets realizing \n\n~$50 million in current period gains while freeing up \n~$165 million in invested capital. \nSundance’s Performance versus the ASX 200 \n\nWe primarily reinvested this capital in production growth \nand cash flow with only about $75 million reinvested in \nacquiring oil and gas leases and producing properties. This \nresulted in our production increasing from 5,028 BOEPD \nto 9,434 BOEPD by December 2014 and full year EBITDAX \nincreasing $73.8 million to $126.4 million in 2014. Had \nprices stayed steady, we likely would have generated \nearnings before income taxes of over $85 million and a \nreturn on capital in excess of 20%. ", + "page_start": 5, + "page_end": 5, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "A year of growing production, cash flow and reserves \nIn line with our strategy we continued to increase the level of company operated assets, \nand successfully maintained a very strong focus on optimising our operations and reducing \ncosts. This resulted in an impressive improvement in well performance combined with a \ntop tier cost structure. \n\nThrough our operated development program, we ended 2014 with record production \nof 9,434 barrels of oil equivalent per day (BOEPD) compared with an exit rate of 5,028 \nBOEPD in December 2013 and an average annual production of 6,635 BOEPD compared \nto 3,015 BOEPD in 2013. During 2014 we drilled and completed 42.7 net wells, primarily \nin the Eagle Ford, bringing our total well count to 81.3 by 31 December 2014. High \nvalue oil comprised approximately 69 percent of our total 2014 annual production \nand production from Sundance-operated projects accounted for 89 percent of total \nproduction for the year. ", + "page_start": 3, + "page_end": 3, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "At year end, we had 197 gross 3P Reserves drilling locations across our Eagle Ford \nacreage where we continue to pursue operational and drilling efficiencies, opportunities \nto further improve well economics by improving recoveries and reducing costs. In 2014 \nthis included a switch to pad drilling with zipper fracs and new completion techniques \nthat have provided significant upside in production. \n\n*The Company has a*\n*strong balance sheet to*\n*withstand the current low*\n*oil price environment,*\n*and our sound financial*\n*management strategy*\n*has seen the Company*\n*well supported by*\n*both new and existing*\n*investors in Australia*\n*and internationally.*\n\nDespite our current scaling back of drilling activity, we have set 2015 production guidance \nat 7,850 – 8,500 BOEPD, an increase from the previous year of some 13 – 17 percent, \nbut a target that we believe is achievable while maintaining acceptable levels of liquidity \ngiven our demonstrated abilities and growing footprint in the Eagle Ford. \n\nSafety and Environment \nSundance has a strong culture throughout the organisation of ensuring that high standards \nof safety are maintained and that our operations are conducted in an environmentally \nresponsible way. During 2014 our comprehensive safety program was enhanced and \nfurther improvements will be a strong focus throughout 2015. \n\nA strong financial position \nSundance is well placed for future growth in the Eagle Ford. The Company has a strong \nbalance sheet to withstand the current low oil price environment, and our sound financial \nmanagement strategy has seen the Company well supported by both new and existing \ninvestors in Australia and internationally. ", + "page_start": 4, + "page_end": 4, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "We expect that Sundance will grow organically and also through further leasing or \nbolt-on acquisitions in our core Eagle Ford focus area within our current, conservative \nbalance sheet parameters. \n\nPositive outlook for 2015 \nDespite the current oil pricing scenario, Sundance’s medium-to-long term growth \ntrajectory looks very positive. \n\nWe can demonstrate this through: \n\n• A track record of capital efficient growth \n• A track record of value creation \n• Being a low cost/high margin operator \n• Having top tier Eagle Ford assets with an extensive drilling inventory \n• Having a clean balance sheet \n\nAs a mid-tier oil and gas producer and explorer in the S&P/ASX All Australian 200 index, \nand with the increasing interest and support from institutional and retail investors. I believe \nthat Sundance will deliver significant long-term value from our assets for our shareholders. \n\nThank you for your support \nWe have had a busy year at Sundance and I would like to recognise the efforts and valued \ncontribution of the Board of Directors, management team and all staff and contractors of \nthe Company in helping us achieve our strategic goals. I am confident that we have the \nright team and excellent assets in place to execute our clear and focused strategy that we \nexpect to deliver significant value for our shareholders. ", + "page_start": 4, + "page_end": 4, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "*Through our emphasis on operating and G&A cost control*\n*initiatives, the Company’s record oil and natural gas sales*\n*translated to best-in-class Adjusted EBITDAX Margin (79*\n*percent) among peers our size and a full 10 absolute percentage*\n*points higher than the average of our entire peer group.*\n\nAs a result of its significant production increase, the Company’s 2014 oil, NGL and natural \ngas sales revenue increased by $74.4 million to $159.8 million; an 87 percent increase \ncompared to $85.3 million in 2013. \n\nREVENUE (US$000s) AND PRODUCTION (Boe/d) \n\n10,000 $50,000 \n\n8,000 $40,000 \n\n6,000 $30,000 \n\n4,000 $20,000 \n\n2,000 $10,000 ", + "page_start": 7, + "page_end": 7, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "**Oil sales.**Oil sales increased by $65.6 million (82.7%) to $145.0 million for the year ended 31 December 2014 from $79.4 million \nfor the prior year. The increase in oil revenues was the result of increased oil production volumes ($81.3 million) offset by a \ndecrease in product pricing ($15.7 million). Oil production volumes increased 102.4% to 1,675,078 Bbls for the year ended 31 \nDecember 2014 compared to 827,432 Bbls for the prior year. The average price we realised on (NGL) the sale of our oil \ndecreased by 9.8% to $86.56 per Bbl for the year ended 31 December 2014 from $95.92 per Bbl for the prior year. \n\n**Natural gas sales.**Natural gas sales increased by $3.4 million (122.1%) to $6.2 million for the year ended 31 December 2014 \nfrom $2.8 million for the prior year. The increase in natural gas revenues was primarily the result of increased production \nvolumes ($2.6 million) and improved product pricing ($0.8 million). Natural gas production volumes increased 868,800 Mcf \n(93.0%) to 1,803,000 Mcf for the year ended 31 December 2014 compared to 934,200 Mcf for the prior year. The average price \nwe realised on the sale of our natural gas increased by 15.1% to $3.42 per Mcf for the year ended 31 December 2014 from \n$2.97 per Mcf for the prior year. ", + "page_start": 17, + "page_end": 17, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "The Company’s development program also generated significant growth in Constant Case \nreserves during the year. More details are contained elsewhere in this Annual Report, \nbut in summary our 1P Reserves at the end of 2014 were 26.0 MBOE, 2P Reserves 54.1 \nMBOE, and 3P Reserves 147.7 MBOE. This compares with Reserves of 20.7 MBOE, 34.6 \nMBOE, and 92.8 MBOE, respectively, at the end of 2013. \n\nIn the current price environment, we have elected to scale back our drilling program to \nmainly concentrate on limited drilling obligations to hold Eagle Ford acreage. This will \nenable us to maintain our low leverage profile, which was approximately 1.03x debt to \nAdjusted EBITDAX at year end, and focus on growing our drilling inventory in an environ- \nment with less competition for leases and small acquisitions. Liquidity was $84 million at \nyear end, with a borrowing base redetermination in 2015 expected to materially increase \ndebt availability if the use of such funds is justified in line with our strategy. \n\nThe Eagle Ford – driving value and production growth \nSundance has grown its Eagle Ford acreage position from ~7,200 acres upon entering the \nbasin to approximately 26,160 net mineral acres in the Eagle Ford at the end of 2014 \nwhich includes the acquisition of approximately 18,000 net acreage in 2014. By the end of \nthe first quarter 2015 this had grown to 38,701 net mineral acres. Our growing presence \nin this prolific oil and gas region has been driving significant value for the Company and \nour shareholders, and continues to form our priority focus for development and acreage \ngrowth in the coming years. ", + "page_start": 3, + "page_end": 3, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Our second capital priority for the year was to conclude the appraisal of the Woodford \nformation in our Logan County, Oklahoma assets. We viewed this relatively modest, but \nhigher risk, investment as having a 25% chance of success with a 15x upside. Unfortunately, \nwe met with mixed success in our appraisal activities proving that in today’s onshore \nUS oil and gas industry that the best absolute returns are generated by drilling in proved \nregions. There are plenty of solid opportunities to efficiently grow the business without \nexposure to undue geologic risk. \n\nLike many prior bubbles driven by new technologies, the second half of the year saw the \npricing environment come crashing down around us. The market became fundamentally \nunbalanced, driving prices down almost 50% and rendering material portions of global \noil and gas development uneconomic. \n\nOur peers went from talking about their growth prospects to fretting about cash costs \nand liquidity, a stark contrast from the go-go growth times which existed in the first half \nof the year. This shift in industry strategy has now come in line with our general business \nphilosophy — in the resource space, low-cost, low debt businesses will survive and thrive \nacross cycles; and, relative to our US onshore peer group, Sundance boasts a top 15% \ncost structure and balance sheet. ", + "page_start": 5, + "page_end": 5, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "In addition to the significantly improved operating profitability, the Company exited two \nnon-core basins which resulted in a gain on sales of non-current assets of $50.3 million. \nThe DJ and Bakken dispositions that occurred in 2014 are further proving the Company’s \ntrack-record of large opportunistic dispositions that result in a high internal rate of \nreturn; allowing the Company to reinvest proceeds in basins with higher risk-adjusted \nreturns. Since 2007, the Company disposed of six \nprospects or basins with an aggregate transaction \nvalue of nearly $400 million. These dispositions had a \ntransaction value weighted return of 83 percent. The \n2014 DJ disposition (transaction value of $113 million) \nyielded the Company’s highest internal rate of return \nto date of 104 percent. \n\nINTERNAL RATE OF RETURN AND TRANSACTION VALUES \n(in millions) \n140% \n$113.0 \n120% \n\n100% \n$10.5 \n80% \n$46.4 \n60% \n$14.0 $39.5 \n\nAs a result of the increased revenue, cost controlled \noperating and G&A expenses and gain on sales, offset \nby the Company’s non-cash impairment of $71.2 \nmillion (due to the depressed oil commodity pricing \nat year-end), the Company reported profits before \nincome tax for the year of $14.5 million. \n\n$172.0 \n40% \n\n20% ", + "page_start": 8, + "page_end": 8, + "source_file": "ASX_SEA_2014.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_SEA_2014.pdf", + "query": "I heard that Sundance Energy has acquired land in South Texas in July 2014, where is it?", + "target_page": 21, + "target_passage": "In July 2014, the Company completed the acquisition of approximately 5,700 net Eagle Ford acres in Dimmit County, South Texas", + "chunk_present": { + "presence": true, + "index": 1 + } + }, + "top_chunk": [ + { + "text": "*Dear Fellow Shareholders,*\n\n*I am pleased to present Sundance Energy Australia Limited’s*\n*Annual Report for the 12 months ended 31 December 2014. It*\n*has been another year of significant progress for Sundance*\n*across our portfolio of liquids rich oil and gas assets in the US.*\nCHAIRMAN’S LETTER \n\nThe Company’s strategic focus on growing production, cash flows and reserves from \nlarge, repeatable resource plays in North America continues to deliver positive results \nwith growth in production, cash flows, and reserves. \n\nDuring late 2013 and 2014, we completed the divestment of our interest in the Williston \nBasin in North Dakota for $51 million which realised an internal rate of return of 45 percent; \nand also opportunistically divested our interest in the Denver-Julesburg Basin in Colorado \nfor $114 million which realised an internal rate of return of 104 percent. These divestitures \nof smaller, less scalable positions enabled us to focus on developing and growing our \nassets in the Eagle Ford in Texas and our Mississippian/Woodford assets in Oklahoma. \n\nDespite the reduction in crude oil and liquids prices towards the end of the year \nand continuing into 2015, the operational performance and focused, value-adding \ntransactions during the past year have positioned the Company very favourably for \nfuture growth in net asset value and shareholder returns. \n\n*Despite the reduction in*\n*crude oil and liquids*\n*prices towards the end of*\n*the year and continuing*\n*into 2015, the opertional*\n*performance and focused,*\n*value-adding transactions*\n*during the past year have*\n*positioned the Company*\n*very favourably for future*\n*growth in net asset value*\n*and shareholder returns.*\nCorresponding with the growth in annual production, the Company’s full year revenues \nincreased to $159.8 million and Adjusted EBITDAX increased to $126.4 million. ", + "page_start": 3, + "page_end": 3, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "In July 2014, the Company completed the acquisition of approximately 5,700 net Eagle Ford acres in Dimmit County, South \nTexas, for approximately $36 million and a commitment to drill four Eagle Ford wells. The Company also has the option, at its \nsole discretion, to acquire the Seller’s remaining working interest for an additional $45 million for the earlier of one year from \nclosing the acquisition or six months from first production of hydrocarbons. ", + "page_start": 20, + "page_end": 20, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "*Dear Fellow Shareholders,*\n\n*2014 Review — 2014 was a year of stark economic contrasts*\n*in our industry. During the first half as in the past several years,*\n*historically volatile West Texas Intermediate oil prices seemed*\n*range bound between $80 and $110 with geopolitical events*\n*driving prices towards the ceiling and demand risks pushing*\n*prices towards the floor of the range.*\n\nCEO’S REPORT \n\nIn the US, E&P companies were spending record amounts of capital, fueled by cheap \nand plentiful debt, on horizontal drilling and completions to drive production growth \nwhile making material strategic acquisitions in order to increase their long-term \nexposure to oil prices. \n\nThe easy credit environment caused asset prices to increase significantly to the point \nwhere, in our view, risk adjusted returns on new acquisitions were threatening cyclical \nlows. In line with our strategy, Sundance had monetized several mature assets realizing \n\n~$50 million in current period gains while freeing up \n~$165 million in invested capital. \nSundance’s Performance versus the ASX 200 \n\nWe primarily reinvested this capital in production growth \nand cash flow with only about $75 million reinvested in \nacquiring oil and gas leases and producing properties. This \nresulted in our production increasing from 5,028 BOEPD \nto 9,434 BOEPD by December 2014 and full year EBITDAX \nincreasing $73.8 million to $126.4 million in 2014. Had \nprices stayed steady, we likely would have generated \nearnings before income taxes of over $85 million and a \nreturn on capital in excess of 20%. ", + "page_start": 5, + "page_end": 5, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Competent Persons Statement \nThis report contains information on Sundance Energy’s \nreserves and resources which has been reviewed by David \nRamsden-Wood, Professional Engineer, who is licensed in \nAlberta, Canada and is qualified in accordance with ASX \nListing Rule 5.11 and has consented to the inclusion of this \ninformation in the form and context in which it appears. ", + "page_start": 112, + "page_end": 112, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "**Junior Credit Facility**\n\nIn August 2013, Sundance Energy, Inc. (“Sundance Energy”), a wholly owned subsidiary of the Company, entered \ninto a second lien credit agreement with Wells Fargo Energy Capital, Inc., as the administrative agent (the “Junior \nCredit Facility”), which provides for term loans to be made in a series of draws up to $100 million. The Junior Credit \nFacility matures in June 2018 and is secured by a second priority lien on substantially all of the Company’s assets. \nUpon entering into the Junior Credit Facility, the Company immediately borrowed $15 million pursuant to the terms \nof the Junior Credit Facility and paid down the outstanding principal of the Senior Credit Facility. In May 2014, the \nCompany’s borrowing capacity increased to $35 million. As at 31 December 2014, the borrowing capacity under the \nJunior Credit Facility remains at $35 million. ", + "page_start": 87, + "page_end": 87, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "*Experience*\nMike has been a Director of Sundance since March 2006 and chairman of our board of directors since December 2008. \nMr. Hannell has over 45 years of experience in the oil and gas industry, initially in the downstream sector and subsequently in \nthe upstream sector. His extensive experience has been in a wide range of design and construction, engineering, operations, \nexploration and development, marketing and commercial, financial and corporate areas in the United States, United Kingdom, \ncontinental Europe and Australia at the senior executive level with Mobil Oil (now Exxon) and Santos Ltd. Mr. Hannell recently \nfinished his term as the chairman of Rees Operations Pty Ltd (doing business as Milford Industries Pty Ltd), an Australian \nautomotive components and transportation container manufacturer and supplier. He has also held a number of other board \nappointments including the chairman of Sydac Pty Ltd, a designer and producer of simulation training products for industry. \nMr. Hannell has also served on a number of not-for-profit boards, with appointments as president of the Adelaide-based \nChamber of Mines and Energy, president of Business SA (formerly the South Australian Chamber of Commerce and Industry), \nchairman of the Investigator Science and Technology Centre, chairman of the Adelaide Graduate School of Business, and a \nmember of the South Australian Legal Practitioners Conduct Board. Mr. Hannell holds a Bachelor of Science degree in \nEngineering (with Honors) from the University of London and is a Fellow of the Institution of Engineers Australia. \n\n*Interest in Shares*: \n1,059,000 ordinary shares in Sundance Energy Australia Limited \n\n*Special Responsibilities*: \n-Chairman of the Board of Directors \n-Chairman of the Remuneration and Nominations Committee \n-Member of the Audit and Risk Management Committee \n-Member of the Reserves Committee \n\n*Other Directorships*: \nNil ", + "page_start": 24, + "page_end": 24, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "**ACQUIRING NEW ACREAGE**\nFuture exploration success depends \non quality exploration acreage. \nSantos acquired five exploration \nblocks in three hydrocarbon \nprovinces during 2004. The most \nsignificant of these were in Egypt \nand Indonesia. \n\n• the addition of three new \n\n**2004 EXPLORATION**\n**EXPENDITURE BY CATEGORY** **2004 EXPLORATION**\n**EXPENDITURE BY REGION**\n\nventure areas in the shallow \nwaters of the Gulf of Mexico \nand onshore Montana and \nTexas, which significantly \nexpands and diversifies the \nUS exploration acreage and \nprospect inventory \n\nDrilling \n$63.6 million Offshore Australia \n$32.6 million \n\nGeoscience and other \n$37.5 million Onshore Australia \n$23.4 million \n\n• the farm-out of a 60% interest \nand operatorship of the NT/P61 \npermit in the Bonaparte Basin, \noffshore northern Australia to \nConocoPhillips \n\nSeismic \n$17.2 million South East Asia \n$41.4 million \n\nNew ventures \n$7.3 million United States \n$28.2 million ", + "page_start": 17, + "page_end": 17, + "source_file": "ASX_STO_2004.pdf" + }, + { + "text": "(1) The Company drilled three exploratory wells in the Anadarko Basin that did not have economically \n\nrecoverable reserves (i.e. dry wells) and as such, all associated costs were written off. \n\nIn July 2014, the Company acquired the working interest in approximately 9,200 gross (5,700 net) in Dimmit County, \nTexas. The purchase price included an initial cash payment of $35.5 million and a commitment to drill four Eagle \nFord wells. The purchase price was allocated between exploration and evaluation and development and production \nassets based on discounted cash flows of developed producing wells. \n\nThe ultimate recoupment of costs carried forward for exploration phase is dependent on the successful development \nand commercial exploitation or sale of respective areas. ", + "page_start": 86, + "page_end": 86, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "The Company’s exploration and development activities are focused in the Eagle Ford and the Mississippian/Woodford \nFormations. Costs incurred for development and production expenditures for the Eagle Ford and Mississippian/Woodford \nFormations during the year ended 31 December 2014 totalled $324.0 million, which included $295.9 million of drilling and \ndevelopment expenditure related to our 2014 plan, $3.8 million on infrastructure, and $24.3 million of drilling and \ndevelopment expenditure related to our 2015 plan. This investment resulted in the addition of 75 gross (42.7 net) wells into \nproduction, including 50 gross (39.5 net) Sundance-operated horizontal wells. An additional 24 gross (13.7 net) wells were \ndrilling, being prepared for fracture stimulation or testing as at 31 December 2014, an increase of 7 gross (3.0 net) compared \nto the beginning of the year. \n\n*Acquisitions*\nIn April 2014, the Company acquired approximately 4,800 net acres in the Eagle Ford for an initial purchase price of \napproximately $10.5 million and two separate earn out payments due upon commencement of drilling in each of three blocks \nof acreage (total for all three blocks of $7.7 million) and payout of the first two wells drilled on each block of the acreage \n($7.7 million). The term of the agreement is two years and provides a one year extension for $500 per acre extended. This \nacquired acreage is adjacent to our existing acreage in McMullen County, Texas. ", + "page_start": 20, + "page_end": 20, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "*Remuneration Practices and Policies*\nOur board of directors recognizes that the attraction and retention of high-calibre directors and executives with appropriate \nincentives is critical to generating shareholder value. We have designed our remuneration program to provide rewards for \nindividual performance and corporate results and to encourage an ownership mentality among our executives and other key \nemployees. We believe a significant portion of our executives’ pay should be at-risk to performance. \n\nSundance stock is traded on the Australian Stock Exchange (ASX) and all of our management team and operations are located in \nthe United States. In order to retain our current talent and continue to attract highly skilled talent in the U.S., we have adopted \nremuneration programs that align with best practices and competitive design in the U.S. marketplace while also meeting ASX \nlisting requirements. \n\nThe objectives of our compensation program are to: \n• \nAttract and retain highly trained, experienced, and committed executives who have the skills, education, business \nacumen, and background to lead a mid-tier oil and gas business; \n\n• Motivate and reward executives to drive and achieve our goal of increasing shareholder value; \n• \n\nProvide balanced incentives for the achievement of near-term and long-term objectives, without motivating executives \nto take excessive risk; and \nTrack and respond to developments such as the tightening in the labor market or changes in competitive pay practices. • ", + "page_start": 31, + "page_end": 31, + "source_file": "ASX_SEA_2014.pdf" + } + ] + }, + { + "references": { + "source_file": "ASX_SEA_2014.pdf", + "query": "I am the CFO of Sundance Energy, will my base increase in 2015 as it did in 2014?", + "target_page": 31, + "target_passage": "No increases to Managing Director’s or KMP’s base salary", + "chunk_present": { + "presence": true, + "index": 6 + } + }, + "top_chunk": [ + { + "text": "We expect that Sundance will grow organically and also through further leasing or \nbolt-on acquisitions in our core Eagle Ford focus area within our current, conservative \nbalance sheet parameters. \n\nPositive outlook for 2015 \nDespite the current oil pricing scenario, Sundance’s medium-to-long term growth \ntrajectory looks very positive. \n\nWe can demonstrate this through: \n\n• A track record of capital efficient growth \n• A track record of value creation \n• Being a low cost/high margin operator \n• Having top tier Eagle Ford assets with an extensive drilling inventory \n• Having a clean balance sheet \n\nAs a mid-tier oil and gas producer and explorer in the S&P/ASX All Australian 200 index, \nand with the increasing interest and support from institutional and retail investors. I believe \nthat Sundance will deliver significant long-term value from our assets for our shareholders. \n\nThank you for your support \nWe have had a busy year at Sundance and I would like to recognise the efforts and valued \ncontribution of the Board of Directors, management team and all staff and contractors of \nthe Company in helping us achieve our strategic goals. I am confident that we have the \nright team and excellent assets in place to execute our clear and focused strategy that we \nexpect to deliver significant value for our shareholders. ", + "page_start": 4, + "page_end": 4, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "*Dear Fellow Shareholders,*\n\n*2014 Review — 2014 was a year of stark economic contrasts*\n*in our industry. During the first half as in the past several years,*\n*historically volatile West Texas Intermediate oil prices seemed*\n*range bound between $80 and $110 with geopolitical events*\n*driving prices towards the ceiling and demand risks pushing*\n*prices towards the floor of the range.*\n\nCEO’S REPORT \n\nIn the US, E&P companies were spending record amounts of capital, fueled by cheap \nand plentiful debt, on horizontal drilling and completions to drive production growth \nwhile making material strategic acquisitions in order to increase their long-term \nexposure to oil prices. \n\nThe easy credit environment caused asset prices to increase significantly to the point \nwhere, in our view, risk adjusted returns on new acquisitions were threatening cyclical \nlows. In line with our strategy, Sundance had monetized several mature assets realizing \n\n~$50 million in current period gains while freeing up \n~$165 million in invested capital. \nSundance’s Performance versus the ASX 200 \n\nWe primarily reinvested this capital in production growth \nand cash flow with only about $75 million reinvested in \nacquiring oil and gas leases and producing properties. This \nresulted in our production increasing from 5,028 BOEPD \nto 9,434 BOEPD by December 2014 and full year EBITDAX \nincreasing $73.8 million to $126.4 million in 2014. Had \nprices stayed steady, we likely would have generated \nearnings before income taxes of over $85 million and a \nreturn on capital in excess of 20%. ", + "page_start": 5, + "page_end": 5, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "*Dear Fellow Shareholders,*\n\n*I am pleased to present Sundance Energy Australia Limited’s*\n*Annual Report for the 12 months ended 31 December 2014. It*\n*has been another year of significant progress for Sundance*\n*across our portfolio of liquids rich oil and gas assets in the US.*\nCHAIRMAN’S LETTER \n\nThe Company’s strategic focus on growing production, cash flows and reserves from \nlarge, repeatable resource plays in North America continues to deliver positive results \nwith growth in production, cash flows, and reserves. \n\nDuring late 2013 and 2014, we completed the divestment of our interest in the Williston \nBasin in North Dakota for $51 million which realised an internal rate of return of 45 percent; \nand also opportunistically divested our interest in the Denver-Julesburg Basin in Colorado \nfor $114 million which realised an internal rate of return of 104 percent. These divestitures \nof smaller, less scalable positions enabled us to focus on developing and growing our \nassets in the Eagle Ford in Texas and our Mississippian/Woodford assets in Oklahoma. \n\nDespite the reduction in crude oil and liquids prices towards the end of the year \nand continuing into 2015, the operational performance and focused, value-adding \ntransactions during the past year have positioned the Company very favourably for \nfuture growth in net asset value and shareholder returns. \n\n*Despite the reduction in*\n*crude oil and liquids*\n*prices towards the end of*\n*the year and continuing*\n*into 2015, the opertional*\n*performance and focused,*\n*value-adding transactions*\n*during the past year have*\n*positioned the Company*\n*very favourably for future*\n*growth in net asset value*\n*and shareholder returns.*\nCorresponding with the growth in annual production, the Company’s full year revenues \nincreased to $159.8 million and Adjusted EBITDAX increased to $126.4 million. ", + "page_start": 3, + "page_end": 3, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "For the years ended 31 December 2014 and 2013, the Company capitalised $0.7 million and $0.3 million, \nrespectively, of financing costs related to the Junior Credit Facility, which offset the principal balance. As at 31 \nDecember 2014 there was $35.0 million outstanding under the Company’s Junior Credit Facility. As at 31 December \n2014, the Company was in compliance with all restrictive financial and other covenants under the Junior Credit \nFacility. \n\n**Senior Credit Facility**\n\nOn 31 December 2012, Sundance Energy entered into a credit agreement with Wells Fargo Bank, N.A. (the “Senior \nCredit Facility”), pursuant to which up to $300 million is available on a revolving basis. The borrowing base under \nthe Senior Credit Facility is determined by reference to the value of the Company’s proved reserves. The agreement \nspecifies a semi-annual borrowing base redetermination and the Company can request two additional \nredeterminations each year. The borrowing capacity was increased from prior year to $110 million as at 31 \nDecember 2014 based on Company reserves as at 31 December 2014. As at 31 December 2014, the Company had \n$15 million undrawn on the Senior Credit Facility. In conjunction with the increase in the borrowing base, the \nCompany has expanded the syndicate of banks under the Senior Credit Facility. With Wells Fargo as administrative \nagent, Bank of America Merrill Lynch and the Bank of Nova Scotia have now joined the banking group. ", + "page_start": 88, + "page_end": 88, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "At year end, we had 197 gross 3P Reserves drilling locations across our Eagle Ford \nacreage where we continue to pursue operational and drilling efficiencies, opportunities \nto further improve well economics by improving recoveries and reducing costs. In 2014 \nthis included a switch to pad drilling with zipper fracs and new completion techniques \nthat have provided significant upside in production. \n\n*The Company has a*\n*strong balance sheet to*\n*withstand the current low*\n*oil price environment,*\n*and our sound financial*\n*management strategy*\n*has seen the Company*\n*well supported by*\n*both new and existing*\n*investors in Australia*\n*and internationally.*\n\nDespite our current scaling back of drilling activity, we have set 2015 production guidance \nat 7,850 – 8,500 BOEPD, an increase from the previous year of some 13 – 17 percent, \nbut a target that we believe is achievable while maintaining acceptable levels of liquidity \ngiven our demonstrated abilities and growing footprint in the Eagle Ford. \n\nSafety and Environment \nSundance has a strong culture throughout the organisation of ensuring that high standards \nof safety are maintained and that our operations are conducted in an environmentally \nresponsible way. During 2014 our comprehensive safety program was enhanced and \nfurther improvements will be a strong focus throughout 2015. \n\nA strong financial position \nSundance is well placed for future growth in the Eagle Ford. The Company has a strong \nbalance sheet to withstand the current low oil price environment, and our sound financial \nmanagement strategy has seen the Company well supported by both new and existing \ninvestors in Australia and internationally. ", + "page_start": 4, + "page_end": 4, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": " Q1-13 Q2-13 Q3-13 \n\nQ1-14 \nn REVENUE —— Boe/d \n\nQ4-13 Q2-14 Q3-14 Q4-14 \n\nThis topline growth resulted in Adjusted EBIDTAX increase of $73.8 million to $126.4 \nmillion (79 percent of revenue); a 140 percent increase compared to $52.6 million \n(62 percent of revenue) in 2013. In other words, for every $1.00 of revenue growth \ncompared to 2013, the Company added $0.99 of 2014 Adjusted EBITDAX growth. \n\nThis Adjusted EBITDAX (generally a good proxy for our \noperating cash flow) increase was primarily the result of \nincreased revenue and the following cost controlled \noperating expenses: \n\nADJUSTED EBITDAX AND MARGIN \n\n$40,000 100% \n\n$35,000 \n80% \n$30,000 \n\n•*Lease operating expenses*increased only slightly (12 percent), \ndespite significant production increases (108 percent). \nAs a result of several changes in its field operations and \neconomies of scale, the Company has realized improvement \nin its lease operating costs per barrel. \n\n$25,000 \n60% \n$20,000 \n40% \n$15,000 \n\n$10,000 ", + "page_start": 7, + "page_end": 7, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
2014 RemunerationActionRationale
Non - executive Director CompensationIncreased total director base compensation during 2014 by approximately AS55.000 per Director.Based on market review of director compensation at peer group companies and to reflect the companies. Company ’ s operations and therefore the related time commitment and performance expectations of the directors.
Key Changes for 2015Action
Fixed RemunerationNo increases to Managing Director ' s or KMP ' s base salary.
Cash Short - Term IncentiveShort - Term Incentive payments earned for 2014 will be paid out in Restricted Stock Units during 2015 instead of cash to reflect the current low commodity price environment and preserve liquidity.
Equity Long - Term IncentiveLong - Term Incentive RSUs to KMPs earned for 2014 will be paid out in 2015 with 50 % time based vesting and 50 % vesting tied to Total Shareholder Return compared to the peer group over a three year period.
Non - executive Director CompensationNo increases to NED fees
", + "page_start": 30, + "page_end": 30, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "The Company’s development program also generated significant growth in Constant Case \nreserves during the year. More details are contained elsewhere in this Annual Report, \nbut in summary our 1P Reserves at the end of 2014 were 26.0 MBOE, 2P Reserves 54.1 \nMBOE, and 3P Reserves 147.7 MBOE. This compares with Reserves of 20.7 MBOE, 34.6 \nMBOE, and 92.8 MBOE, respectively, at the end of 2013. \n\nIn the current price environment, we have elected to scale back our drilling program to \nmainly concentrate on limited drilling obligations to hold Eagle Ford acreage. This will \nenable us to maintain our low leverage profile, which was approximately 1.03x debt to \nAdjusted EBITDAX at year end, and focus on growing our drilling inventory in an environ- \nment with less competition for leases and small acquisitions. Liquidity was $84 million at \nyear end, with a borrowing base redetermination in 2015 expected to materially increase \ndebt availability if the use of such funds is justified in line with our strategy. \n\nThe Eagle Ford – driving value and production growth \nSundance has grown its Eagle Ford acreage position from ~7,200 acres upon entering the \nbasin to approximately 26,160 net mineral acres in the Eagle Ford at the end of 2014 \nwhich includes the acquisition of approximately 18,000 net acreage in 2014. By the end of \nthe first quarter 2015 this had grown to 38,701 net mineral acres. Our growing presence \nin this prolific oil and gas region has been driving significant value for the Company and \nour shareholders, and continues to form our priority focus for development and acreage \ngrowth in the coming years. ", + "page_start": 3, + "page_end": 3, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "Opinion \nIn our opinion: \n\na. \nthe financial report of Sundance Energy Australia is in accordance with the*Corporations Act 2001*, \nincluding: \n\ni \ngiving a true and fair view of the consolidated entity's financial position as at 31 December 2014 and \nof its performance for the year ended on that date; and \n\nii complying with Australian Accounting Standards and the*Corporations Regulations 2001*; and \n\nb. \n\nthe financial report also complies with*International Financial Reporting Standards*issued by the IASB \nas disclosed in Note 1. \n\n*Report on the remuneration report*\n\nWe have audited the Remuneration Report included in pages 28 to 43 of the directors' report for the year ended 31 \nDecember 2014. The directors of the company are responsible for the preparation and presentation of the \nRemuneration Report in accordance with section 300A of the*Corporations Act 2001*. Our responsibility is to express \nan opinion on the Remuneration Report, based on our audit conducted in accordance with Australian Auditing \nStandards. \n\nOpinion \nIn our opinion, the Remuneration Report of Sundance Energy Australia Limited for the year ended 31 December \n2014, complies with section 300A of the*Corporations Act 2001*. ", + "page_start": 109, + "page_end": 109, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "**Matters Subsequent to the End of the Financial Year**\n\nSubsequent to 31 December 2014, an additional $13.9 million was drawn-down the credit facilities, bringing total outstanding \ndebt to $143.9 million, with undrawn funds of $1.1 million. \n\nIn January 2015, the company acquired three leases totalling approximately 14,180 net acres in the Eagle Ford for \napproximately $13.4 million. \n\n**Future Developments, Prospects and Business Strategies**\n\nThe Group’s business strategies and prospects for growth in future financial years are presently concentrated on growing the \nvalue of the Group’s current resource plays through direct leasing from mineral owners, small acquisitions of producing \nproperties, drilling inventory within the Group’s current balance sheet capabilities, and development of the Group’s current \nacreage. Further information on likely development in the operations of the Group and expected results of operations has not \nbeen included because the Directors believe it would result in unreasonable prejudice to the Group. ", + "page_start": 22, + "page_end": 22, + "source_file": "ASX_SEA_2014.pdf" + } + ] + }, + { + "references": { + "source_file": "sg247938.pdf", + "query": "What are the physical requirements for installing the Storwize V7000?", + "target_page": 70, + "target_passage": "You must consider several key factors when you are planning the physical site of a Storwize V7000 installation. The physical site must have the following characteristics: \u0002 Meets power, cooling, and location requirements of the Storwize V7000 nodes. \u0002 Has two separate power sources. \u0002 Sufficient rack space exists for the installation of controller and disk expansion enclosures. \u0002 Has sufficient maximum power rating of the rack. Plan your rack placement carefully to not exceed maximum power rating of the rack. For more information about the power and environmental requirements, see this website", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**3.4 Physical planning**\n\nYou must consider several key factors when you are planning the physical site of a Storwize \nV7000 installation. The physical site must have the following characteristics: \n\n(cid:2) Meets power, cooling, and location requirements of the Storwize V7000 nodes. \n\n(cid:2) Has two separate power sources. \n\n(cid:2) Sufficient rack space exists for the installation of controller and disk expansion enclosures. \n\n(cid:2) Has sufficient maximum power rating of the rack. Plan your rack placement carefully to not \nexceed maximum power rating of the rack. For more information about the power and \nenvironmental requirements, see this website. \n\nYour Storwize V7000 2076-524 and Storwize V7000 2076-624 order includes a printed copy \nof the IBM Storwize V7000 Gen2 and Gen2+ Quick Installation Guide, which also provides \ninformation about environmental and power requirements. \n\n**3.4.1 Cabling**\n\nCreate a cable connection table that follows your environment’s documentation procedure to \ntrack all of the following connections that are required for the setup: \n\n(cid:2) Power \n(cid:2) Ethernet \n(cid:2) SAS \n(cid:2) iSCSI or Fibre Channel over Ethernet (FCoE) connections \n(cid:2) Switch ports (FC, Ethernet, and FCoE) ", + "page_start": 69, + "page_end": 69, + "source_file": "sg247938.pdf" + }, + { + "text": "**8.3.1 NPIV prerequisites**\n\nConsider the following key points for NPIV enablement: \n\n(cid:2) The IBM Storwize V7000 system must be running V7.7 or later. \n\n(cid:2) A V7.7 or later system with NPIV enabled as backend storage for a system that is earlier \nthan V7.7 is not supported. ", + "page_start": 342, + "page_end": 342, + "source_file": "sg247938.pdf" + }, + { + "text": "Figure 13-25 Upgrade test utility drive firmware warning \n\nTo update the IBM Storwize V7000 drive code, complete the following steps: \n\n1. Download the latest Drive firmware package for IBM Storwize V7000 from Fix Central. \n2. On the Storwize V7000 GUI, navigate to**Pools**→**Internal Storage**and select**All**\n**Internal.**", + "page_start": 717, + "page_end": 717, + "source_file": "sg247938.pdf" + }, + { + "text": "**13.4.4 Updating IBM Storwize V7000 drive code**\n\nAfter completing the Storwize V7000 software update as described in 13.4, “Software update” \non page 687, the firmware of the Storwize V7000 drives also must be updated. The upgrade \ntest utility identified that downlevel drives are in the system, as shown in Figure 13-25. \nHowever, this fact does not stop the system software from being performed. ", + "page_start": 717, + "page_end": 717, + "source_file": "sg247938.pdf" + }, + { + "text": "When considering performance for a system, always identify the bottleneck and, therefore, \nthe limiting factor of a specific system. This is a multidimensional analysis that needs to be \nperformed for each of your workload patterns. There can be different bottleneck components \nfor different workloads. \n\nWhen you are designing a storage infrastructure with the Storwize V7000 or implementing a \nStorwize V7000 in an existing storage infrastructure, you must ensure that the performance \nand capacity of the SAN, back-end disk subsystems, and Storwize V7000 meets \nrequirements for the set of known or expected workloads. \n\n**3.19.1 SAN**\n\nThe following Storwize V7000 models are supported for V8.2.1: \n\n(cid:2) Control enclosures: \n\n– 2076-524 \n– 2076-624 \n\n(cid:2) Expansion enclosures: \n\n– 2076-12F \n– 2076-24F ", + "page_start": 101, + "page_end": 101, + "source_file": "sg247938.pdf" + }, + { + "text": "**2.8 Useful IBM Storwize V7000 websites**\n\nSee the following IBM Storwize V7000 web pages for more information: \n\n(cid:2) IBM Support page: \n\nhttps://www.ibm.com/support/home/product/5402112/IBM_Storwize_V7000_(2076) \n\n(cid:2) IBM Storwize V7000 Unified and IBM Storwize V7000 Systems: \n\nhttps://www.ibm.com/support/home/product/5421300/IBM_Storwize_V7000_Unified \n\n(cid:2) IBM Storwize V7000 page support \n\nhttp://www-01.ibm.com/support/docview.wss?uid=ssg1S1003741 \n\n(cid:2) Direct attachment of IBM Storwize V7000 \n\nhttps://www-01.ibm.com/support/docview.wss?uid=ssg1S1005776 \n\n(cid:2) IBM Knowledge Center: \n\nhttps://www.ibm.com/support/knowledgecenter/en/ST3FR7_8.2.1/com.ibm.storwize.v7 \n000.821.doc/v7000_ichome.html ", + "page_start": 63, + "page_end": 63, + "source_file": "sg247938.pdf" + }, + { + "text": "**3.1 General planning rules**\n\n**Important:**At the time of this writing, the statements that are provided in this book are \naccurate but can change. Always verify any statements that are made in this book with the \nIBM Storwize V7000 supported hardware list, device driver, firmware, and recommended \nsoftware levels information that are available at the following websites: \n\n(cid:2) Support Information for Storwize V7000 \n(cid:2) IBM System Storage Interoperation Center (SSIC) \n\nTo maximize the benefit that is realized from the Storwize V7000, pre-installation planning \nmust include several important steps. These steps ensure that the Storwize V7000 provides \nthe best possible performance, reliability, and ease of management for your application \nneeds. The correct configuration also helps minimize downtime by avoiding changes to the \nStorwize V7000 and the storage area network (SAN) environment to meet future growth \nneeds. \n\nThis book is*not*intended to provide in-depth information about the described topics. For an \nenhanced analysis of advanced topics, see IBM System Storage SAN Volume Controller and \nStorwize V7000 Best Practices and Performance Guidelines, SG24-7521. ", + "page_start": 65, + "page_end": 65, + "source_file": "sg247938.pdf" + }, + { + "text": "Consider the following points when planning for the Storwize V7000: \n\n(cid:2) Collect and document the number of hosts (application servers) to attach to the Storwize \nV7000. Identify the traffic profile activity (read or write, sequential, or random), and the \nperformance requirements (bandwidth and input/output [I/O] operations per second \n[IOPS]) for each host. \n\n(cid:2) Decide whether you are going to use Storwize V7000 to virtualize external storage. If you \ndo, collect and document the following items: \n\n– Information on the back-end storage that exists in the environment and is intended to \n\nbe virtualized by the Storwize V7000. \n\n– Whether you must configure image mode volumes. If you want to use image mode \nvolumes, decide whether and how you plan to migrate them into managed mode \nvolumes. \n\n– Information about the planned new back-end storage to be virtualized by the Storwize \nV7000. \n\n– The required virtual storage capacity for fully provisioned and space-efficient (SE) \nvolumes. \n\n– The required storage capacity for: \n\n(cid:129) Local mirror copy (volume mirroring) \n(cid:129) Point-in-time copy (IBM FlashCopy) \n(cid:129) Remote copy (Metro Mirror and Global Mirror) \n(cid:129) Compressed volumes \n(cid:129) Encrypted volumes ", + "page_start": 65, + "page_end": 65, + "source_file": "sg247938.pdf" + }, + { + "text": "The license model is based on a*license-per-enclosure*concept that is familiar from the first \ngeneration of IBM Storwize V7000. However, the second generation offers more flexibility to \nmatch your specific needs. \n\n**Upgrade:**Installing or upgrading the code on the*first*generation of IBM Storwize V7000 to \nthe V8.2 does not change your license model or license needs. \n\nThe conceptual model of the licensing in IBM Storwize V7000 Gen2 and Gen2+ is shown in \nFigure 2-5. ", + "page_start": 39, + "page_end": 39, + "source_file": "sg247938.pdf" + }, + { + "text": "**3.16 SAN boot support**\n\nThe IBM Storwize V7000 supports SAN boot or start-up for AIX, Microsoft Windows Server, \nand other operating systems. Because SAN boot support can change, check this IBM System \nStorage Interoperation Center (SSIC) web page regularly. ", + "page_start": 99, + "page_end": 99, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "sg247938.pdf", + "query": "Is '1oijizer--10108453535318919918883384---jhjjzhiuhzrh--14584joiz///KK ' valid for a pool?", + "target_page": 218, + "target_passage": "Naming rules: When you choose a name for a pool, the following rules apply: \u0002 Names must begin with a letter. \u0002 The first character cannot be numeric. \u0002 The name can be a maximum of 63 characters. \u0002 Valid characters are uppercase letters (A - Z), lowercase letters (a - z), digits (0 - 9), underscore (_), period (.), hyphen (-), and space. \u0002 Names must not begin or end with a space. \u0002 Object names must be unique within the object type. For example, you can have a volume that is named ABC and a storage pool that is calledvolumes that are calledvolumes called ABC. \u0002 The default object name is valid (object prefix with an integer). \u0002 Objects can be renamed to their current names", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "IBM_2145:ITSO-V7000:superuser>lstargetportfc \nid WWPN WWNN port_id owning_node_id current_node_id nportid host_io_permitted virtualized protocol \n1 500507680140A288 500507680100A288 1 1 1 010A00 yes no scsi \n**2 500507680142A288 500507680100A288 1 1 1 010A02 yes yes scsi**\n**3 500507680144A288 500507680100A288 1 1 1 010A01 yes yes nvme**\n4 500507680130A288 500507680100A288 2 1 1 010400 yes no scsi \n**5 500507680132A288 500507680100A288 2 1 1 010401 yes yes scsi**\n**6 500507680134A288 500507680100A288 2 1 1 010402 yes yes nvme**\n7 500507680110A288 500507680100A288 3 1 1 010500 yes no scsi \n**8 500507680112A288 500507680100A288 3 1 1 010501 yes yes scsi**\n**9 500507680114A288 500507680100A288 3 1 1 010502 yes yes nvme**\n10 500507680120A288 500507680100A288 4 1 1 010A00 yes no scsi \n**11 500507680122A288 500507680100A288 4 1 1 010A02 yes yes scsi**\n**12 500507680124A288 500507680100A288 4 1 1 010A01 yes yes nvme**\n49 500507680C110009 500507680C000009 1 2 2 010500 yes no scsi \n**50 500507680C150009 500507680C000009 1 2 2 010502 yes yes scsi**\n**51 500507680C190009 500507680C000009 1 2 2 010501 yes yes nvme**\n52 500507680C120009 500507680C000009 2 2 2 010400 yes no scsi \n**53 500507680C160009 500507680C000009 2 2 2 010401 yes yes scsi**\n**54 500507680C1A0009 500507680C000009 2 2 2 010402 yes yes nvme**\n55 500507680C130009 500507680C000009 3 2 2 010900 yes no scsi \n**56 500507680C170009 500507680C000009 3 2 2 010902 yes yes scsi**\n**57 500507680C1B0009 500507680C000009 3 2 2 010901 yes yes nvme**\n58 500507680C140009 500507680C000009 4 2 2 010900 yes no scsi \n**59 500507680C180009 500507680C000009 4 2 2 010901 yes yes scsi**\n**60 500507680C1C0009 500507680C000009 4 2 2 010902 yes yes nvme**\nIBM_2145:ITSO-V7000:superuser> ", + "page_start": 346, + "page_end": 346, + "source_file": "sg247938.pdf" + }, + { + "text": "\n\nIOO- \n\ngo- \n\n00- \n\n70- \n\n60- \n\n50- \n\n40- \n\n30- \n\n20- \n\nIO- \n\nOr \n0 ", + "page_start": 258, + "page_end": 258, + "source_file": "00-80T-80.pdf" + }, + { + "text": "3,THIN_PROVISION_VOL_1,0,io_grp0,online,0,Pool0,100.00GB,striped,,,,,6005076400F58004980000 \n0000000005,0,1,empty,1,no,0,0,Pool0,no,yes,3,THIN_PROVISION_VOL_1, \n6,MIRRORED_SYNC_RATE_16,0,io_grp0,online,0,Pool0,10.00GB,striped,,,,,6005076400F58004980000 \n0000000008,0,1,empty,0,no,0,0,Pool0,no,yes,6,MIRRORED_SYNC_RATE_16, \n7,THIN_PROVISION_MIRRORED_VOL,0,io_grp0,online,0,Pool0,10.00GB,striped,,,,,6005076400F58004 \n9800000000000009,0,1,empty,1,no,0,0,Pool0,no,yes,7,THIN_PROVISION_MIRRORED_VOL, \n8,Tiger,0,io_grp0,online,0,Pool0,10.00GB,striped,,,,,6005076400F580049800000000000010,0,1,e \nmpty,0,no,0,0,Pool0,no,yes,8,Tiger, \n9,UNCOMPRESSED_VOL,0,io_grp0,online,0,Pool0,10.00GB,striped,,,,,6005076400F5800498000000000 \n00011,0,1,empty,0,no,1,0,Pool0,no,yes,9,UNCOMPRESSED_VOL, \n12,vdisk0_restore,0,io_grp0,online,0,Pool0,10.00GB,striped,,,,,6005076400F58004980000000000 \n000E,0,1,empty,0,no,0,0,Pool0,no,yes,12,vdisk0_restore, \n13,vdisk0_restore1,0,io_grp0,online,0,Pool0,10.00GB,striped,,,,,6005076400F5800498000000000 \n0000F,0,1,empty,0,no,0,0,Pool0,no,yes,13,vdisk0_restore1, ", + "page_start": 333, + "page_end": 333, + "source_file": "sg247938.pdf" + }, + { + "text": "IBM_Storwize:ITSO:superuser>lsvdisk -filtervalue mdisk_grp_name=Pool0 -delim , \nid,name,IO_group_id,IO_group_name,status,mdisk_grp_id,mdisk_grp_name,capacity,type,FC_id,FC \n_name,RC_id,RC_name,vdisk_UID,fc_map_count,copy_count,fast_write_state,se_copy_count,RC_cha \nnge,compressed_copy_count,parent_mdisk_grp_id,parent_mdisk_grp_name,formatting,encrypt,volu \nme_id,volume_name,function \n0,A_MIRRORED_VOL_1,0,io_grp0,online,0,Pool0,10.00GB,striped,,,,,6005076400F5800498000000000 \n00002,0,1,empty,0,no,0,0,Pool0,no,yes,0,A_MIRRORED_VOL_1, \n2,VOLUME_WITH_MIRRORED_COPY,0,io_grp0,online,0,Pool0,10.00GB,striped,,,,,6005076400F5800498 \n00000000000004,0,1,empty,0,no,0,0,Pool0,no,yes,2,VOLUME_WITH_MIRRORED_COPY, ", + "page_start": 332, + "page_end": 332, + "source_file": "sg247938.pdf" + }, + { + "text": "**Naming rules:**When you choose a name for a pool, the following rules apply: \n\n(cid:2) Names must begin with a letter. \n\n(cid:2) The first character cannot be numeric. \n\n(cid:2) The name can be a maximum of 63 characters. \n\n(cid:2) Valid characters are uppercase letters (A - Z), lowercase letters (a - z), digits (0 - 9), \nunderscore (_), period (.), hyphen (-), and space. \n\n(cid:2) Names must not begin or end with a space. \n\n(cid:2) Object names must be unique within the object type. For example, you can have a \n\nvolume that is named ABC and a storage pool that is calledvolumes that are \ncalledvolumes called ABC. \n\n(cid:2) The default object name is valid (object prefix with an integer). \n\n(cid:2) Objects can be renamed to their current names. \n\nThe new pool is created and is included in the list of storage pools with zero bytes, as shown \nin Figure 6-8. ", + "page_start": 217, + "page_end": 217, + "source_file": "sg247938.pdf" + }, + { + "text": "SELECT*WHERE {?customer pizza:OWLPropertyA4257yri73ff90rmbx ?pizza} \n\nand the second query would be: \n\nSELECT*\n\nWHERE {?customer a pizza:OWLClass23gkb0tk5kd30tm. \n\n70 ", + "page_start": 70, + "page_end": 70, + "source_file": "Protege5NewOWLPizzaTutorialV3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Note : It is not possible to add unencrypted arrays to an encrypted pool.
Table
", + "page_start": 680, + "page_end": 680, + "source_file": "sg247938.pdf" + }, + { + "text": ",020 - \n\nc \nE \nD \niii ,010 - \n.008 - \n\nyu’ .%2 - \n\nO” 0 \n:: \n2i \n- \n:% \n,002 - \n\n.OOl*\n\n0.1 ", + "page_start": 72, + "page_end": 72, + "source_file": "00-80T-80.pdf" + }, + { + "text": "VerDate Sep 11 2014 15:46 Aug 08, 2019 Jkt 089139 PO 00030 Frm 00002 Fmt 6580 Sfmt 6580 E:\\PUBLAW\\PUBL030.116 PUBL030 ", + "page_start": 1, + "page_end": 1, + "source_file": "PLAW-116publ30.pdf" + }, + { + "text": "IBM_Storwize:ITSO:superuser>lsvdisk -delim ' ' \nid name IO_group_id IO_group_name status mdisk_grp_id mdisk_grp_name capacity type FC_id \nFC_name RC_id RC_name vdisk_UID fc_map_count copy_count fast_write_state se_copy_count \nRC_change compressed_copy_count parent_mdisk_grp_id parent_mdisk_grp_name formatting \nencrypt volume_id volume_name function \n0 A_MIRRORED_VOL_1 0 io_grp0 online many many 10.00GB many \n6005076400F580049800000000000002 0 2 empty 0 no 0 many many no yes 0 A_MIRRORED_VOL_1 \n1 COMPRESSED_VOL_1 0 io_grp0 online 1 Pool1 15.00GB striped \n6005076400F580049800000000000003 0 1 empty 0 no 1 1 Pool1 no yes 1 COMPRESSED_VOL_1 \n2 vdisk0 0 io_grp0 online 0 Pool0 10.00GB striped 6005076400F580049800000000000004 0 1 \nempty 0 no 0 0 Pool0 no yes 2 vdisk0 \n3 THIN_PROVISION_VOL_1 0 io_grp0 online 0 Pool0 100.00GB striped \n6005076400F580049800000000000005 0 1 empty 1 no 0 0 Pool0 no yes 3 THIN_PROVISION_VOL_1 \n4 COMPRESSED_VOL_2 0 io_grp0 online 1 Pool1 30.00GB striped \n6005076400F580049800000000000006 0 1 empty 0 no 1 1 Pool1 no yes 4 COMPRESSED_VOL_2 \n5 COMPRESS_VOL_3 0 io_grp0 online 1 Pool1 30.00GB striped \n6005076400F580049800000000000007 0 1 empty 0 no 1 1 Pool1 no yes 5 COMPRESS_VOL_3 \n6 MIRRORED_SYNC_RATE_16 0 io_grp0 online many many 10.00GB many \n6005076400F580049800000000000008 0 2 empty 0 no 0 many many no yes 6 MIRRORED_SYNC_RATE_16 \n7 THIN_PROVISION_MIRRORED_VOL 0 io_grp0 online many many 10.00GB many \n6005076400F580049800000000000009 0 2 empty 2 no 0 many many no yes 7 \nTHIN_PROVISION_MIRRORED_VOL \n8 Tiger 0 io_grp0 online 0 Pool0 10.00GB striped 6005076400F580049800000000000010 0 1 \nnot_empty 0 no 0 0 Pool0 yes yes 8 Tiger \n12 vdisk0_restore 0 io_grp0 online 0 Pool0 10.00GB striped \n6005076400F58004980000000000000E 0 1 empty 0 no 0 0 Pool0 no yes 12 vdisk0_restore \n13 vdisk0_restore1 0 io_grp0 online 0 Pool0 10.00GB striped \n6005076400F58004980000000000000F 0 1 empty 0 no 0 0 Pool0 no yes 13 vdisk0_restore1 ", + "page_start": 310, + "page_end": 310, + "source_file": "sg247938.pdf" + } + ] + }, + { + "references": { + "source_file": "news4.pdf", + "query": "I want to start a company that automates kitchen tasks, does that sound like a good idea for 2025?", + "target_page": 1, + "target_passage": "Smart home automation Smart home automation has been around for a while, but AI is taking it to the next level. Imagine a home that not only follows your commands, but also anticipates your needs. Enhanced smart home systems can learn your daily routines and adjust settings accordingly, from lighting and temperature to security and entertainment, making your home smarter and more responsive than ever before.", + "chunk_present": { + "presence": true, + "index": 3 + } + }, + "top_chunk": [ + { + "text": "\n\nHOME \nAUTOMATION ", + "page_start": 17, + "page_end": 17, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Unlike previous waves of automation, many middle-class jobs may be eliminated by artificial \nintelligence;*The Economist*stated in 2015 that \"the worry that AI could do to white-collar jobs what \nsteam power did to blue-collar ones during the Industrial Revolution\" is \"worth taking seriously\".[262] \nJobs at extreme risk range from paralegals to fast food cooks, while job demand is likely to increase for \ncare-related professions ranging from personal healthcare to the clergy.[263] \n\nFrom the early days of the development of artificial intelligence, there have been arguments, for example, \nthose put forward by Joseph Weizenbaum, about whether tasks that can be done by computers actually \nshould be done by them, given the difference between computers and humans, and between quantitative ", + "page_start": 17, + "page_end": 17, + "source_file": "wikipedia3.pdf" + }, + { + "text": "McGaughey, E (2022),*Will Robots Automate Your Job Away? Full Employment, Basic Income,*\n*and Economic Democracy*(https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3044448), \np. 51(3) Industrial Law Journal 511–559, doi:10.2139/ssrn.3044448 (https://doi.org/10.213 \n9%2Fssrn.3044448), S2CID 219336439 (https://api.semanticscholar.org/CorpusID:2193364 \n39), SSRN 3044448 (https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3044448), \narchived (https://web.archive.org/web/20210131074722/https://papers.ssrn.com/sol3/paper \ns.cfm?abstract_id=3044448) from the original on 31 January 2021, retrieved 27 May 2023 \nMerkle, Daniel; Middendorf, Martin (2013). \"Swarm Intelligence\". In Burke, Edmund K.; Kendall, \nGraham (eds.).*Search Methodologies: Introductory Tutorials in Optimization and Decision*\n*Support Techniques*. Springer Science & Business Media. ISBN 978-1-4614-6940-7. \nMinsky, Marvin (1967),*Computation: Finite and Infinite Machines*, Englewood Cliffs, N.J.: ", + "page_start": 60, + "page_end": 60, + "source_file": "wikipedia3.pdf" + }, + { + "text": "(NC) As we look ahead to 2025, artificial intelligence (AI) continues to revolutionize our lives. From \nenhancing our daily routines to transforming entire industries, AI’s impact is undeniable. \n\nThese five innovations are set to shape our future, offering unprecedented convenience, efficiency and \npersonalization. \n\nAI-powered computing \nAI-powered computing, such as Intel-powered laptops – or AI PC – is at the forefront of technological \nadvancement. But what, exactly, is an AI PC? They’re computers that have AI built into their processors \n– also known as the brain of the computer – which optimizes performance, enhances security and \nprovides a more personalized experience as they learn from your usage patterns. For consumers, this \nmeans faster, smarter and more secure computing tailored to your individual needs. \n\nSmart home automation \nSmart home automation has been around for a while, but AI is taking it to the next level. Imagine a \nhome that not only follows your commands, but also anticipates your needs. Enhanced smart home \nsystems can learn your daily routines and adjust settings accordingly, from lighting and temperature to \nsecurity and entertainment, making your home smarter and more responsive than ever before. \n\nHealth and wellness \nThe health-care industry is seeing significant transformation. AI-driven health and wellness applications \ncan monitor vital signs, predict potential health issues, and even provide personalized fitness and \nnutrition plans. Wearable devices equipped with this technology can offer real-time health insights, \nhelping individuals make informed decisions about their well-being. ", + "page_start": 0, + "page_end": 0, + "source_file": "news4.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Autor, David H., “ Why Are There Still So Many Jobs? The History and Future of Workplace Automation ” ( 2015 ) 29 ( 3 ) Journal of Economic Perspectives 2.
Berlinak, Doxed DDDDDT. The Advert of the Algorithm ( https )/ active, orgalisabulatentorbabganth GRODerf ), Harcoutf Boxkx. SBN1FTH - 2 ( SSO - 22F2, B, CCC, C - REMSE6E ) [ https :// creatch. extrl3 calcifying / client / distribution / dil
Boyle, James, The Line : Al and the Future of Personhood [ https :// direct. mit. edu / books / book / bits 97The - LineAl - and - the - Future - of - Personhood ), MIT Press, 2024
Culkying Agrength, “ Houdy for Richobach ” How to Think about the Fusure of a \" Foreignight Affairs, visit BB, no 4 Cultural Aspacatic D23350, p. 255 : GB : Glycotinan of Computing, whites ( in what might be called “ Dyscrin Luxa ”) that “ Any yy a
Evans, Woody ( 2012 ). “ Posithuman Rights. Dimensions of Transhuman Worlds ” ( https :// dois. org / 10.52 ). SODRSSPRey TK_035.12.02.02.02.02.0372.18hmikaltant 10.00 ( 3 ). dis1315209 / ey.” YK, 2015.612.06872 ( https.// doi. org / 030
Fives, Methani ( 22 heatern 2013 ), 12 ), 12 ), participants inhibitor ( method ) treatment ( or 2016 ), participants ( included ), and and approaches ( includes ), and anythout and anythesis ( includes ), and anythout and anythout and anythop
Gartter, Jost, Jost 2012 ; \" Welpedia ' s Moment of Truit : Can the orilex encyclopedia help teach A. I. chabitato to get their factor, right — without destroying boil in the process *\" New York Trives. Algoamine [ 46.9, 9.9, 9.9, 9.9, 90 ]. Hist
", + "page_start": 66, + "page_end": 66, + "source_file": "wikipedia3.pdf" + }, + { + "text": "**The top AI-powered tech trends in 2025**\n\n", + "page_start": 0, + "page_end": 0, + "source_file": "news4.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
Simon, H. A. [ 1565 ], The Shape of Automation for Men and Management, New York : Harper & Row
Simonite. They Did nation 2233.1, Yewo - Coughe Pate to Solve Arb5cal Intelligeneses? ( Mttps :// www. technologyenesescomf203 ∆ M / GST2.2, Estallow - go - glycales - blands - solve - softilitude - strifingence ). MTTechnology Rehexies /
Strokin, Croskin, CLE Manior 2003, Chola ( CET ) a, Creator ( Bya Subjeaver on A ) Helductnalors and A Democracycles ; “ Ifitps ; Newebreaccomisless ; com / sleepimis / craigamin / CGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGA - 4 - positivea
Smoller, Stephen W, Zhang, Hong, Varg, UBAJ, “ Content based video indexing and retrieval ”. ECEE Multifedie. I ( 2 ): 62 – 72.66 / 13.1209533111553 ( https :// dois. org / 20.120992F353.31.16555 ). S2COD 30053 ( https :// dpi. 34 ) psycholan
Stistromoral : New, CHSSLAs inductive inferience Mechine ( Hbp :// world odd comr - stylinding ) PDFS, Dastrosult Summer Research Conference on Additioal intelliperos. Actived ( Intracy ) well, active gard ( QDL ) DSASSLT, NR / Ntrity / he
Standard Linesty ( 2023 ). \" Anglical treligancy, tigest, fingor, \"[ 20 ]. Trugery [ 52.54 ] cand Growternance \" ( https :// asknows. danford. edu / ve - content / uplinado / 2023 / 3414... A / virubu - Regort ( 222 ).\" pulmol \" ( 159 )...) and \"[ 452
Tac, Jaritua ; Tan, Teniu ( Z005 ), Affective Computing and Intelligent Interaction. Affective Computing A Review Lecture Notes in Computer Science, Vid, STRI, Springer gt, BBL - 995, dex Lecture Notes in Computer Science, Vid, STRI, Spr
Taylot, Jooth, Herin, Airw, Airw, CD3221 *, “ Cultulhaherer of A Govelhy Heriton quits Goodge and warrs syver dangers of miniformation ” ( Hzo ; Nwescheguardiac contylecthrology / CED20ma / GED20mar / GShorther - birther - profilter of an
Thromposin, Cherelix ( 23.2 anaury 2014 ), “ What, Usina Will the Finibotic Takes ”[ Mesh ] however, from com / business / arc01ive / 2012 / 4 / 12 / 4 / 106 / yidts - mill - the rotar - take / 203239 ]. The Allantic Activest ( 70ths ), Health archner, H
Thro. ESRen ( 12935 ). Pitabotics : The Marriage of Computers and Machiness ( https :// archive, org / let algiotider_TFRDISGSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS
Two was Rnk ( t ): Toestimmber 202 ): “ Transformers Revalaboration / et al. What Will Regidace Therm ” ( Yebpul ’ teletes context - statest / distensic / 2000 / disease / mind - antibiotics - restilated - antilated replace - there ). Forchivede
", + "page_start": 63, + "page_end": 63, + "source_file": "wikipedia3.pdf" + }, + { + "text": "**Finance**\n\nFinance is one of the fastest growing sectors where applied AI tools are being deployed: from retail \nonline banking to investment advice and insurance, where automated \"robot advisers\" have been in use \nfor some years.[161] \n\nWorld Pensions experts like Nicolas Firzli insist it may be too early to see the emergence of highly \ninnovative AI-informed financial products and services: \"the deployment of AI tools will simply further \nautomatise things: destroying tens of thousands of jobs in banking, financial planning, and pension advice \nin the process, but I'm not sure it will unleash a new wave of [e.g., sophisticated] pension \ninnovation.\"[162] ", + "page_start": 10, + "page_end": 10, + "source_file": "wikipedia3.pdf" + }, + { + "text": "A statement of two researchers from the Massachusetts Institute of Technology shortly summarises this: \n\n*‘Technologies such as payroll-processing and inventory-control software, factory automation, computer-*\n*controlled machining centers, and scheduling tools have replaced workers on the shop floor and in*\n*clerical tasks and rote information processing. By contrast, big data, analytics, and high-speed*\n*communications have enhanced the output of people with engineering, creative, and design skills and*\n*made them more valuable. The net effect has been to decrease the demand for low-skilled information*\n*workers while increasing the demand for highly skilled ones.’*274 \n\n**Digital technologies can enhance prevention at workplaces.**They can help to separate workers \nfrom hazardous working situations, facilitate better and innovative ways of monitoring exposure, and \nmight improve the quality of work by relieving workers from repetitive or routine tasks. Digital \ntechnologies may also create higher levels of autonomy and flexibility or facilitate the access of a more \ndiverse workforce to the labour market, in particular vulnerable groups such as disabled people, ageing \n\nEuropean Agency for Safety and Health at Work – EU-OSHA \n104 ", + "page_start": 103, + "page_end": 103, + "source_file": "EN-Annex II - EU-OSHA websites, SM accounts and tools.pdf" + }, + { + "text": "the future to warrant research or that humans will be valuable from the perspective of a superintelligent \nmachine.[282] However, after 2016, the study of current and future risks and possible solutions became a \nserious area of research.[283] ", + "page_start": 19, + "page_end": 19, + "source_file": "wikipedia3.pdf" + } + ] + }, + { + "references": { + "source_file": "news4.pdf", + "query": "I want to help my parents who are in residential care, are there any trendy AI-related devices I could help them with? ", + "target_page": 1, + "target_passage": "Wearable devices equipped with this technology can offer real-time health insights, helping individuals make informed decisions about their well-being", + "chunk_present": { + "presence": true, + "index": 0 + } + }, + "top_chunk": [ + { + "text": "(NC) As we look ahead to 2025, artificial intelligence (AI) continues to revolutionize our lives. From \nenhancing our daily routines to transforming entire industries, AI’s impact is undeniable. \n\nThese five innovations are set to shape our future, offering unprecedented convenience, efficiency and \npersonalization. \n\nAI-powered computing \nAI-powered computing, such as Intel-powered laptops – or AI PC – is at the forefront of technological \nadvancement. But what, exactly, is an AI PC? They’re computers that have AI built into their processors \n– also known as the brain of the computer – which optimizes performance, enhances security and \nprovides a more personalized experience as they learn from your usage patterns. For consumers, this \nmeans faster, smarter and more secure computing tailored to your individual needs. \n\nSmart home automation \nSmart home automation has been around for a while, but AI is taking it to the next level. Imagine a \nhome that not only follows your commands, but also anticipates your needs. Enhanced smart home \nsystems can learn your daily routines and adjust settings accordingly, from lighting and temperature to \nsecurity and entertainment, making your home smarter and more responsive than ever before. \n\nHealth and wellness \nThe health-care industry is seeing significant transformation. AI-driven health and wellness applications \ncan monitor vital signs, predict potential health issues, and even provide personalized fitness and \nnutrition plans. Wearable devices equipped with this technology can offer real-time health insights, \nhelping individuals make informed decisions about their well-being. ", + "page_start": 0, + "page_end": 0, + "source_file": "news4.pdf" + }, + { + "text": "\n\nHOME \nAUTOMATION ", + "page_start": 17, + "page_end": 17, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "**Applications**\n\nAI and machine learning technology is used in most of the essential applications of the 2020s, including: \nsearch engines (such as Google Search), targeting online advertisements, recommendation systems \n(offered by Netflix, YouTube or Amazon), driving internet traffic, targeted advertising (AdSense, \nFacebook), virtual assistants (such as Siri or Alexa), autonomous vehicles (including drones, ADAS and \nself-driving cars), automatic language translation (Microsoft Translator, Google Translate), facial \nrecognition (Apple's Face ID or Microsoft's DeepFace and Google's FaceNet) and image labeling (used \nby Facebook, Apple's iPhoto and TikTok). The deployment of AI may be overseen by a Chief automation \nofficer (CAO). ", + "page_start": 8, + "page_end": 8, + "source_file": "wikipedia3.pdf" + }, + { + "text": "\nCONNECTED HOME ", + "page_start": 11, + "page_end": 11, + "source_file": "NYSE_RCI_2013.pdf" + }, + { + "text": "Financial services \nAI is also making waves in the financial sector, offering smarter and more secure ways to manage \nmoney. From AI-driven investment platforms that provide personalized financial advice to fraud \ndetection systems that protect against cyber threats, AI can analyze vast amounts of data to identify \ntrends and make more informed financial decisions. \n\nEnhanced education \nIn education, enhanced learning tools provide personalized learning experiences that adapt to each \nstudent’s strengths and weaknesses. This technology can offer real-time feedback, helping students \nimprove their skills more effectively. Additionally, AI can assist educators by automating administrative \ntasks and providing insights into student performance, allowing for more focused and effective \nteaching. \n\nLearn more at intel.com/aipc. \n\nwww.newscanada.com \n\nWord Count: 346 ", + "page_start": 0, + "page_end": 0, + "source_file": "news4.pdf" + }, + { + "text": "**41**. Zaretsky J, Kim JM, Baskharoun S, et al. Generative artificial intelligence to transform inpatient discharge \nsummaries to patient-friendly language and format. JAMA Netw Open. 2024;7(3):e240357. doi:10.1001/ \njamanetworkopen.2024.0357 \n\n**42**. Zhou C, Liu P, Xu P, et al. Lima: less is more for alignment. arXiv. Preprint posted online May 18, 2023. doi:10. \n48550/arXiv.2305.11206 ", + "page_start": 10, + "page_end": 10, + "source_file": "pubmed8.pdf" + }, + { + "text": "nlinePubs-Nils/General%20Essays/AIMag04-04-002.pdf) (PDF).*AI Magazine*.**1**(1). \nArchived (https://web.archive.org/web/20200817194457/http://ai.stanford.edu/~nilsson/Onlin \nePubs-Nils/General%20Essays/AIMag04-04-002.pdf) (PDF) from the original on 17 August \n2020. Retrieved 22 August 2020. Presidential Address to the Association for the \nAdvancement of Artificial Intelligence. \n\nNRC (United States National Research Council) (1999). \"Developments in Artificial \n\nIntelligence\".*Funding a Revolution: Government Support for Computing Research*. National \nAcademy Press. \n\nOmohundro, Steve (2008).*The Nature of Self-Improving Artificial Intelligence*. presented and \n\ndistributed at the 2007 Singularity Summit, San Francisco, CA. \n\nOudeyer, P-Y. (2010). \"On the impact of robotics in behavioral and cognitive sciences: from \n\ninsect navigation to human cognitive development\" (http://www.pyoudeyer.com/IEEETAMD \nOudeyer10.pdf) (PDF).*IEEE Transactions on Autonomous Mental Development*.**2**(1): 2– \n16. doi:10.1109/tamd.2009.2039057 (https://doi.org/10.1109%2Ftamd.2009.2039057). \nS2CID 6362217 (https://api.semanticscholar.org/CorpusID:6362217). Archived (https://web. \narchive.org/web/20181003202543/http://www.pyoudeyer.com/IEEETAMDOudeyer10.pdf) \n(PDF) from the original on 3 October 2018. Retrieved 4 June 2013. ", + "page_start": 61, + "page_end": 61, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Unlike previous waves of automation, many middle-class jobs may be eliminated by artificial \nintelligence;*The Economist*stated in 2015 that \"the worry that AI could do to white-collar jobs what \nsteam power did to blue-collar ones during the Industrial Revolution\" is \"worth taking seriously\".[262] \nJobs at extreme risk range from paralegals to fast food cooks, while job demand is likely to increase for \ncare-related professions ranging from personal healthcare to the clergy.[263] \n\nFrom the early days of the development of artificial intelligence, there have been arguments, for example, \nthose put forward by Joseph Weizenbaum, about whether tasks that can be done by computers actually \nshould be done by them, given the difference between computers and humans, and between quantitative ", + "page_start": 17, + "page_end": 17, + "source_file": "wikipedia3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
g - machines - the - search - for - antificial - intelligence ), Destillations. Vol. 2, no. 2, pp. 14 – 21. Activied from the original ( https :// www. sciencehystory. org / distillations / magazinethhinking - machines - the - search - first - in
Robitzoki, Dan ( 5 : Eegraember 2012b ), “ Five experts share what scares them the most about Ai ” ( fibro.: Raurums consistical - iteliapence - experts feasiang ). Actived ( fittps ; Fields and hives or givelocal collaboration, contractiol
Rose, Stever ( 12 auly 2023 ). “ Al Utopia or dystopiat ”. The Guardian Weekly, pp. 42 – 43.
Russell, Stuart ( 2013 ), Human Compasible : Artificial Intellipence and the Problem of Control. United Studen : Vilong 1999 - 1 - 5 - 5 - 5295 - 5961 - 3 DUL1 L105354 - 532 [ Mps :// search. month. a. l. ongoits / 13894322 ]
Salmana, Mctaxe ( LD4 Aquest 233.1 “ Stepphere Heaving, EDr1Adult, and BEBCades Matral Attibual Interlappince ” ( Hapu / Asticular Trigus / Astractural GST / 2012 / 2002 / 2002 / 2002 / 2009 / 2009 / 2010 / 2008 / 2009 / 1008 / 800 / gets / 1000 / gen
Sample : lan ( 13 howembr 2117 ): Computer says networky making Asia ( accountable and transparent is crucial *) these class therapian conclusions / RTT / Tron / Efficiompate - up - no why raking - as loss be accountable and managem in countabi
Rothman. Devinis ( 7 Drotobes 7070 ): “ Englisho13 ( MEF, Funjlanations and the Mathernation Behind I ” [ Mipos. Shewix codemotion comfronagazinesia - millitries - englanable - eji ). Codemotion Anchieved ( Mitracs / levels and / orgivedo
Scaesellai, Brian ( ZXG ), “ Theory of mind for a humanoid robot ”. Autonomous Robots 12 ( 1 ) 1.13 – 24 – 24 doi : 12.12.12.12.12.12.12.12.12.12.12.12.12.12.12.12.13.12.18.18.18.18.16.13.10.13.10.29.29.49.9, 9.9, 9.9, 9.9, 9.9, 9.1
Schmittudes, J, DDSST These Learning in Hearand Networks : Jo Cherviewa : Neurol Networks. KL in EN - 2.7, eY, BASA 7F6S9 ( Mgs : 0.49.0. 93 - 0.93 - 0.93 - 0.93 - 0.93 - 0.93 - 0.93 - 0.45 - 0.45 - 0.45 - 0.45 - 0.45 - 0.45 - 0.45 - 0.45 - 0.45 - 0.06 - 0.06 -
Schmidhuber, Jirgen ( DDZ2 ). “ Arrostated History of Modern AI and Despo Learning ” ( Ithtacs // oeco lesion Is abia, chi - sienzen )). Archived ( Ithps : Ulweb archives organish / 2000712724449000 ( Ethnologies ) e. general ( Ethnologial or
Sexarker, John ( 13500 ), \" Mind, Brains and Programme \" ( Meta -),\"( Mata -) cogarettes, urganT,\" DDD20.1, ES12.52, S23.48, pfl ) ( PFP2F, ↑ Masional and Brain Sismonyl, 37.47.47.34.7, 34.17.48.15.127.19.151.127.1921.282.55100017,
Seeke, John 15090, Mind Janquage and society ( https :// attps :// archieve. grobeskel / chrondlanguaaenor / cl3Deter ); Netw Y009 ; Basks. GBV : F79 - 3 - 4955 = 452 ; 2, OCLC 22287 ( fttps ); Test ); Therefritation : clinics : CS35 ( fetally ); Ac
", + "page_start": 62, + "page_end": 62, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Artificial intelligent (AI) agents are software entities designed to \nperceive their environment, make decisions, and take actions \nautonomously to achieve specific goals. These agents can interact \nwith users, their environment, or other agents. AI agents are used \nin various applications, including virtual assistants, chatbots, \nindustrial \nautonomous vehicles, game-playing systems, and \nrobotics. AI agents operate within the constraints of their \nprogramming, available computational resources, and hardware \nlimitations. This means they are restricted to performing tasks \nwithin their defined scope and have finite memory and processing \ncapabilities. In real-world applications, AI agents often face time \nconstraints for decision-making and action execution. Many AI \nagents incorporate learning algorithms, enabling them to improve \ntheir performance over time through experience or training. Using \nmachine learning, AI agents can adapt to new situations and \noptimise their behaviour for their designated tasks.[175][176][177] ", + "page_start": 11, + "page_end": 11, + "source_file": "wikipedia3.pdf" + } + ] + }, + { + "references": { + "source_file": "news4.pdf", + "query": "Is the topic of finance trending among AI topics for 2015 in Canada?", + "target_page": 1, + "target_passage": "Financial services", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "**Finance**\n\nFinance is one of the fastest growing sectors where applied AI tools are being deployed: from retail \nonline banking to investment advice and insurance, where automated \"robot advisers\" have been in use \nfor some years.[161] \n\nWorld Pensions experts like Nicolas Firzli insist it may be too early to see the emergence of highly \ninnovative AI-informed financial products and services: \"the deployment of AI tools will simply further \nautomatise things: destroying tens of thousands of jobs in banking, financial planning, and pension advice \nin the process, but I'm not sure it will unleash a new wave of [e.g., sophisticated] pension \ninnovation.\"[162] ", + "page_start": 10, + "page_end": 10, + "source_file": "wikipedia3.pdf" + }, + { + "text": "FAccT ’21, March 3–10, 2021, Virtual Event, Canada \n\nAdvances in Artificial Intelligence, EAAI 2020, New York, NY, USA, February 7-12, \n2020. AAAI Press, 8968–8975. https://aaai.org/ojs/index.php/AAAI/article/ \nview/6428 ", + "page_start": 13, + "page_end": 13, + "source_file": "arxiv5_ccby4license.pdf" + }, + { + "text": "Financial services \nAI is also making waves in the financial sector, offering smarter and more secure ways to manage \nmoney. From AI-driven investment platforms that provide personalized financial advice to fraud \ndetection systems that protect against cyber threats, AI can analyze vast amounts of data to identify \ntrends and make more informed financial decisions. \n\nEnhanced education \nIn education, enhanced learning tools provide personalized learning experiences that adapt to each \nstudent’s strengths and weaknesses. This technology can offer real-time feedback, helping students \nimprove their skills more effectively. Additionally, AI can assist educators by automating administrative \ntasks and providing insights into student performance, allowing for more focused and effective \nteaching. \n\nLearn more at intel.com/aipc. \n\nwww.newscanada.com \n\nWord Count: 346 ", + "page_start": 0, + "page_end": 0, + "source_file": "news4.pdf" + }, + { + "text": "Artificial intelligence was founded as an academic discipline in 1956,[6] and the field went through \nmultiple cycles of optimism throughout its history,[7][8] followed by periods of disappointment and loss of \nfunding, known as AI winters.[9][10] Funding and interest vastly increased after 2012 when deep learning \noutperformed previous AI techniques.[11] This growth accelerated further after 2017 with the transformer \narchitecture,[12] and by the early 2020s many billions of dollars were being invested in AI and the field \nexperienced rapid ongoing progress in what has become known as the AI boom. The emergence of \nadvanced generative AI in the midst of the AI boom and its ability to create and modify content exposed \nseveral unintended consequences and harms in the present and raised concerns about the risks of AI and \nits long-term effects in the future, prompting discussions about regulatory policies to ensure the safety \nand benefits of the technology. ", + "page_start": 0, + "page_end": 0, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Norton & Company. ISBN 978-0-3938-6833-3. OCLC 1233266753 (https://search.worldcat.o \nrg/oclc/1233266753). \n\nCiresan, D.; Meier, U.; Schmidhuber, J. (2012). \"Multi-column deep neural networks for image \nclassification\".*2012 IEEE Conference on Computer Vision and Pattern Recognition*. \npp. 3642–3649. arXiv:1202.2745 (https://arxiv.org/abs/1202.2745). \ndoi:10.1109/cvpr.2012.6248110 (https://doi.org/10.1109%2Fcvpr.2012.6248110). ISBN 978- \n1-4673-1228-8. S2CID 2161592 (https://api.semanticscholar.org/CorpusID:2161592). \n\nClark, Jack (2015b). \"Why 2015 Was a Breakthrough Year in Artificial Intelligence\" (https://www. \nbloomberg.com/news/articles/2015-12-08/why-2015-was-a-breakthrough-year-in-artificial-int \nelligence).*Bloomberg.com*. Archived (https://web.archive.org/web/20161123053855/https:// \nwww.bloomberg.com/news/articles/2015-12-08/why-2015-was-a-breakthrough-year-in-artific \nial-intelligence) from the original on 23 November 2016. Retrieved 23 November 2016. ", + "page_start": 54, + "page_end": 54, + "source_file": "wikipedia3.pdf" + }, + { + "text": "Deep learning began to dominate industry benchmarks in 2012 and was adopted throughout the field.[11] \nFor many specific tasks, other methods were abandoned.[y] Deep learning's success was based on both \nhardware improvements (faster computers,[347] graphics processing units, cloud computing[348]) and \naccess to large amounts of data[349] (including curated datasets,[348] such as ImageNet). Deep learning's \nsuccess led to an enormous increase in interest and funding in AI.[z] The amount of machine learning \nresearch (measured by total publications) increased by 50% in the years 2015–2019.[306] \n\nIn 2016, issues of fairness and the misuse of technology were catapulted into center stage at machine \nlearning conferences, publications vastly increased, funding became available, and many researchers re- \nfocussed their careers on these issues. The alignment problem became a serious field of academic \nstudy.[283] \n\nIn the late teens and early 2020s, AGI companies began to deliver programs that created enormous \ninterest. In 2015, AlphaGo, developed by DeepMind, beat the world champion Go player. The program \ntaught only the game's rules and developed a strategy by itself. GPT-3 is a large language model that was \nreleased in 2020 by OpenAI and is capable of generating high-quality human-like text.[350] ChatGPT, \nlaunched on November 30, 2022, became the fastest-growing consumer software application in history, \ngaining over 100 million users in two months.[351] It marked what is widely regarded as AI's breakout \nyear, bringing it into the public consciousness.[352] These programs, and others, inspired an aggressive AI \nboom, where large companies began investing billions of dollars in AI research. According to AI Impacts, \nabout $50 billion annually was invested in \"AI\" around 2022 in the U.S. alone and about 20% of the new ", + "page_start": 22, + "page_end": 22, + "source_file": "wikipedia3.pdf" + }, + { + "text": " See e.g. Trendacosta, Katherine and Doctorow, Cory. “AI Art Generators and the Online Image Market.” \n\n11 \n*Electronic Frontier Foundation*, 3 Apr. 2023, www.eff.org/deeplinks/2023/04/ai-art-generators-and- \nonline-image-market; Narechania, Tejas N., and Sitaraman, Ganesh. “An Antimonopoly Approach to \nGoverning Artificial Intelligence.”*SSRN Electronic Journal*, 2023, cdn.vanderbilt.edu/vu-URL/wp-content/ \nuploads/sites/412/2023/10/09151452/Policy-Brief-2023.10.08-.pdf, https://doi.org/10.2139/ \nssrn.4597080. Accessed 25 Feb. 2024. \n\n See white paper for Google’s Gemini models https://arxiv.org/pdf/2312.11805.pdf — “Gemini models \n12 \nare trained on a dataset that is both multimodal and multilingual. Our pretraining dataset uses data from \nweb documents, books, and code, and includes image, audio, and video data.” ", + "page_start": 6, + "page_end": 6, + "source_file": "creative_common_ai.pdf" + }, + { + "text": "CNA (12 January 2019). \"Commentary: Bad news. Artificial intelligence is biased\" (https://www.c \nhannelnewsasia.com/news/commentary/artificial-intelligence-big-data-bias-hiring-loans-key- \nchallenge-11097374).*CNA*. Archived (https://web.archive.org/web/20190112104421/https:// \nwww.channelnewsasia.com/news/commentary/artificial-intelligence-big-data-bias-hiring-loan \ns-key-challenge-11097374) from the original on 12 January 2019. Retrieved 19 June 2020. \n\nCybenko, G. (1988). Continuous valued neural networks with two hidden layers are sufficient \n\n(Report). Department of Computer Science, Tufts University. \n\nDeng, L.; Yu, D. (2014). \"Deep Learning: Methods and Applications\" (http://research.microsoft.c \nom/pubs/209355/DeepLearning-NowPublishing-Vol7-SIG-039.pdf) (PDF).*Foundations and*\n*Trends in Signal Processing*.**7**(3–4): 197–387. doi:10.1561/2000000039 (https://doi.org/10. \n1561%2F2000000039). Archived (https://web.archive.org/web/20160314152112/http://resea \nrch.microsoft.com/pubs/209355/DeepLearning-NowPublishing-Vol7-SIG-039.pdf) (PDF) \nfrom the original on 14 March 2016. Retrieved 18 October 2014. ", + "page_start": 54, + "page_end": 54, + "source_file": "wikipedia3.pdf" + }, + { + "text": "\n \n \n \n \n [html]\n
160.Alex McFarland : 7 Best Al for Math Tools, ( https :// www. unite. asibest - or - matly - tools / Archived ( https :// web. antchive. org / web / 2024 / 3011.1255 / https :// www. unlte. ail / best - toth - tocis /) 12. Sember 2024 at the Wayback Machind
161.Mathew Finio & Amanda Doxmie : IBM Think 2024 Primer, “ What is Artificial Intelligence ( A ) in Finance?” B Dec. 2023
162.M. Nocalas, J. Firsts ' Pensions Apeticumpean Persisons massione, \" Artificial Intellipencer Ask the Industry \" May June 2224 https :// widewscips : organism - thyracer - imposatpine emergence. organism - embryone - are regulation - wit
163.Congressional Research Service ( 20.59 ). Artificial Intelligence and National Security ( https :// f as. org / sgologocra / natesec / PHS : 178 pdf ) ( PDF ). Washirgizin, DC. Congressional Research Service PD - notice
164.Styusar, Vadym ( 20.5 ), Artificial intelligence as the basis of future control networks ( Preprint ) do : L0.120.40 / R5 :- 2.2. 30247 : 50087 ( frttps :// lbth. org / 10.120.40 / K2FRG.- 2.2. 30247.5007 ).
165.Irap, Amjad ( 2April 2024 ). “ Lawender ”. The AI machine : directing torae! toombing spree in Gout.” ( http :// www. 972mag. com / laxenseler.: al - stratell - arm5 - alazal ]. + FZT. ktagazone. Retrieved 5 April 2024.
166.Davies, Hanry McKernan, Betham, Sabbagh, Dun ( 1. December 2023 ) *, “ The Gosspel?, how tissue I user A to select bombing targets in Caspase? ( fitts :// www. hhequardian. com / wwithDDD2 ) deci ( DLI ). the gozgel - how - stratem - de - b - selecta
167.Marti, 3 Werner ( 10 August 2ED4 ). Tyrohnen haben den Kneg in der Uleraine revolutionier, doch sind emphytich authorsender – denhalls tollers sleep jetch autonom operieners? ( http :// www. rtc.). Wernationalicle - autonomy
168.Newssm, Gawin ; Weber, Shirley N, ( 5 Seppenther 2023 ): \" Descuber, Crider 9 : 122 : 27 : < underline > Newssm, Gaving , Greephrelled < underline > Criterial , Greather 2013 , Greather 2013
169.Pinaya, Walter H L.; Graham, Mark S.; Kerhor, Etcr Tubosia, Petru - Dankel, Dafflum, Zesticle, Petrahadez, Vigible, Salchcle, Pedto, Work, Jilla, Bal Colsia, Pedd F, Pizel, Adhara, ZE22, T, Senerative A for Medical Imaging : extendingh
170.GAffits. Errim, Metz, Caske ( CT. Banuary 2022 ), “ Adorengic Suid to Be Cleasing In ser SDSSSMillion in Serious A. I. Funding ”, (“ Itipp2 / Alwayshess GSNSEQLEDEDEDEDEDEDEDEDEDETEDETEECTEREONSQUREREINSENSNSTINEONSTINEONSTINEON
171.Lencer, Nate : Bases : Disease, Disease, Devalen, Jackker ( LT ) March 2022 ), “ AChysed Sheet to ARscaccords and TPAMexional ”, ( Mipsychites, Minordensplaccombers and electron - biologic heart feelings ”, ( Mipsychitres, Minorehensps
", + "page_start": 38, + "page_end": 38, + "source_file": "wikipedia3.pdf" + }, + { + "text": "The two most widely used textbooks in 2023 (see the Open Syllabus (https://explorer.opensyllabus.org/re \nsult/field?id=Computer+Science)): \n\nRussell, Stuart J.; Norvig, Peter (2021).*Artificial Intelligence: A Modern Approach*(4th ed.). \nHoboken: Pearson. ISBN 978-0-1346-1099-3. LCCN 20190474 (https://lccn.loc.gov/201904 \n74). \nRich, Elaine; Knight, Kevin; Nair, Shivashankar B (2010).*Artificial Intelligence*(3rd ed.). \nNew Delhi: Tata McGraw Hill India. ISBN 978-0-0700-8770-5. \n\nThe four most widely used AI textbooks in 2008: ", + "page_start": 51, + "page_end": 51, + "source_file": "wikipedia3.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_CHK_2010.pdf", + "query": "Is there any chance that my cousin has been granted financial aid from Chesapeak Energy? He's studying at a college in Oklahoma.", + "target_page": 26, + "target_passage": "hat’s why we gave $1.0 million to establish the Chesapeake Energy dormitory for students at the Oklahoma School for Science and Mathematics (OSSM", + "chunk_present": { + "presence": true, + "index": 2 + } + }, + "top_chunk": [ + { + "text": "We also established the Chesapeake Energy Presidential Scholars Pro- \ngram at the Oklahoma City University Meinders School of Business, making \na $5.0 million commitment to be distributed over the next five years. The \nChesapeake Scholars Program will provide up to $25,000 per year in tuition \n**24%**", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "future, help them put a certain amount \nfuture, help them put a certain amount anywhere. \nanywhere. see that progress is possible. We must \nsee that progress is possible. We must \n\n**Kunibe**: I see the environmental business \n: I see the environmental business aside for later. If this kind of service works \naside for later. If this kind of service works ensure that students are educated with a \nensure that students are educated with a \n\nwell in Japan, I think we might be able to \nwell in Japan, I think we might be able to as a linchpin of our CSR program, which we \nas a linchpin of our CSR program, which we global perspective and a sense of hope \nglobal perspective and a sense of hope \n\nhelp China and Thailand too, where the \nhelp China and Thailand too, where the can promote through our core businesses. \ncan promote through our core businesses. as well. \nas well. \n\nsa me problem — a shr ink ing, ag ing \nsa me problem — a shr ink ing, ag ing F o r e x a m p l e , S M B C h a s c r e a t e d a \nF o r e x a m p l e , S M B C h a s c r e a t e d a There is trust in the strength of Japanese \nThere is trust in the strength of Japanese ", + "page_start": 4, + "page_end": 4, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**Educational Impact**\nWe are also proud to help prepare tomorrow’s leaders today. In 2010 \nChesapeake supported universities, schools, academic chairs, scholarships \nand other educational programs with contributions totaling $5.4 million. \n\nChesapeake also makes contributions that help improve lives and \neconomies in cities where we operate: $25 million in 2010 alone. For ex- \nample, this past year we donated $200,000 to establish the Chesapeake \nEnvironmental and Recycling Center at Goodwill Industries of Central \nOklahoma. The center will provide an additional 80 jobs to disabled Okla- \nhomans, as well as help Goodwill recycle 10 million pounds a year, which \n\nInvesting in programs that promote technology and innovation is a \nkey to our country’s success. That’s why we gave $1.0 million to establish \nthe Chesapeake Energy dormitory for students at the Oklahoma School for \nScience and Mathematics (OSSM), a public, tuition-free, residential high \nschool located in Oklahoma City for juniors and seniors with exceptional \nabilities. The extremely competitive school is helping train the next gen- \neration of scientists and mathematicians. \n\n**Chesapeake’s $25 million**\n**of charitable giving in 2010**\n\n**15%**\n\n**7%**\n**54%**", + "page_start": 25, + "page_end": 25, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "\n \n \n \n \n [html]16.Borrowings continuedCorporate loan facilityConvertible revolving credit facilityThe Group has a three year secured loan facility with Investec with a limit of A $ 40.000.000 ( 10 ) June 2012 : A $ 50.000, of which A $ 20.000.000 has been drawn down as at 30 June 20.3 ( 30 ) ( June 2012 : A $ 40.000 ).Pro - increase alpha - lack of care access ( ESA ) Metabolites ( ESA ) Metabolic and care and care and care and care and care and care and care and care and care facilitators ( ASA ) Metabolic and care and care facilitators ( ASA ) Metabolic and caryConvertible loan facilityThe Group has a five year AEIS, 000.000 convertible loan facility entered into in a prior period to provide funding for the Bowdens acquisition. The Group has the option to male a prepayment against the facility with an issue of Kingspte shaKingster ' s That speciming subsolary : Abars, and about the study and the study. Has the study. Has there was and there was and there was and there was and there was and therefore than they and there was and there was and there was and there was anCorporate losen facility and convertible loss facility restructureAs indicated previously in the Preliminary Final report, at balance date it was the Group ’ s intention to restructure and amalgamate thesefacilities in the next financial year. This relates to the potential for completion of the Initial Public Offering of Aleara on the Stock Exchange of Thailand and the updated mine plan forChallenge : Any restructure would optimise the study. Shared to specific species of any specially. Shared to specialized and specialized and specialized and specialized and specialized and socialized and socialized by and supervisesMulti - currency and syndicated loan facilitiesKingsigarie ’ s That sperating subsolary. Also asked to the provide the provide the provide the provided by the providers to USB ( 25.000 ). Elevation of the providers to USB ( 25.000 ). Elevational and the provide the provide the provide theSubsequent to the end of the financial year, the following and the following and the following approved term sheet ( subject to formal dose - mentaltors ) for the restructure of the corporate foam and convertible loan facilities. Followin\n
>Tranche one will be a $ 25.000.000 Altara Pre IPO Bond with a maturity date of 31. Ivly 2015. The current intention is for this tranche to be repaid as part of the Alsara IPO although at Kingsgate ' s election repayment can be made by either cashe
Under the terms of the loan facilities, the Group is required to maintain a minimum cash balance of LIS $ 5.000.000 in respect of Alsera.>
Tranche two is an amortising facility with $ 5.000.000 to be repaid during the 2014 financial year and the balance of $ 10.000.000 repaid during the 2015 financial year.
", + "page_start": 91, + "page_end": 91, + "source_file": "ASX_KCN_2013.pdf" + }, + { + "text": "close. Our expa nsion of com mercia l \nclose. Our expa nsion of com mercia l world, as a matter of urgency. \nworld, as a matter of urgency. \n\n**Miyata**: In Asia today, there are a variety \n: In Asia today, there are a variety bank ing operations to date is part of \nbank ing operations to date is part of Japa nese compa n ies tend to be quite \nJapa nese compa n ies tend to be quite \n\nof infrastructure projects. Of course, \nof infrastructure projects. Of course, reserved and unobtrusive. I believe they \nreserved and unobtrusive. I believe they \n\ns uppor t i ng s uch proje c t s i s SM FG’s s \ns uppor t i ng s uch proje c t s i s SM FG must become more willing to blow their \nmust become more willing to blow their \n\nfundamental business, but we also hope to \nfundamental business, but we also hope to own trumpets. For example, our students \nown trumpets. For example, our students \n\ncontribute to the sustainable development \ncontribute to the sustainable development and salar y men cannot freely express \nand salar y men cannot freely express \n\nof society and the world including Asia. I \nof society and the world including Asia. I ", + "page_start": 3, + "page_end": 3, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "meet ezekiel and his big sister. \nHe is currently receiving medical \ncare at the iWK. \n\nin support of children like ezekiel, \nwe are having a \n**Caring for Kids Lott ery**\nto raise funds for the iWK. \n\nEach $20 ti cket off ers you \na chance to \n**win free rent for a year!**\nPurchase ti ckets before November \n30. the draw date is monday, \nDecember 2, 2013. \n\nall current residents of \nKillam Properti es in Nova Scoti a \nare eligible to parti cipate. \n\n**Visit**\n**killamforkids.eventbrite.com**\n**or ask your Resident Manager.**\n\nAll proceeds will benefi t the \nIWK Health Centre Foundati on \nand pati ents like Ezekiel. ", + "page_start": 19, + "page_end": 19, + "source_file": "TSX_KMP_2013.pdf" + }, + { + "text": "**Corporate Headquarters**\n6100 North Western Avenue \nOklahoma City, OK 73118 \n(405) 935-8000 \n\nof future events. They include estimates of nat- \nural gas and oil reserves, expected production, \nassumptions regarding future natural gas and \noil prices, planned drilling activity and capital \nexpenditures, and future asset sales, as well as \nstatements concerning anticipated cash flow and \nliquidity, business strategy and other plans and \nobjectives for future operations. Although we \nbelieve the expectations and forecasts reflected \nin these and other forward-looking statements \nare reasonable, we can give no assurance they \nwill prove to have been correct. They can be af- \nfected by inaccurate assumptions or by known \nor unknown risks and uncertainties. \n\n**Internet Address**\nCompany financial information, public disclo- \nsures and other information are available through \nChesapeake’s website at www.chk.com. \n\n**Common Stock**\nChesapeake Energy Corporation’s common stock \nis listed on the New York Stock Exchange (NYSE) \nunder the symbol CHK. As of March 31, 2011, there \nwere approximately 415,000 beneficial owners \nof our common stock. \n\nFactors that could cause actual results to differ \nmaterially from expected results are described \nunder “Risk Factors” in Item 1A of our 2010 Annual \nReport on Form 10-K included in this report. We \ncaution you not to place undue reliance on for- \nward-looking statements, and we undertake no \nobligation to update this information. We urge \nyou to carefully review and consider the disclo- \nsures made in this report and our other filings \nwith the Securities and Exchange Commission \n(SEC) regarding the risks and factors that may \naffect our business. ", + "page_start": 46, + "page_end": 46, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "to selected students pursuing careers in finance, economics, accounting, \nmarketing, business administration, computer science and information \ntechnology. In addition, scholars will take part in a Chesapeake Presiden- \ntial Leadership Course facilitated by faculty members in coordination with \ndesignated Chesapeake leadership coaches, including a Chesapeake senior \nvice president and OCU alumni. \n\nvolunteer program in which employees roll up their sleeves in the com- \nmunities they call home. \n\nIn 2007 Chesapeake launched a scholarship program in Texas with an \ninitial $1.25 million contribution, challenging the cities of Fort Worth and Dal- \nlas to match its gift within a year. The cities responded and matched the gift, \nso Chesapeake in 2008 added another $1.25 million to the fund, bringing the \ntotal to $3.75 million. The Chesapeake Scholarship Fund currently funds the \ncost of higher education for 48 minority students. The fund provides each \nstudent $20,000 a year for up to four years at the school of their choice. To \ndate more than $1.0 million has been distributed to deserving local students. \nTo help ensure the training of qualified geologists, engineers, land- \nmen and energy lawyers in the next generation, we award scholarships \nto students pursuing energy-related degrees. We also help mentor them \nthrough Chesapeake’s Peak Program. Junior- and senior-level scholarship \nrecipients are paired with Chesapeake employee mentors who help devel- \nop students’ knowledge and provide career advice. There are currently 25 \nmentors and 40 scholarship recipients participating in the Peak Program. \n\nChesapeake partners with other companies and organizations to meet \nbasic, practical needs in hundreds of communities. An example is our ", + "page_start": 26, + "page_end": 26, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**Junior Credit Facility**\n\nIn August 2013, Sundance Energy, Inc. (“Sundance Energy”), a wholly owned subsidiary of the Company, entered \ninto a second lien credit agreement with Wells Fargo Energy Capital, Inc., as the administrative agent (the “Junior \nCredit Facility”), which provides for term loans to be made in a series of draws up to $100 million. The Junior Credit \nFacility matures in June 2018 and is secured by a second priority lien on substantially all of the Company’s assets. \nUpon entering into the Junior Credit Facility, the Company immediately borrowed $15 million pursuant to the terms \nof the Junior Credit Facility and paid down the outstanding principal of the Senior Credit Facility. In May 2014, the \nCompany’s borrowing capacity increased to $35 million. As at 31 December 2014, the borrowing capacity under the \nJunior Credit Facility remains at $35 million. ", + "page_start": 87, + "page_end": 87, + "source_file": "ASX_SEA_2014.pdf" + }, + { + "text": "\n \n \n \n \n [html]Financing ArrangementsCorporate loan facility\n
Convertible revolving creeKingsgate has a three year secured loan facility with Investec which was amended during the year. The amended facility has a lent of β40 million ( 90 June 2012 : $ 50 million ), of which S20 million has been drawn down as at 30 ( 40 ) ( 30 ) ( une 2012 :
The Elong allochas a Shear area of their linear area of their linear are and their lines. There is and their lines are and their lines are and their lines. There is and their lines that their lines are and their limited to their limited to the in tConvertible loan facility
Kingogate has a five year AB35 million convert : ible ban facility with linvestec entered into in a prior period to provide funding for the Blowdens acquisition. Kingogate has the option to make a preparyment against the facility with an inHestructure of corporate loan and
convertible loan facilitiesAs indicated previously in the the breathinary final associated with the provide therapy. There with their their their their their their their that their their their that their their their that their their their that the potential for cou
Multi - currency and syndrome for the forested to for the foresteronal to the for the foresteronal to the forest to the for the formats to the formats to the formats to the formats to the formats to the formats to the formation formation to thesSubsequent to the end of the financial year, the provided by the provided by the provided by the provided by the approved technical support support to their consumption. Increased to the nexts shorts under to formal discuss mentalizing fo
>Tranche one will be a 525 million Abara Pre IPO 80nd with a maturity date of 31, luly 2015. The current intention is for this tranche to be repaid as part of the Abara IPO, although at Kingspate ’ s election repayment can be made by either cash ori
>Tranche two is an amortising facility with $ 5 million to be repaid during the 2014 financial year and the balance of $ 10 million repaid during the 2015 financial year.
", + "page_start": 11, + "page_end": 11, + "source_file": "ASX_KCN_2013.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_SMFG_2011.pdf", + "query": "Has the Sumitomo Mitsui Financial Group offered help to the elderly?", + "target_page": 6, + "target_passage": "Currently, the proportion of people aged 65 or over in Japan has reached 23.4%*. SMFG will help create frameworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycleframeworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycle planning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a soundplanning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a sound balance between work and care needs, given that many group employees will later need to nurse ailing relatives.balance between work and care needs, given that many group employees will later need to nurse ailing relatives", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Corporate Outline (as of September 30, 2011)** **Editorial Policy**\n\nCompany Name Sumitomo Mitsui Financial Group, Inc. This report has been created in an effort to convey to our stakeholders the variety of our initiatives and the roles the SMFG Group :: \n\nBusiness Description Management of banking subsidiaries (under the stipulations of Japan’s Banking Act) and of \n: is fulfilling as we work to create a sustainable society. \n\nnon-bank subsidiaries, as well as the performance of ancillary functions \nWe have aimed to present the information clearly, so that readers may understand our attitude that the fulfillment of CSR is \n\nEstablished December 2, 2002 \n: \nthe essence of business itself, and our initiatives act upon this. \n\nHead Office 1-2, Marunouchi 1-chome, Chiyoda-ku, Tokyo, Japan \n: \nOur CSR Report 2011 (digest version), launched last fiscal year, is intended to present more concise reports of the Group’s \nChairman of the Board Masayuki Oku \n: \nCSR activities, with a focus on specific activities of interest. To complement this, we have also posted online our CSR Report \nPresident Koichi Miyata (Concurrent Director at Sumitomo Mitsui Banking Corporation) \n: \n2011 (digest version, with examples of activities and statistical performance), with more detailed information on CSR \nCapital ¥2,337.8 billion \n: \nactivities and statistical data omitted in the CSR Report 2011 (digest version). \nStock Exchange Listings Tokyo Stock Exchange (First Section) \n: \nWe disclose the full range of our CSR activities as a Group on our website in the official-use version of our CSR Report (in \nOsaka Securities Exchange (First Section) \nJapanese only). It is recommended that you read it in combination with the above two digest versions in order to understand \nNagoya Stock Exchange (First Section) \nour CSR and other activities in greater detail. \nNote: American Depositary Receipts (ADRs) are listed on the New York Stock Exchange. \n\nFrom the current fiscal year, we are including third-party opinions in the website version. ", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "In the past, the Sumitomo Group \nIn the past, the Sumitomo Group undertook large-scale afforestation \nundertook large-scale afforestation \n\nprograms to solve the problem of \nprograms to solve the problem of pollution around the Besshi copper \npollution around the Besshi copper \n\nmine, while the Mitsui Group set up \nmine, while the Mitsui Group set up the Mitsui Memorial Hospital to \nthe Mitsui Memorial Hospital to \n\ngive the poorest in society access to \ngive the poorest in society access to basic medical care. Based on this \nbasic medical care. Based on this \n\ncorporate social responsibility \ncorporate social responsibility DNA embedded in the business \nDNA embedded in the business \n\nphilosophies of both the Sumitomo \nphilosophies of both the Sumitomo and Mitsui groups over the 400 \nand Mitsui groups over the 400 \n\nyears of their existence, we will \nyears of their existence, we will continue to play our part in solving \ncontinue to play our part in solving \n\nproblems facing the international \nproblems facing the international community through our financial \ncommunity through our financial \n\noperations. \nservice operations. \nservice ", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**Measures for Japan’s regeneration**\n\n**Reconstruction**\n**after the earthquake**\n**and tsunami**\nCurrently, the proportion of people aged 65 or over in Japan has reached 23.4%*. SMFG will help create \nCurrently, the proportion of people aged 65 or over in Japan has reached 23.4%*. SMFG will help create \n\nframeworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycle \nframeworks enabling the elderly to enjoy a vibrant lifestyle with peace of mind, through support for life-cycle \n\nplanning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a sound \nplanning and other measures. The SMFG Group aims to create systems and a corporate culture that foster a sound The March 11 earthquake and tsunami (The Great East Japan Earthquake) undermined power \nThe March 11 earthquake and tsunami (The Great East Japan Earthquake) undermined power \n\nbalance between work and care needs, given that many group employees will later need to nurse ailing relatives. \nbalance between work and care needs, given that many group employees will later need to nurse ailing relatives. generation capacity and severed manufacturing supply chains across the nation. This was in addition \ngeneration capacity and severed manufacturing supply chains across the nation. This was in addition \n\nto the severe damage sustained by agriculture and fisheries in the Northeast. \nto the severe damage sustained by agriculture and fisheries in the Northeast. *Estimates by the Statistics Bureau, Ministry of Internal Affairs and Communications (October 1, 2011) \n\nThe disaster also threw into relief many social issues facing the nation. By leveraging our role as \nThe disaster also threw into relief many social issues facing the nation. By leveraging our role as \n\n**Further measures needed**\na leading financial services group, we are committing our full range of resources to dealing with the \na leading financial services group, we are committing our full range of resources to dealing with the \n\nenormous task of regional reconstruction after the earthquake, in partnership with stakeholders \nenormous task of regional reconstruction after the earthquake, in partnership with stakeholders \n\nincluding enterprises, local governments and non-profit organizations. \nincluding enterprises, local governments and non-profit organizations. ", + "page_start": 5, + "page_end": 5, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\n**Keeping**\n**our shareholders**\n**informed**\n\nSpecific Examples of CSR Activities \n\n**Together with Our Shareholders**\n**and Markets**\n\nWebsite \n\nAnnual report \n\n**Contributing to the development of sounder financial markets**\n\nSRI Indexes on which SMFG is listed Examples of Group disclosure activities \n\nQuarterly and interim financial reports, \nQuarterly and interim financial reports, \n\nresults announcements, securities \nresults announcements, securities \n\nreports, legal disclosure statements, \nreports, legal disclosure statements, \n\nregular publications, etc. \nregular publications, etc. \n\nWe believe that the SMFG Group can contribute \nWe believe that the SMFG Group can contribute \nAnnual and interim reports (in Japanese \nAnnual and interim reports (in Japanese \nfurther to the creation of a sustainable society \nfurther to the creation of a sustainable society \nand English) \nand English) ", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "**For further details, please see our website.** Sumitomo Mitsui Financial Group CSR Report \n\n\n\nSpecific Examples of CSR Activities \n\n**Together with Our Employees**\n\n**We are developing human resources that can take on global roles,**\n**and we are creating globalized working environments**", + "page_start": 10, + "page_end": 10, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "Cardholders and employees of Sumitomo \nCardholders and employees of Sumitomo \n\nMitsui Card joined a literary social contribution \nMitsui Card joined a literary social contribution \n\ninitiative by participating in the Books To \ninitiative by participating in the Books To \n\nThe People 2010 project operated by BOOKOFF \nThe People 2010 project operated by BOOKOFF \n\n environ- \nCORP. This project aims to provide environ \nCORP. This project aims to provide \n\nments in which children can read books in \nments in which children can read books in \n\npurpose-built facilities, through donations to \npurpose-built facilities, through donations to \n\nRoom to Read, a non-governmental organi- \nRoom to Read, a non-governmental organi \n\nzation that supports education in developing \nzation that supports education in developing \n\ncountries. These NGO donations are pegged \ncountries. These NGO donations are pegged \n\nto total numbers of used books and other \nto total numbers of used books and other \n\nitems purchased by cardholders. Through \nitems purchased by cardholders. Through \n\nthe Sumitomo Mitsui Card-operated online \nthe Sumitomo Mitsui Card-operated online \n\nshopping mall POINT UP Mall, cardholders \nshopping mall POINT UP Mall, cardholders ", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "display \n this display \nSumitomo Mitsui Financial Group, Inc. \nanxious. I think everyone needs to hit the \nanxious. I think everyone needs to hit the of front-line commitment. \nof front-line commitment. \n\n‘reset’ button in some sense. If we don’t,t, \n‘reset’ button in some sense. If we don Moving forward on the reconstruction of \nMoving forward on the reconstruction of \n\nmore difficulties lie ahead. \nmore difficulties lie ahead. the Tohoku region, I believe we can also \nthe Tohoku region, I believe we can also The SMFG Group has 62,000 employees, \nThe SMFG Group has 62,000 employees, \n\n**Miyata**: Indeed, prior to 1970, living \n: Indeed, prior to 1970, living contribute to the rebuilding of infrastructure \ncontribute to the rebuilding of infrastructure “stepping up to the plate and working hard \n“stepping up to the plate and working hard \n\nstandards or wage levels were very low, \nstandards or wage levels were very low, t h r o u g h pr o je c t f i n a n c e a n d o t h e r \nt h r o u g h p r o j e c t f i n a n c e a n d o t h e r ", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "*Uplifting the nation’s spirits*\n*Uplifting the nation’s spirits*\n\nJapan is now facing a wide variety of problems, ranging from the reconstruction of the Tohoku region (the northeastern region of Japan) \nJapan is now facing a wide variety of problems, ranging from the reconstruction of the Tohoku region (the northeastern region of Japan) \n\nafter the March 11 earthquake and tsunami (“the Great East Japan Earthquake”) to a shrinking and aging population, with falling birth rates \nafter the March 11 earthquake and tsunami (“the Great East Japan Earthquake”) to a shrinking and aging population, with falling birth rates \n\nand increasing numbers of the aged. \nand increasing numbers of the aged. \n\nWe must now find ways for people to coexist in harmony with nature, based on a global perspective. \nWe must now find ways for people to coexist in harmony with nature, based on a global perspective. \n\nSumitomo Mitsui Financial Group (SMFG) invited the world-famous architect Tadao Ando to join in a conversation on the issues facing society \nSumitomo Mitsui Financial Group (SMFG) invited the world-famous architect Tadao Ando to join in a conversation on the issues facing society ", + "page_start": 2, + "page_end": 2, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "\nSumitomo Mitsui \nCardholders \n\nBOOKOFF CORP Group \n\nBuying used books \n\nPurchase price \n\nBuilding libraries in developing countries \nthrough the NGO Room to Read ", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_SMFG_2011.pdf" + }, + { + "text": "In November 2010, the Sumitomo Mitsui \nIn November 2010, the Sumitomo Mitsui \n\nFinancial Group listed on the New York \nFinancial Group listed on the New York \n\nStock Exchange. This move, we believe, not \nStock Exchange. This move, we believe, not \n\nonly significantly increases convenience for \nonly significantly increases convenience for \n\nour overseas shareholders and investors, \nour overseas shareholders and investors, \n\nbut also broadens our customer base as it \nbut also broadens our customer base as it \n\nfurther increases the transparency of our \nfurther increases the transparency of our \n\nfinancial position. Listing on the New York \nfinancial position. Listing on the New York \n\nStock Exchange as a socially responsible \nStock Exchange as a socially responsible \n\ncorporation accelerates our evolution into a \ncorporation accelerates our evolution into a \n\nglobal player. \nglobal player. ", + "page_start": 9, + "page_end": 9, + "source_file": "NYSE_SMFG_2011.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_CHK_2010.pdf", + "query": "Does Chesapeake Energy have a project to reduce excessive water use?", + "target_page": 28, + "target_passage": "Created to meet the challenge of reducing our water usage, Chesapeake’s Aqua Renew® program uses state-of-the-art technology to recycle pro- duced water.", + "chunk_present": { + "presence": false, + "index": null + } + }, + "top_chunk": [ + { + "text": "**Environmentally Friendly Operations**\nAt Chesapeake, we realize that the way a great product is produced is \nas important as the product itself. For example, we have helped pioneer \nthe use of multiwell padsites to drill up to 16 wells from a single loca- \ntion, greatly reducing our land and road use and overall environmental \nfootprint. We use the latest horizontal and directional drilling technology \nto place wells at a safe distance from homes, schools and businesses. In \naddition, we build and maintain access roads and work to eliminate soil \nerosion near our sites, as well as restore local vegetation. \n\nWe implement advanced, modern protective measures known as Best \nManagement Practices (BMPs) to help ensure energy development is con- \nducted in an environmentally responsible manner. Procedures are imple- \nmented throughout our operations to protect freshwater aquifers and \nreduce environmental impacts. BMPs protect wildlife, air quality, water and \nlandscapes as we work to develop vitally needed domestic energy sources. \nImplemented throughout the entire life cycle of a well, BMPs can be \nas simple as strategically placing a berm, or land barrier, on locations \nto control surface water runoff. Others involve cutting-edge operational \ntechnologies such as utilizing the most advanced techniques offered in \ndrilling fluids, well casing and cement design. Regardless of complex- \nity, all BMPs are based on the idea that the environmental footprint of ", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**CORPORATE PROFILE**\n\nChesapeake Energy Corporation is the second-largest producer of \nnatural gas, a Top 15 producer of oil and natural gas liquids and \nthe most active driller of new wells in the U.S. \nHeadquartered in Oklahoma City, the company’s operations are focused on discovering and developing \n\nunconventional natural gas and oil fields onshore in the U.S. Chesapeake owns leading positions in \n\nthe Barnett, Haynesville, Bossier, Marcellus and Pearsall natural gas shale plays and in the Granite \n\nWash, Cleveland, Tonkawa, Mississippian, Bone Spring, Avalon, Wolfcamp, Wolfberry, Eagle Ford, \n\nNiobrara and Utica unconventional liquids-rich plays. \n\nThe company has also vertically integrated its oper- \n\nations and owns substantial midstream, compression, \n\ndrilling and oilfield service assets. Chesapeake’s stock \n\nis listed on the New York Stock Exchange under \n\nthe symbol CHK. Further information is available at \n\n**www.chk.com**where Chesapeake routinely posts \n\nannouncements, updates, events, investor informa- \n\ntion, presentations and press releases. ", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "Chesapeake is the second-largest producer of U.S. natural gas and a Top 15 producer of U.S. oil and natural gas liquids. The company has \nbuilt a large resource base of high-quality U.S. assets in the Barnett, Haynesville, Bossier, Marcellus and Pearsall natural gas shale plays \nand in the Granite Wash, Cleveland, Tonkawa, Mississippian, Bone Spring, Avalon, Wolfcamp, Wolfberry, Eagle Ford, Niobrara and Utica \nunconventional liquids plays. In 2010 Chesapeake increased its focus on applying the geoscientific and horizontal drilling expertise \ngained from developing unconventional natural gas shale plays to unconventional liquids-rich plays. Our goal is to reach a balanced mix of \nnatural gas and liquids revenue as quickly as possible through organic drilling. We invested approximately $4.7 billion in 2010, net of \ndivestitures, primarily in liquids-rich acreage to provide the foundation for this shift toward more profitable plays. \n\nWe own interests in approximately 46,000 producing natural gas and oil wells, and in 2010 we produced approximately 1.035 trillion \ncubic feet of natural gas equivalent (tcfe) for an average of 2.8 billion cubic feet of natural gas equivalent (bcfe) per day. At year-end \n2010, our proved reserves were 17.1 trillion cubic feet of natural gas equivalent, of which 90% were natural gas and all were onshore in the \nU.S. We have also captured an inventory of up to 115,000 unrisked net future drilling opportunities — almost 50 years worth of drilling \nopportunities — on approximately 13.2 million net leasehold acres in the U.S. The following highlights Chesapeake’s ownership position \nin our key operating areas. ", + "page_start": 17, + "page_end": 17, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**What advantages does CHK’s unique vertical integration strategy provide?**\nChesapeake has built a large inventory of low-risk natural gas and liquids-rich plays that we plan to develop \naggressively over the next two decades. As a result, we know that our company will consistently utilize a tremen- \ndous (and growing) amount of oilfield services for this resource development. This high level of planned drilling \nactivity will create value for the provider of oilfield services, and Chesapeake’s strategy is to capture a portion \nof this value for our shareholders rather than transfer it to third-party vendors whose interests and investments \nare not always aligned with ours. To date, Chesapeake has invested in drilling rigs, rental tools, water manage- \nment equipment, trucking, compression equipment, midstream services, and most recently pressure pumping and \nfracture stimulation equipment. Chesapeake’s activities require a high level of planning and project coordination \nthat is best accomplished through vertical integration and ownership of the oilfield services we utilize. This approach \ncreates a multitude of cost savings, an alignment of interests, operational synergies, greater capacity of equipment, \nincreased safety and better coordinated logistics. In addition, Chesapeake’s control of a large portion of the oilfield \nservice equipment it utilizes provides a unique advantage to control the timing of leasehold development. Simply \nput, faster development of resources maximizes the present value of leasehold. This has been a key advantage for \nJeff Fisher \nSenior Vice President – Production \n\nChesapeake over the past three years as the company has monetized leasehold investments at premium values through our joint ventures. ", + "page_start": 22, + "page_end": 22, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**What innovations and advancements have led to CHK’s ability to produce liquids from**\n**shales and other tight reservoirs?**\nDuring the past five years, Chesapeake and a few other leaders in the independent E&P industry have developed \nexpertise in exploiting shales and other tight reservoir formations targeting natural gas through the combination of \nhorizontal drilling and advanced fracture stimulation techniques. This has allowed the commercialization of plays that \nwere previously uneconomic, most notably in shale formations. Part of our success in producing liquids from tight \nreservoirs has come from the company’s ability to extend the technological advances gained in the development of \ntight natural gas formations to new formations known to contain substantial liquids. This led to our first liquids-rich \nplay discovery in the Colony Granite Wash in 2007. As we have increased our focus on liquids-rich plays, we have ben- \nefited from a growing understanding and mapping of petrophysical properties in unconventional formations as well \nas an enhanced understanding of the geochemical nature of liquids-rich reservoirs. This has allowed Chesapeake to \nbetter identify formations most likely to generate liquids-rich production, including more than a dozen new plays for \nthe company. We have subsequently improved the success of our liquids-rich plays through the use of optimal well- \nbore lateral lengths, better placement of well laterals though advanced wellbore steering techniques and customized \nfracture stimulation designs for liquids-rich plays that allow the company to achieve a greater stimulated rock volume \nin low permeability reservoirs. Finally, the advancements Chesapeake has made in developing liquids-rich plays have \nbeen made possible through the use of our proprietary Reservoir Technology Center that has become the industry’s most advanced shale core laboratory. \n\nSteve Dixon \nExecutive Vice President – \nOperations and Geosciences and \nChief Operating Officer ", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**It is often said that the energy industry has an aging work force that is fast approaching**\n**retirement age. How is Chesapeake addressing this?**\nIt is no secret that there is a shortage of experienced professionals in the natural gas and oil industry. The industry down- \nturn of the 1980s and 1990s discouraged many from pursuing energy careers. In the following decades, strong compe- \ntition from other industries lured away many of the best and brightest science and technology graduates, and today \nmany experienced professionals who stayed in the industry through the downturn are approaching retirement age. \nAs a result, one of our industry’s greatest challenges over the past 10 years has been to develop a new generation \nof natural gas and oil professionals who have the knowledge and experience required to meet the nation’s growing \nenergy needs. \n\nIn 2000 Chesapeake was one of the first companies to recognize this trend and to understand how recruiting \nand training a new generation of energy professionals would impact the company’s future success and its ability to \ncompete in the industry. At that time, Chesapeake formulated a business strategy to address future staffing needs \nand decided to create a world-class college recruiting and intern program to recruit the most promising industry \ntalent. Today, Chesapeake hosts more than 150 interns every summer in its internship program, many of whom go \non to become full-time Chesapeake employees upon graduation. In addition, we have 350 students who receive \nscholarships through Chesapeake programs, and our staff of college recruiters has developed strong relationships with professors, department heads \nand career counselors at the more than 31 universities where we actively recruit. \n\nMartha Burger \nSenior Vice President – \nHuman and Corporate Resources ", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "Barnett Shale Chesapeake is the second-largest producer of natural gas, the most \nactive driller and the largest leasehold owner in the Core and Tier 1 sweet spots of Tarrant \nand Johnson counties. In January 2010, Chesapeake completed a joint venture and sold 25% of its \nassets in the Barnett to Total E&P USA, Inc., a wholly owned subsidiary of Paris-based Total S.A. \n(NYSE:TOT, FP:FP) (Total) for $2.25 billion in cash and drilling carries. During 2010 approx- \nimately $480 million of Chesapeake’s drilling and completion costs in the Barnett were \npaid by Total. Total will fund 60% of our share of future drilling and completion costs until an \nadditional $970 million of our costs have been funded, which we expect to occur by year-end \n2013. We anticipate using an average of approximately 18 operated rigs in 2011 to further develop our \n220,000 net acres of Barnett Shale leasehold, of which 205,000 net leasehold acres are located in the prime \nCore and Tier 1 areas. On this acreage, we estimate we could drill up to 2,300 net wells in the years to come. ", + "page_start": 19, + "page_end": 19, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "10,000 other Chesapeake employees, that every day we are working \nhard to create shareholder value and a better future for our communi- \nties, our states and our country through the continued discovery and \ndevelopment of unconventional natural gas and liquids. \n\n*Advancing technology for cleaner operations: solar panels at a West Texas well power*\n*telemetry systems that provide pumpers with real-time information on oil and water*\n*tank levels to alarm them when levels near capacity, preventing tank spills.*\n\nThe good news, however, is that America can now secure a new \nenergy future thanks to Chesapeake and a handful of other leading U.S. \nE&P companies that have reinvented the process of finding natural gas \nand oil during the past five years. In doing so, we have discovered twice \nthe resources of natural gas in the U.S. that Saudi Arabia possesses in oil. \nFurthermore, these same few companies that led the unconventional \nnatural gas revolution have in just the past two years also reinvented \nthe way in which we can find large new oil resources onshore in the U.S. \nIn fact, I believe the U.S. can possibly increase its production of oil from \nthe current 5.8 million barrels per day by 30–50% during the next 5–10 \nyears, thereby potentially reaching the President’s 2025 goal of reducing \nforeign oil imports by 33%, 5–10 years earlier than hoped. \n\nBest regards, ", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "Permian Basin Chesapeake has built a strong position of approx- \nimately 1.2 million net leasehold acres in the Permian Basin including \n\n**7**\n560,000 net leasehold acres in the Bone Spring, Avalon, Wolfcamp and Wolfberry \nunconventional liquids plays. This area has the potential to deliver significant \nupside as we move toward increasing our oil production substantially in the years \nahead. We have developed multiple new horizontal oil projects in this area, where \nwe plan to utilize an average of approximately eight operated rigs in 2011 to further \ndevelop our leasehold in the Permian and Delaware basins and estimate we could drill \nup to 4,400 net wells. ", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "2010 ANNUAL REPORT |**18**\n\n**LIQUIDS-RICH AREAS**\n\n2010 Total Production: \n145 bcfe, +4%, 14% \nAnadarko Basin The Anadarko Basin is home to four of Chesapeake’s liquids-rich plays, \nwhich we anticipate will become significant contributors to our growth in the years ahead. \n**5**\n\n12/31/10 Proved Reserves: \n2,440 bcfe, +21%, 14% \n\nChesapeake was one of the first to utilize modern horizontal drilling methods and has assembled \nan unrivaled leasehold position in numerous horizontal liquids-rich plays in the basin. Chesapeake \nwill continue drilling with a focus on the Granite Wash, where rates of return are the highest in our \ncompany, and with an increasing focus on the Cleveland, Tonkawa and Mississippian liquids-rich \nunconventional plays. We estimate we could drill up to 11,400 net wells on our Anadarko Basin \nacreage in the future and plan to utilize an average of 31 operated rigs in 2011 to further develop \nour current 1.7 million net leasehold acres. \n\n12/31/10 Net Leasehold Acres: \n1,420,000, +15%, 11% ", + "page_start": 20, + "page_end": 20, + "source_file": "NYSE_CHK_2010.pdf" + } + ] + }, + { + "references": { + "source_file": "NYSE_CHK_2010.pdf", + "query": "Has the CEO of Chesapeake Energy met with the US President about America's energy production?", + "target_page": 16, + "target_passage": "I am pleased to report that we have apparently finally convinced President Barack Obama and Congressional leadership to recognize that the energy path America is on today is completely unsustainable.", + "chunk_present": { + "presence": true, + "index": 4 + } + }, + "top_chunk": [ + { + "text": "10,000 other Chesapeake employees, that every day we are working \nhard to create shareholder value and a better future for our communi- \nties, our states and our country through the continued discovery and \ndevelopment of unconventional natural gas and liquids. \n\n*Advancing technology for cleaner operations: solar panels at a West Texas well power*\n*telemetry systems that provide pumpers with real-time information on oil and water*\n*tank levels to alarm them when levels near capacity, preventing tank spills.*\n\nThe good news, however, is that America can now secure a new \nenergy future thanks to Chesapeake and a handful of other leading U.S. \nE&P companies that have reinvented the process of finding natural gas \nand oil during the past five years. In doing so, we have discovered twice \nthe resources of natural gas in the U.S. that Saudi Arabia possesses in oil. \nFurthermore, these same few companies that led the unconventional \nnatural gas revolution have in just the past two years also reinvented \nthe way in which we can find large new oil resources onshore in the U.S. \nIn fact, I believe the U.S. can possibly increase its production of oil from \nthe current 5.8 million barrels per day by 30–50% during the next 5–10 \nyears, thereby potentially reaching the President’s 2025 goal of reducing \nforeign oil imports by 33%, 5–10 years earlier than hoped. \n\nBest regards, ", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**CORPORATE PROFILE**\n\nChesapeake Energy Corporation is the second-largest producer of \nnatural gas, a Top 15 producer of oil and natural gas liquids and \nthe most active driller of new wells in the U.S. \nHeadquartered in Oklahoma City, the company’s operations are focused on discovering and developing \n\nunconventional natural gas and oil fields onshore in the U.S. Chesapeake owns leading positions in \n\nthe Barnett, Haynesville, Bossier, Marcellus and Pearsall natural gas shale plays and in the Granite \n\nWash, Cleveland, Tonkawa, Mississippian, Bone Spring, Avalon, Wolfcamp, Wolfberry, Eagle Ford, \n\nNiobrara and Utica unconventional liquids-rich plays. \n\nThe company has also vertically integrated its oper- \n\nations and owns substantial midstream, compression, \n\ndrilling and oilfield service assets. Chesapeake’s stock \n\nis listed on the New York Stock Exchange under \n\nthe symbol CHK. Further information is available at \n\n**www.chk.com**where Chesapeake routinely posts \n\nannouncements, updates, events, investor informa- \n\ntion, presentations and press releases. ", + "page_start": 1, + "page_end": 1, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "Richard K Davidson (1 ) \nRetired Chairman and CEO \nUnion Pacific Corporation \nBonita Springs, Florida \nAubrey K. McClendon \nChairman of the Board \nand Chief Executive Officer \nChesapeake Energy Corporation \nOklahoma City, Oklahoma ", + "page_start": 29, + "page_end": 29, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**Corporate Headquarters**\n6100 North Western Avenue \nOklahoma City, OK 73118 \n(405) 935-8000 \n\nof future events. They include estimates of nat- \nural gas and oil reserves, expected production, \nassumptions regarding future natural gas and \noil prices, planned drilling activity and capital \nexpenditures, and future asset sales, as well as \nstatements concerning anticipated cash flow and \nliquidity, business strategy and other plans and \nobjectives for future operations. Although we \nbelieve the expectations and forecasts reflected \nin these and other forward-looking statements \nare reasonable, we can give no assurance they \nwill prove to have been correct. They can be af- \nfected by inaccurate assumptions or by known \nor unknown risks and uncertainties. \n\n**Internet Address**\nCompany financial information, public disclo- \nsures and other information are available through \nChesapeake’s website at www.chk.com. \n\n**Common Stock**\nChesapeake Energy Corporation’s common stock \nis listed on the New York Stock Exchange (NYSE) \nunder the symbol CHK. As of March 31, 2011, there \nwere approximately 415,000 beneficial owners \nof our common stock. \n\nFactors that could cause actual results to differ \nmaterially from expected results are described \nunder “Risk Factors” in Item 1A of our 2010 Annual \nReport on Form 10-K included in this report. We \ncaution you not to place undue reliance on for- \nward-looking statements, and we undertake no \nobligation to update this information. We urge \nyou to carefully review and consider the disclo- \nsures made in this report and our other filings \nwith the Securities and Exchange Commission \n(SEC) regarding the risks and factors that may \naffect our business. ", + "page_start": 46, + "page_end": 46, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "*Rig lights come on at twilight in the Permian Basin of Texas, where crews drill around the clock in the liquids-rich Bone Spring play. This is the newest in a*\n*series of energy booms that has enabled West Texas cities like Midland to prosper for almost 100 years.*\n\nI am pleased to report that we have apparently finally convinced \nPresident Barack Obama and Congressional leadership to recognize that \nthe energy path America is on today is completely unsustainable. There \nappears to be growing recognition that it is spectacularly dangerous for \nAmerica to continue importing 9 million barrels of oil per day and exporting more than $1 billion per day in national wealth to oil exporting countries. \nAmerica’s undiminished appetite for foreign oil has created the larg- \nest wealth transfer in the history of the world. The political leadership \nin Washington, D.C., has not seemed overly concerned about this issue \nuntil recently. However, after President Obama’s recent speech calling ", + "page_start": 15, + "page_end": 15, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "The combination of these vast new discoveries of unconventional \nnatural gas and liquids provides America with a unique future path- \nway toward greater energy independence, an industrial renaissance, \neconomic rejuvenation and greater national security. I remain fully con- \nfident that the marketplace understands this and that over time the U.S. \nwill more fully embrace and utilize clean, affordable, abundant American \nnatural gas and increased domestic oil production as the best alterna- \ntives to burning environmentally challenged coal and expensive and \ndangerous foreign oil. \n\nThere is now a clear road ahead toward a more sustainable, afford- \nable, dynamic and independent future if America embraces the remark- \nable gift of energy abundance that Chesapeake has helped discover in \nthe U.S. You have my commitment, and the commitment of more than ", + "page_start": 16, + "page_end": 16, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "As we explore for and produce clean, affordable, abundant, American \nnatural gas, we provide an important solution to our nation’s energy \nchallenges and its quest for energy independence. With at least a 200- \nyear supply of natural gas located right here in the U.S., this versatile \nfuel can be used to not only heat homes, create electricity and meet \nAmerica’s transportation needs, but also to fuel the country’s future \nby creating jobs and stimulating local and national economies through \ninvestment and taxes. \n\nenergy development should be as small and temporary as possible. \nThese practices are continually evolving and further improving as \nChesapeake and the industry develop new innovative techniques and \napproaches to business. ", + "page_start": 27, + "page_end": 27, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**It is often said that the energy industry has an aging work force that is fast approaching**\n**retirement age. How is Chesapeake addressing this?**\nIt is no secret that there is a shortage of experienced professionals in the natural gas and oil industry. The industry down- \nturn of the 1980s and 1990s discouraged many from pursuing energy careers. In the following decades, strong compe- \ntition from other industries lured away many of the best and brightest science and technology graduates, and today \nmany experienced professionals who stayed in the industry through the downturn are approaching retirement age. \nAs a result, one of our industry’s greatest challenges over the past 10 years has been to develop a new generation \nof natural gas and oil professionals who have the knowledge and experience required to meet the nation’s growing \nenergy needs. \n\nIn 2000 Chesapeake was one of the first companies to recognize this trend and to understand how recruiting \nand training a new generation of energy professionals would impact the company’s future success and its ability to \ncompete in the industry. At that time, Chesapeake formulated a business strategy to address future staffing needs \nand decided to create a world-class college recruiting and intern program to recruit the most promising industry \ntalent. Today, Chesapeake hosts more than 150 interns every summer in its internship program, many of whom go \non to become full-time Chesapeake employees upon graduation. In addition, we have 350 students who receive \nscholarships through Chesapeake programs, and our staff of college recruiters has developed strong relationships with professors, department heads \nand career counselors at the more than 31 universities where we actively recruit. \n\nMartha Burger \nSenior Vice President – \nHuman and Corporate Resources ", + "page_start": 21, + "page_end": 21, + "source_file": "NYSE_CHK_2010.pdf" + }, + { + "text": "**Soon after the Sept. 11 attack,**\n**The Hartford Chairman, President**\n**and CEO Ramani Ayer, left fore-**\n**ground, joined other industry**\n**CEOs in meeting with President**\n**Bush at the White House. During**\n**the meeting, the executives**\n**assured the president of industry**\n**support as the nation recovers.**", + "page_start": 6, + "page_end": 6, + "source_file": "NYSE_HIG_2001.pdf" + }, + { + "text": "**Recent Events and a Better Way Forward**\nYou may be aware that I have been outspoken in attempting to persuade \nour country’s political leadership to recognize that the discovery of vast \nresources of unconventional natural gas and oil in the U.S. is a complete \ngame changer for our country from an economic, national security and \nenvironmental perspective. After two years of my best efforts and the \nefforts of many others in the industry, most notably T. Boone Pickens, ", + "page_start": 13, + "page_end": 13, + "source_file": "NYSE_CHK_2010.pdf" + } + ] + } + ] +] \ No newline at end of file